AWS Amazon Web Services Network Partner: Pioneering Network-Centric AI-ML-Quant-Cyber-Crypto-Quantum Cloud Computing AIMLExchange: We Create the Digital Future™: Beyond Artificial Intelligent Systems: Self-Adaptive Complex Systems Pioneer  BRINT: From Future of Finance™ to Future of FinTech™  C4I-Cyber: Beyond AI C4I-Cyber and Quantum Supremacy: Adversarial and Counter-Adversarial C4I-Cyber-Crypto Command and Control Premium Domains For Sale: FundRaiser

We Create the Digital Future™...And You Can Too. It's As Easy as A, B, C. Come. Join Us. Build the Future.
AWS Amazon Web Services  MIT Computer Science & AI Lab  Princeton University  Goldman Sachs  JP Morgan Asset Management

Silicon Valley-Wall Street-Pentagon-Global Digital Pioneer: Below: Historical Archive: World's Top Digital Site.
IT Security and Information Assurance Glossary of 4,000 Terms: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z
*
@brint.com
Interactive Research Portals-Glossary of 4,000 IT Security, Information Assurance, Controls, Compliance Terms: I
"Best web site for keeping up with hi-tech industry developments..." - InfoWorld
*

Research Analyst Wizard: Click on a term to create most-updated research microsite on that topic.


