Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

I

Internet Standard

An internet standard (std) is a normative specification (that is approved by the IESG and published as an RFC) of a technology or methodology applicable to the internet. Internet standards are created and published by the internet engineering task force (IETF). An internet standard is characterized by technical reliability and usefulness. The IETF also defines a proposed standard as a less mature but stable and well-reviewed specification.

Letter for filtering (will be hidden in prod) :

I

Internet Protocol Security (IPSec)

Internet protocol security (IPSec) is a protocol suite for secure internet protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPSec can be used in protecting data flows between a pair of hosts (host-to-host), security gateways (network-to-network), or between a security gateway and a host (network-to-host).

Letter for filtering (will be hidden in prod) :

I

Identity

Internet identity (IID) or internet persona is a social identity that an internet user creates on online communities and websites. While some users prefer using their real names online, others prefer to be anonymous and identify themselves by means of pseudonyms.

Letter for filtering (will be hidden in prod) :

I

IP Forwarding

IP forwarding is also known as internet routing. It is a process used to determine using which path a packet or datagram can be sent. IP forwarding is an os option that allows a host to act as a router. A system that has more than one network interface card must have IP forwarding turned on in order for the system to be able to act as a router.

Letter for filtering (will be hidden in prod) :

I

Internet Message Access Protocol (IMAP)

The internet message access protocol (IMAP) is a standard internet protocol that is used by email clients to retrieve email messages from a mail server over tcp/ip. Imap is defined by RFC 3501. An imap server typically listens on port number 143. IMAP over SSLl (IMAPs) is assigned the port number 993.

Letter for filtering (will be hidden in prod) :

I

Information Warfare

Information warfare (IW) is primarily a United States military concept that involves the use and management of information and communication technology in pursuit of a competitive advantage over an opponent. This concept may employ a combination of tactical information, assurance(s) that the information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.

Letter for filtering (will be hidden in prod) :

I

Interference Attack

An inference attack is a data mining technique used to illegally access information about a subject or database by analyzing data. This is an example of breached information security. Such an attack occurs when a user is able to deduce key or critical information of a database from trivial information without directly accessing it.

Letter for filtering (will be hidden in prod) :

I

Interrupt

An interrupt is a signal sent to the processor by hardware or software indicating an event that needs immediate attention.

Letter for filtering (will be hidden in prod) :

I

Internet Protocol (IP)

An internet protocol address (IP address) is a numerical label that is assigned to each device that is using internet protocol or any other protocol and is connected to an internet network. An IP address serves two basic functions, that is, host or network interface identification and location addressing.

Letter for filtering (will be hidden in prod) :

I

Intrusion Detection (ID)

Intrusion detection (ID) is a security management system for computers and networks. An id system gathers and analyzes information on a computer or a network to identify possible security breaches which include both intrusions and misuse. This system uses vulnerability assessment which is a technology developed to assess the security of a computer system or network.