Glossary
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

IMAP
Internet Message Access Protocol, a protocol for retrieving e-mail messages.

Information Security
Refers to the policies, practices and procedures that are applied to information systems to ensure that data and information that is held within or communicated along those systems is not vulnerable to inappropriate or unauthorized use, access or modification and that the networks that are used to store, process or transmit information are kept operational and secure against unauthorized access. As the Internet becomes a more fundamental part of doing business, computer and information security are assuming more importance in corporate planning and policy.

Internet Backbone
The largest network making up the Internet, connecting the many smaller networks that make up the Internet. The Internet Backbone consists of three components. The first component is made up of phone lines and cables that make up the channels along which information travels. The second component, the Network Service Providers (NSPs) provide high-speed Internet access and services for Internet Service Providers, who then make these services available to individual Internet subscribers. Finally, Network Access Points (NAPs) allow messages to 'hop' or transfer from one network to another, thereby providing the connection between different networks.

Internet Protocol or IP
One of the primary protocols in the TCP/IP protocol suite. IP (Internet Protocol) plays a major role in the delivery of messages along the Internet by ensuring that the message gets to the proper destination computer. IP is the primary component of the system of addressing by which computers are identified and located by other computers on the Internet.

Internet Security Policy
An integral part of any organization's security strategy, a security policy should act as a comprehensive guide to appropriate and secure use of the Internet for all employees in an organization. Topics covered in the Internet security policy should include, but not be limited to security software, authentication and validation processes, transmission of information, acceptable use, monitoring of systems and planned responses to breaches of system security.

Internet Service Provider or ISP
A company that offers subscribers access to the Internet by providing them with accounts, usernames, passwords and, in some cases, software that allows the users to connect to the Internet. Internet Service Providers may also provide other network services such as e-mail delivery, retrieval and storage, Web page storage and development, and domain name registration and hosting. ISPs serve as the link between individuals or LANs and the Internet. Internet Service Providers may be smaller operations offering connectivity to local markets, or large operations offering connectivity nationally or even globally.

Intrusion Detection System or IDS:
A system for detecting unauthorized intrusions into a system or network. Intrusion Detection Systems include network intrusion detection systems (NIDS), and Host Intrusion Detection Systems (HIDS). Many IDS products are a hybrid of the two.

IP Address
A unique number, which allows a computer to be reliably identified on the Internet. In order to effectively operate on the Internet, all computers must have a unique IP address so that other computers can locate them in order to send or request messages. In IP version 4 (the curent version), addresses are composed of 4 numbers separated by dots, for example 192.168.1.17

IP spoofing
An attack method by which IP packets are sent with a false source address. This may try to circumvent firewalls by adopting the IP address of a trusted source, thereby fooling the firewall into thinking that the packets from the hacker are actually from a trusted source. It also may be used to simply hide the true origin of an attack.

IPSec or IP Security
A set of protocols being developed to support the secure exchange of information over the Internet. It is expected that IPSec will widely be implemented in Virtual Private Network applications.

ISDN or Integrated Services Digital Network
One of the always-on class of connections, ISDN is a high-speed digital, high bandwidth telephone line that allows simultaneous voice and data transmission over the same line.



 

Privacy Statement
Copyright 2010, SecurityFocus