A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

I

Identity analytics

The process of analysing the access of individuals or systems to an organisation's IT resources.

Identity and Access Management (IAM)

The process used in businesses and organisations to grant or deny employees and others authorisation to secure systems.

Identity theft

When a victim’s personal details are stolen and used to perpetrate crime, commonly fraud. Identity theft is a serious crime and can result in long-term and far-reaching negative consequences for victims.

IETF

Internet Engineering Task Force

IKE

Internet Key Exchange

Impersonation attack

Emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

Impersonation scam

A scam where a dishonest individual will try to convince you to make a payment or give personal or financial details by claiming to be from a trusted organisation.

Industrial Control System (ICS)

Control systems and associated instrumentation used to efficiently operate and/or automate industrial processes. Industrial Control Systems include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).

Information security (INFOSEC)

The protection of information from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.

Information Security Manual (ISM)

An ASD publication outlining a cyber security framework that organisations can apply, using their risk management framework, to protect their systems and data from cyber threats.

Information Technology (IT)

Hardware, software and supporting infrastructure used for the processing, storage or communication of data.

Infosec Registered Assessors Program (IRAP)

An initiative of ASD designed to register suitably qualified individuals to carry out security assessments for systems.

Infrared device

Devices such as mice, keyboards and pointing devices that have an infrared communications capability.

Insider

Any person that has, or had, authorised logical or physical access to a system and its resources.

Insider threat

An insider that performs, or attempts to perform, damaging activities (either intentionally or unintentionally) to a system or its resources. Some organisations may choose to exclude unintentional damage to systems and their resources (often referred to as negligent or accidental damage) from their definition of insider threat in order to focus on insiders with malicious intent (often referred to as malicious insiders).

Integrity

The assurance that data has been created, amended or deleted only by authorised individuals.

Intellectual property (IP)

The property of your mind or proprietary knowledge. It can be an invention, trade mark, design, brand or the application of your idea.

Interactive

The back and forth dialog between the user and the computer.

Interactive authentication

Authentication that involves the interaction of a person with a system.

International Telecommunication Union (ITU)

A specialised agency of the United Nations that is responsible for issues that concern information and communication technologies. It is the oldest global international organisation. