I

IAB

The Internet Architecture Board oversees various other Internet organizations, such as IANA.

IANA

The Internet Assigned Numbers Authority is the organization that is responsible for governing IP addresses.

ICMP

See Internet Control Message Protocol.

ICMP attacks

Attacks that occur by triggering a response from the ICMP protocol when it responds to a seemingly legitimate maintenance request.

IEEE

See Institute of Electrical and Electronics Engineers, Inc.

IDS

Intrusion Detection System is a method of inspecting network activity (inbound and/or outbound) for malicious activity. IDS can be network-based or host-based.

IEEE 802.10 LAN/MAN Security

A series of guidelines dealing with various aspects of network security.

IEEE 802.11

A family of protocols that provides for wireless communications using radio frequency transmissions.

IEEE 802.11 Wireless LAN

Defines the standards for implementing wireless technologies such as infrared and spread-spectrum radio.

IETF

The Internet Engineering Task Force is an international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board.

IGMP

The Internet Group Management Protocol is used for multicasting operations across the Internet.

illicit server

An application/program that should not be there but is operating on the network, and one that is commonly used to gain unauthorized control by allowing someone to bypass normal authentication. NetBus is one of the best-known examples of an illicit server.

IM

See Instant Messaging.

IMAP

The Internet Message Access Protocol (IMAP) has a store-and-forward capability, however, it also has the ability to allow messages to be stored on an e-mail server instead of being downloaded to the client.

Identification and Authentication (I&A)

A two-step process of identifying a person (usually when they log on) and authenticating them by challenging their claim to access a resource.

incident

Any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information.

incident response

How an organization responds to an incident.

Incident Response Team (IRT)

Also known as a Computer Security Incident Response Team (CSIRT), this is the group of individuals responsible for responding when a security breach has occurred.

Incident Response Plan (IRP)

A policy that defines how an organization will respond to an incident.

incremental backup

A type of backup in which only new files or files that have changed since the last full backup or the last incremental backup are included. Incremental backups clear the archive bit on files upon their completion.

information classification

The process of determining what information is accessible to what parties and for what purposes.

information classification policies

A written policy detailing dissemination of information.

information destruction policies

Policies that define how information is destroyed when it has reached the end of its useful life.

Information Flow model

A model concerned with all the properties of information flow, not only the direction of the flow.

information policies

Policies governing the various aspects of information security. This includes access, classifications, marking and storage, and the transmission and destruction of sensitive information. The development of information policies is critical to security.

information retention

A designation of how long data is retained and any other significant considerations about information.

information security

Security practices applied to information.

infrastructure]

The hardware and software necessary to run your network.

infrastructure security

Security on the hardware and software necessary to run your network.

Instant Messaging (IM)

Immediate e-mail that can be sent back and forth between users who are currently logged on. From a security standpoint, there are risks associated with giving out information via IM that can be used in social engineering attacks and attachments sent can contain viruses.

Institute of Electrical and Electronics Engineers, Inc. (IEEE)

An international organization that sets standards for various electrical and electronics issues.

Integrated Services Digital Network (ISDN)

A telecommunications standard that is used to digitally send voice, data, and video signals over the same lines.

integrity

See data integrity.

interception

The process of covertly obtaining information not meant for you. Interception can be an active or passive process.

internal information

Information intended to remain within the company.

internal threats

Threats that arise from within the organization.

International Data Encryption Algorithm (IDEA)

An algorithm that uses a 128-bit key. This product is similar in speed and capability to DES, but it is more secure. IDEA is used in PGP.

International Organization for Standardization (ISO)

The standards organization that developed the OSI model. This model provides a guideline for how communications occur between computers.

International Telecommunications Union (ITU)

The ITU is responsible for communications standards, spectrum management, and the development of communications infrastructures in underdeveloped nations.

Internet

A global network made up of a large number of individual networks interconnected through the use of public telephone lines and TCP/IP protocols. See also Transmission Control Protocol/Internet Protocol.

Internet Architecture Board (IAB)

The committee that oversees management of the Internet. It is made up of two subcommittees: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). See also Internet Engineering Task Force, Internet Research Task Force.

Internet Control Message Protocol (ICMP)

A message and management protocol for TCP/IP. The Ping utility uses ICMP. See also Ping, Transmission Control Protocol/Internet Protocol.

Internet Engineering Task Force (IETF)

An international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board.

Internet layer

The network layer responsible for routing, IP addressing, and packaging.

Internet Protocol (IP)

The protocol in the TCP/IP protocol suite responsible for network addressing and routing. See also Transmission Control Protocol/Internet Protocol.

Internet Research Task Force (IRTF)

An international organization that works under the Internet Architecture Board to research new Internet technologies. See also Internet Architecture Board.

Internet Service Provider (ISP)

A company that provides direct access to the Internet for home and business computer users.

Internet Society (ISOC)

The Internet Society (ISOC) is a professional membership group that is composed primarily of Internet experts. The ISOC oversees a number of committees and groups including the IETF.

Internet Engineering Task Force

See IETF.

Internet Group Management Protocol

See IGMP.

Internet Mail Access Protocol

See IMAP.

Internet Protocol

See IP.

Internetwork Packet Exchange

See IPX.

Intranet

Web (or similar) services set up in a private network to be accessed internally only.

intrusion

The act of entering a system without authorization to do so.

Intrusion Detection Systems (IDS)

Tools that identify and respond to attacks using defined rules or logic.

intrusion detector

The item/application performing intrusion detection. See also IDS.

IP proxy

A server that acts as a go-between for clients accessing the Internet. All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden. Also known as Network Address Translation (NAT).

IP spoofing

A hacker trying to gain access to a network by pretending his or her machine has the same network address as the internal network.

IP Security

See IPSec.

IPSec

A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with Virtual Private Networks (VPNs) and operates at Layer 3.

IPX

A connectionless, routable network protocol based on the Xerox XNS architecture. It is the default protocol for versions of NetWare before NetWare 5. It operates at the Network layer of the OSI model and is responsible for addressing and routing packets to workstations or servers on other networks.

ISO 17799

A 10-part security audit designed to provide an audit on virtually all aspects of your IT department.

ISP

See Internet service provider.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net