I
I SPY Act · IA Architecture · IA Enabled Information Technology Product · IA: Information Assurance · IAE: Information Assurance Engineering · IASE: Information Assurance Support Environment · IATF: Information Assurance Technical Framework · IATTF: Information Assurance Technical Framework Forum · IceNewk · ICMP Attack · ICMP bug · ICMP enumeration · ICMP fingerprinting · ICMP Flood · ICMP sweep · ICMP tunneling · ICMP: Internet Control Message Protocol · ICRL: Indirect Certificate Revocation List · ICV: Integrity Check Value · IDEA · IDEA: International Data Encryption Algorithm · Identification · Identification · Identity · identity card · identity chaos · identity federation · Identity Hacking · Identity Management · identity theft · Identity Token · Identity Validation · Idle host scan · Idle Standby · IDS · IDS (Intrusion Detection Systems) · IEEE · IETF: Internet Engineering Task Force · IFrame · IIS Lockdown Tool · IISP (Institute of Information Security Professionals) · iJacking · IKE · IKE: Internet Key Exchange · IKEv2: Internet Key Exchange version 2 · ILOVEYOU · IM (Instant Messaging) · IM spam · IM worm · Image Processing · IMAP (Internet Message Access Protocol) · IMAP: Internet Message Access Protocol · Imitative Communications Deception · Impact Analysis · Impact Assessment · Impersonating · Impersonation · Implant · Implement · Implementation Life Cycle Review · in the wild · Inadvertent Disclosure · incident · Incident Handling · incident response · incident response plan · incident response policy · Incident response team · Incomplete Parameter Checking · Incremental Backups · Incremental Testing · Incursion · Independence · Independent Appearance · Independent Attitude · Indexed Sequential Access Method (ISAM) · Indexed Sequential File · Indicator · Individual Accountability · Individual Subscriber Authentication Key · Inetd: Internet Daemon · Infection · Inference Attack · Informal Security Policy · Information Architecture · Information Asset · Information Assurance · Information Assurance Manager · Information Assurance Officer · Information Assurance Product · Information Custodian · Information Engineering · Information Environment · Information Flow Control · Information leakage · Information Operations · Information Owner · Information Processing Facility (IPF) · Information Security · Information Security Governance · Information Security Guidelines · Information Security Incident · Information Security Plan · Information Security Policy · Information Security Program · Information Security Risk Assessment · information signature · Information Sniffing · Information System · Information Systems · Information Systems Security · Information Systems Security Engineering · Information Systems Security Equipment Modification · Information Systems Security Manager · Information Systems Security Officer · Information Systems Security Product · Information Technology (IT) · Information Technology Information Sharing and Analysis Center · Information User · Information Warfare · Informed · Infosec: Information security · Infowar · InfraGard · Infranet Initiative · Ingress Filtering · Inherent Risk · Inheritance (objects) · Initial Program Load (IPL) · initialization vector · Initialization Vector (IV) Collisions · Initialize · Input · Input Controls · Input Validation Attacks · Insider attack · insider threat · Inspectable Space · Instant Messaging · instant messaging · instant spam · integer overflow · integrated access management (IAM) · integrated circuit for encryption/decryption integrated circuit for encryption/decryption · Integrated Services Digital Network (ISDN) · Integrated Test Facilities (ITF) · integrated threat management · integrity · Integrity Check Value · integrity check value · Integrity Checker · Integrity Star Property · Intelligent Network · Intelligent Network Application Part · intelligent video · Intercept Related Information · Interconnection Security Agreement · Interface · Interface Control Document · Interface Testing · Interim Approval To Operate · Interim Approval To Test · Internal Control · Internal Control Environment · Internal Control Over Financial Reporting · Internal Control Structure · Internal Penetrators · Internal Rate of Return (IRR) · Internal Security Controls · Internal Storage · International Data Encryption Algorithm · International Mobile Equipment Identifier · International Mobile Subscriber Identity · International Organization for Standardization ISO · Internet · Internet Banking · Internet Control Message Protocol (ICMP) · Internet Engineering Task Force (IETF) · Internet Inter ORB Protocol (IIOP) · Internet Key Exchange · Internet Packet (IP) Spoofing · Internet Protocol · Internet Protocol (IP) · Internet Protocol Security · Internet Protocol Security (IPSec) · Internet Security and Acceleration (ISA) Server · Internet Security and Acceleration Server · Internet Service Provider (ISP) · Internet Service Provider ISP · Internet Trail · Internet worm · Internetwork Private Line Interface · Interruption Window · Intervention · Intranet · intruder · intrusion · intrusion detection · intrusion detection system · Intrusion Detection System (IDS) · Intrusion Detection System IDS · intrusion prevention · Intrusive Monitoring · inverse mapping · IP Address · IP address forgery · IP address restriction · IP address spoofing · IP address JavaScript · IP address based authentication · IP camera · IP Flood · IP Forwarding · IP Fragmentation Attack · IP fragmentation attack · IP Sequence Prediction Attack · IP spoofing · IP surveillance · IP tables · IP: Internet Protocol · Iplog · IPS · IPS (Intrusion Prevention Systems) · IPS: Intrusion Prevension System · IPsec · IPSec filter · IPSec policy · IPsec VPN · IPsec: Internet Protocol Security · IPSO: IP Security Option · iptables · IPX Spoofing · IRC (Internet Relay Chat) · Iron Box · Irregularities · Irregularity · ISA Server · ISA Server: Internet Security and Acceleration Server · ISACA: Information Systems Audit and Control Association · ISAKMP: Internet Security Association and Key Management Protocol · ISAPI: Internet Server Application Programming Interface · ISC2: International Information Systems Security Certification Consortium · ISDN · Island hopping · ISO 17799 · ISO 27001 · ISO 9001:2000 · ISO/AISO · ISO/IEC 17799 · ISP (Internet Service Provider) · ISSA: Information Systems Security Association · ISSEP: Information Systems Security Engineering Professional · ISSMP: Information Systems Security Management Professional · Issue specific Policy · IT Architecture · IT Governance · IT Governance Framework · IT Governance Institute (ITGI) · IT Incident · IT Infrastructure · IT Investment Dashboard · IT Plan · IT Security · IT Security Policy · IT Steering Committee · IT Strategic Plan · IT Strategy · IT Strategy Committee · IT Systems · IT Tactical Plan · IT User · IT ISAC · IT ISAC: Information Technology Information Sharing and Analysis Center · ITIL · Itrace: ICMP Traceback · ITSEC: Information Technology Security Evaluation Criteria · IV · IV: Initialization Vector . · IWA: Integrated Windows Authentication ·

Research Portals and Glossary of 4,000 IT Security and Information Assurance Terms
A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z


Top of Page

AIMLExchange

'Your Survival Network for The Brave New World Of Business'tm

About AIMLExchange | News About AIMLExchange

Terms of Use | Privacy Notice | © Copyright 1994-2019, Global Risk Management Network, New York, USA