Information Security Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing IT security and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

Browse Definitions
Search Definitions
  • I

    inline network device

    An inline network device is one that receives packets and forwards them to their intended destination.

  • insecure deserialization

    Insecure deserialization is a vulnerability in which an untrusted or unknown data is used to either inflict a denial of service attack (DoS attack), execute code, bypass authentication or further abuse the logic behind an application.

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • integrated access management (IAM)

    Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.

  • integrated threat management

    Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels... (Continued)

  • intelligence community

    The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.

  • International Data Encryption Algorithm (IDEA)

    IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.

  • International Information Systems Security Certification Consortium (ISC)2

    The International Information Systems Security Certification Consortium -- (ISC)2 -- is a non-profit organization that provides security training and certificates.

  • Internet Key Exchange (IKE)

    The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access.

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

  • intrusion prevention

    Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.

  • inverse mapping

    Inverse mapping is a procedure used to create associations between real or virtual objects that involves some type of reversal of another process or concept.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.

  • IPsec (Internet Protocol Security)

    IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.

  • ISSA (Information Systems Security Association)

    The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close