See Internet Architecture Board (IAB).
See Internet Assigned Numbers Authority (IANA).
See Internet Control Message Protocol (ICMP).
An attack that occurs by triggering a response from the Internet Control Message Protocol (ICMP) when it responds to a seemingly legitimate maintenance request. See also Internet Control Message Protocol (ICMP).
A two-step process of identifying a person (usually when they log on) and authenticating them by challenging their claim to access a resource.
See intrusion detection system (IDS).
See Institute of Electrical and Electronics Engineers, Inc. (IEEE).
A series of guidelines dealing with various aspects of network security.
A family of protocols that provides for wireless communications using radio-frequency transmissions.
Defines the standards for implementing wireless technologies such as infrared and spread-spectrum radio.
See Internet Engineering Task Force (IETF).
See Internet Group Management Protocol (IGMP).
An application/program that shouldn't be there but is operating on the network, and one that is commonly used to gain unauthorized control by allowing someone to bypass normal authentication. NetBus is one of the best-known examples of an illicit server.
See instant messaging (IM).
See Internet Message Access Protocol (IMAP).
An attempt to violate a security policy, a successful penetration, a compromise of a system, or unauthorized access to information.
How an organization responds to an incident.
A policy that defines how an organization will respond to an incident.
Also known as a Computer Security Incident Response Team (CSIRT). The group of individuals responsible for responding when a security breach has occurred.
A type of backup in which only new files or files that have changed since the last full backup or the last incremental backup are included. Incremental backups clear the archive bit on files upon their completion.
The process of determining what information is accessible to what parties and for what purposes.
Written policies detailing dissemination of information.
Policies that define how information is destroyed when it has reached the end of its useful life.
A model concerned with all the properties of information flow, not just the direction of the flow.
Policies governing the various aspects of information security. Information policies include access, classifications, marking and storage, and the transmission and destruction of sensitive information. The development of information policies is critical to security.
A designation of how long data is retained and any other significant considerations about information.
Security practices applied to information.
The hardware and software necessary to run your network.
Security on the hardware and software necessary to run your network.
Immediate communication that can be sent back and forth between users who are currently logged on. From a security standpoint, there are risks associated with giving out information via IM that can be used in social engineering attacks; in addition, attachments sent can contain viruses.
An international organization that sets standards for various electrical and electronics issues.
A telecommunications standard that is used to digitally send voice, data, and video signals over the same lines.
See data integrity.
The process of covertly obtaining information not meant for you. Interception can be an active or passive process.
Information intended to remain within an organization.
A threat that arises from within an organization.
An algorithm that uses a 128-bit key. This product is similar in speed and capability to Digital Encryption Standard (DES), but it's more secure. IDEA is used in Pretty Good Privacy (PGP).
The standards organization that developed the Open Systems Interconnection (OSI) model. This model provides a guideline for how communications occur between computers.
Organization responsible for communications standards, spectrum management, and the development of communications infrastructures in underdeveloped nations.
A global network made up of a large number of individual networks that are interconnected and use TCP/IP. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
The committee that oversees management of the Internet. It's made up of two subcommittees: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). See also Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF).
The organization responsible for governing IP addresses.
A message and management protocol for TCP/IP. The Ping utility uses ICMP. See also Ping, Transmission Control Protocol/Internet Protocol (TCP/IP).
An international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board (IAB).
A protocol used for multicasting operations across the Internet.
The network layer responsible for routing, IP addressing, and packaging.
A protocol with a store-and-forward capability. It can also allow messages to be stored on an e-mail server instead of downloaded to the client.
The protocol in the TCP/IP suite responsible for network addressing. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
An international organization that works under the Internet Architecture Board to research new Internet technologies. See also Internet Architecture Board (IAB).
A company that provides direct access to the Internet for home and business computer users.
A professional membership group composed primarily of Internet experts. It oversees a number of committees and groups, including the Internet Engineering Task Force (IETF).
A connectionless, routable network protocol based on the Xerox XNS architecture. It's the default protocol for versions of NetWare before NetWare 5. It operates at the Network layer of the Open Systems Interconnection (OSI) model and is responsible for addressing and routing packets to workstations or servers on other networks.
Web (or similar) services set up in a private network to be accessed internally only.
The act of entering a system without authorization to do so.
Tools that identify and respond to attacks using defined rules or logic. An IDS can be network based or host based.
The item/application performing intrusion detection. See also intrusion detection system (IDS).
A server that acts as a go-between for clients accessing the Internet. All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden. Also known as Network Address Translation (NAT).
A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.
An attack during which a hacker tries to gain access to a network by pretending their interface has the same network address as the internal network.
See IP Security (IPSec).
See Internetwork Packet Exchange (IPX).
A 10-part plan designed to provide a generic security audit on the best practices of security for virtually all aspects of your IT department.
See Internet service provider (ISP).
3.15.172.195