Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [296]

By Root 3330 0
a successful penetration, a compromise of a system, or unauthorized access to information.

incident response How an organization responds to an incident.

incident response plan (IRP) A policy that defines how an organization will respond to an incident.

incident response team (IRT) Also known as a Computer Security Incident Response Team (CSIRT). The group of individuals responsible for responding when a security breach has occurred.

incremental backup A type of backup in which only new files or files that have changed since the last full backup or the last incremental backup are included. Incremental backups clear the archive bit on files upon their completion.

information classification The process of determining what information is accessible to what parties and for what purposes.

information classification policies Written policies detailing dissemination of information.

information destruction policies Policies that define how information is destroyed when it has reached the end of its useful life.

Information Flow model A model concerned with all the properties of information flow, not just the direction of the flow.

information policies Policies governing the various aspects of information security. Information policies include access, classifications, marking and storage, and the transmission and destruction of sensitive information. The development of information policies is critical to security.

information retention A designation of how long data is retained and any other significant considerations about information.

information security Security practices applied to information.

infrastructure The hardware and software necessary to run your network.

infrastructure security Security on the hardware and software necessary to run your network.

instant messaging (IM) Immediate communication that can be sent back and forth between users who are currently logged on. From a security standpoint, there are risks associated with giving out information via IM that can be used in social engineering attacks; in addition, attachments sent can contain viruses.

Institute of Electrical and Electronics Engineers, Inc. (IEEE) An international organization that sets standards for various electrical and electronics issues.

Integrated Services Digital Network (ISDN) A telecommunications standard that is used to digitally send voice, data, and video signals over the same lines.

integrity See data integrity.

interception The process of covertly obtaining information not meant for you. Interception can be an active or passive process.

internal information Information intended to remain within an organization.

internal threat A threat that arises from within an organization.

International Data Encryption Algorithm (IDEA) An algorithm that uses a 128-bit key. This product is similar in speed and capability to Digital Encryption Standard (DES), but it’s more secure. IDEA is used in Pretty Good Privacy (PGP).

International Organization for Standardization (ISO) The standards organization that developed the Open Systems Interconnection (OSI) model. This model provides a guideline for how communications occur between computers.

International Telecommunications Union (ITU) Organization responsible for communications standards, spectrum management, and the development of communications infrastructures in underdeveloped nations.

Internet A global network made up of a large number of individual networks that are interconnected and use TCP/IP. See also Transmission Control Protocol/Internet Protocol (TCP/IP).

Internet Architecture Board (IAB) The committee that oversees management of the Internet. It’s made up of two subcommittees: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). See also Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF).

Internet Assigned Numbers Authority (IANA) The organization responsible for governing IP addresses.

Internet Control Message Protocol (ICMP) A message and management protocol for TCP/IP. The Ping utility uses ICMP. See

Return Main Page Previous Page Next Page

®Online Book Reader