I
Inbound connection, 51, 55 “58
Information Technology Security Evaluation Criteria, 13
Initialization vector, 130, 172, 174
Inner network segment, 70
Institute of Electrical and Electronic Engineers, 118
Integrated Network Layer Security Protocol, 126
Integrated services digital network, 118, 121
Integrity certificate, 271
Intellectual property protection, 347 “49
Intermediary, Hypertext Transfer Protocol, 25 “26
Intermediate certificate, 177
Intermediate certificate authority, 192
International data encryption algorithm, 95
International Electrotechnical Committee, 187, 198, 242
International Organization for Standardization, 125, 143, 187, 198, 242
International Standard 15408, 13
International Telecommunication Union Telecommunication Standardization, 187, 198, 242
Internet Architecture Board, 4
Internet Assigned Numbers Authority, 133, 156, 157
Internet Engineering Steering Group, 175
Internet Engineering Task Force, 61, 76, 122, 127, 128, 137, 138, 142 “44, 146, 171, 175, 187, 188, 242, 381
Common Authentication Technology Working Group, 239
Public-Key Infrastructure Working Group, 185, 187, 193 “96, 198, 200
Internet Explorer, 7, 77 “78, 154, 176, 181, 201, 202 “5, 207, 273, 275, 286 “89, 326, 327, 343, 368 “71
Internet Inter-ORB Protocol, 63, 179
Internet-Keyed Payments Protocol, 261
Internet key exchange, 128 “29, 136 “41
security association, 139 “40
Internet Key Management Protocol, 127 “28
Internet layer security
architecture, 128 “31
IKE Protocol, 136 “41
implementations , 141 “42
IPsec Protocols, 131 “36
overview, 125 “28
Internet message access protocol, 155, 157
Internet Protocol, 119
address blocking, 361 “63
Secure Tunnel Protocol, 137
version 4, 63, 74, 127
version 6, 63, 74, 76, 127
Internet Protocol security, 124
implementations, 141 “42
protocols, 128, 131 “36
security architecture, 128 “31
security association, 140 “41
Internet Protocol security protocol, 127
Internet Protocol Security Working Group, 127, 128, 137, 142
Internet Security Association and Key Management Protocol, 128, 137, 138
Internet server application programming interface, 299, 309
Internet service provider, 319, 360, 364
Internet X.509 public key infrastructure, 196
Interpretation attack, 356
Interpreter application, 274
Interprocess communications facility, 143
Intrusion Detection Exchange Format Working Group, 381
Intrusion detection systems, 379, 381 “82
Invisible digital watermark, 353