Accessibility Links

Infosec
English 繁體版 简体版

Navigation Menu 1

General UsersYoungsters & StudentsParents and TeachersIT ProfessionalsSME
FAQ Search :
Change text size: Text Size: Default Size (A) Text Size: Larger (A) Text Size: Largest (A)
general user youngsters and students parents and teachers IT professionals sme

Navigation Menu 2

 

  

 
 
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Index for glossary I

 

Identity Provider

Incident Response Plan

Information Owner

Information Security Management Systems (ISMS)

 

Inoculate

Injection Flaws

Integrity

 

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

IPsec (IP Security)

 

Identity Provider

An organisation that issues identity credentials to individuals, and validates those credentials when presented by a user attempting to access a protected resource. An identity Provider may be a government agency, an academic institution, or a commercial business, such as a bank.

back to top Top

Incident Response Plan

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of an incident, such as a malicious cyber attacks, against an organisation’s information system(s).

back to top Top

Information Owner

Official with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, collection, processing, dissemination, and disposal.

back to top Top

Information Security Management Systems (ISMS)

ISMS is a set of policies concerned with information security management or IT related risks. The governing principle behind an ISMS is that an organisation should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk.

back to top Top

Inoculate

To generate information or data about a file that can be used to verify the integrity of the file at a later time.

back to top Top

Injection Flaws

Injection flaw is a flaw in web application that allows an attacker to trick the web application into executing unintended commands or into changing system data.

back to top Top

Integrity

Integrity is the need to ensure that information has not been changed accidentally or deliberately, and that it is accurate and complete.

back to top Top

Intrusion Detection System (IDS)

IDS detects the break-ins or attempts to attack via the use of software systems which operate on the network. It often combines the network monitoring with real-time capture and analysis in order to identify for attacks.

back to top Top

Intrusion Prevention System (IPS)

IPS helps to detect if there is an attack happening on the network. IPS also provides active response to stop the source of attacks or to minimize the impact of the attacks.

back to top Top

IPsec (IP Security)

IPsec provides interoperable, high quality and cryptographically based security services for traffic at the IP layer, such as authenticity, integrity, confidentiality and access control to each IP packet.

 
 
     
Back back to topTop
 

Footer Menu

Sitemap | Contact Us | Privacy Policy | Important Notices
 
General Users Youngsters & Students Parents & Teachers IT Professionals SME