Читаем CISSP Practice полностью

A specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, and security management) defined by an organization or in some instances, by a specific law, executive order, directive, policy, or regulation.

Information value

(1) The value of information is dependent on who needs the information (i.e., insider or outsider of an organization) and its worth to this person. (2) A qualitative measure of the importance of the information based upon factors such as level of robustness of the information assurance controls allocated to the protection of information based upon mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other entities, perishability/longevity of the information (e.g., short life data versus long life data), and potential impact of loss of confidentiality, integrity, and availability of the information.

Infrastructure component

Software unit that provides application functionality not related to business functionality, such as error/message handling, audit trails, or security.

Ingress filtering

(1) Filtering of incoming network traffic. (2) Blocking incoming packets that should not enter a network. (3) The process of blocking incoming packets that use obviously false IP addresses, such as reserved source addresses.

Inheritance

(1) A situation in which an information system or an application system receives protection from security controls (or portions of security controls) that are implemented by other entities either internal or external to the organization where the system resides. (2) A mechanism that allows objects of a class to acquire part of their definition from another class (called a super class). Inheritance can be regarded as a method for sharing a behavioral description.

Initial program load (IPL)

A process of copying the resident operating system into the computer’s read memory.

Initialization vector (IV)

(1) A non-secret binary vector used in defining the starting point of an encryption process within a cryptographic algorithm. (2) A data block that some modes of operation require as an additional initial input.

Inline sensor

A sensor deployed so that the network traffic it is monitoring must pass through it.

Input block

A data block that is an input to either the forward cipher function or the inverse cipher function of the block cipher algorithm.

Insider attack

An attack originating from inside a protected network, either malicious or nonmalicious.

Instant messaging (IM)

A facility for exchanging messages in real-time with other people over the Internet and tracking the progress of the conversation.

Integrated services digital network (ISDN)

A worldwide digital communications network evolving from existing telephone services. The goal of ISDN is to replace the current analog telephone system with totally digital switching and transmission facilities capable of carrying data ranging from voice to computer transmission, music, and video. Computers and other devices are connected to ISDN lines through simple, standardized interfaces. When fully implemented, ISDN is expected to provide users with faster, more extensive communications services in data, video, and voice.

Integration test

A process to confirm that program units are linked together and that they interface with files or databases correctly. This is a management and preventive control.

Integrity

(1) The property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. (2) Preservation of the original quality and accuracy of data in written or electronic form. (3) Guarding against improper information modification or destruction, (4) Ensuring information nonrepudiation and authenticity. (5) The ability to detect even minute changes in the data.

Integrity level

A level of trustworthiness associated with a subject or object.

Intellectual property

Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation.

Intended signatory

An entity that intends to generate digital signatures in the future.

Interception

The process of slipping in between communications and hijacking communications channels.

Interdiction

The act of impeding or denying the use of a computer system resource to a user.

Interface

The common boundary between independent systems or modules where communication takes place.

Interface profile

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес