Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

I

Input Validation Attacks

Input validations attacks are when an attacker purposefully sends strange inputs to confuse a web application. Input validation routines serve as the first line of defense for such attacks. Examples of input validation attacks include buffer overflow, directory traversal, cross-site scripting and sql injection.

Letter for filtering (will be hidden in prod) :

I

Internet Control Message Protocol (ICMP)

The internet control message protocol (ICMP) is one of the key internet protocols and is used by network devices such as routers to generate error messages to the source ip address when network problems prevent delivery of IP packets. Any IP network device has the capability to send, receive or process ICMP messages. This protocol is also used to relay query messages and is assigned protocol number 1.

Letter for filtering (will be hidden in prod) :

I

Integrity Star Property

Integrity star property means a user cannot access or read data of a lower integrity level than their own.

Letter for filtering (will be hidden in prod) :

I

International Organization for Standards (ISO)

The international organization for standardization (ISO) is an international standard-setting body that is composed of voluntary representatives from various national standards organizations.

Letter for filtering (will be hidden in prod) :

I

INETD

INETD stands for internet service daemon and is a super-server daemon on many unix systems to manage several internet services. This reduces the load of the system. This means that the network services such as telnet, file transfer protocol (FTP), and simple mail transfer protocol (SMTP) can be activated on demand rather than running continuously.

Letter for filtering (will be hidden in prod) :

I

ITU-T

The ITU telecommunication standardization sector (ITU-T) is one of the three sectors of the international telecommunication union (ITU). It coordinates standards for telecommunications. The international telegraph and telephone consultative committee (CCITT, from french: comité consultatif international téléphonique et télégraphique) was created in 1956, and was renamed ITU-T in 1993. Itu became a United Nations specialized agency in 1947.

Letter for filtering (will be hidden in prod) :

I

Internet

The internet is the worldwide network of interconnected computers that use the internet protocol suite (or TCP/IP) to link billions of devices across globally. It carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the world wide web (www), electronic mail, telephony, and peer-to-peer networks for file sharing.

Letter for filtering (will be hidden in prod) :

I

Internet Engineering Task Force (IETF)

The internet engineering task force (IETF) is a large open international community of network designers, operators, vendors, and researchers who are concerned with the evolution of the internet architecture and its smooth operations. This body defines the standard internet operating protocols such as TCP/IP. The IETF is supervised by the internet society internet architecture board (IAM). The internet assigned numbers authority (IANA) is the central coordinator for the assignment of unique parameter values for internet protocols.

Letter for filtering (will be hidden in prod) :

I

Intranet

An intranet is a private or internal network that is accessible only to an organization’s personnel. An intranet is established with the technologies for local area networks (LANs) and wide area networks (WANs).

Letter for filtering (will be hidden in prod) :

I

IP Flood

IP flood is a type of denial of service attack where the victim or system is flooded with information that uses up all the available bandwidth and prevents legitimate users from access. When IP flood detection is enabled, the router has the ability to block malicious devices that are attempting to flood devices.