CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [297]
Internet Engineering Task Force (IETF) An international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board (IAB).
Internet Group Management Protocol (IGMP) A protocol used for multicasting operations across the Internet.
Internet layer The network layer responsible for routing, IP addressing, and packaging.
Internet Message Access Protocol (IMAP) A protocol with a store-and-forward capability. It can also allow messages to be stored on an e-mail server instead of downloaded to the client.
Internet Protocol (IP) The protocol in the TCP/IP suite responsible for network addressing. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Internet Research Task Force (IRTF) An international organization that works under the Internet Architecture Board to research new Internet technologies. See also Internet Architecture Board (IAB).
Internet service provider (ISP) A company that provides direct access to the Internet for home and business computer users.
Internet Society (ISOC) A professional membership group composed primarily of Internet experts. It oversees a number of committees and groups, including the Internet Engineering Task Force (IETF).
Internetwork Packet Exchange (IPX) A connectionless, routable network protocol based on the Xerox XNS architecture. It’s the default protocol for versions of NetWare before NetWare 5. It operates at the Network layer of the Open Systems Interconnection (OSI) model and is responsible for addressing and routing packets to workstations or servers on other networks.
intranet Web (or similar) services set up in a private network to be accessed internally only.
intrusion The act of entering a system without authorization to do so.
intrusion detection system (IDS) Tools that identify and respond to attacks using defined rules or logic. An IDS can be network based or host based.
intrusion detector The item/application performing intrusion detection. See also intrusion detection system (IDS).
IP proxy A server that acts as a go-between for clients accessing the Internet. All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden. Also known as Network Address Translation (NAT).
IP Security (IPSec) A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.
IP spoofing An attack during which a hacker tries to gain access to a network by pretending their interface has the same network address as the internal network.
IPSec See IP Security (IPSec).
IPX See Internetwork Packet Exchange (IPX).
ISO 17799 A 10-part plan designed to provide a generic security audit on the best practices of security for virtually all aspects of your IT department.
ISP See Internet service provider (ISP).
J
JavaScript A programming language that allows access to system resources of the system running the script. These scripts can interface with all aspects of an operating system just like programming languages, such as the C language.
journaling The ability of a filesystem to use a log file of all changes and transactions that have occurred within a set period of time (for example, the last few hours). If a crash occurs, the operating system can look at the log files to see what transactions have been committed and which ones have not.
K
KDC See Key Distribution Center (KDC).
KEA See Key Exchange Algorithm (KEA).
Kerberos An authentication scheme that uses tickets (unique keys) embedded within messages. Named after the three-headed guard dog who stood at the gates of Hades in Greek mythology.
key/certificate life cycle The time during which the processes of a key or certificate take place.
Key Distribution Center (KDC) An organization/facility that generates keys for users. key escrow agency An agency that stores keys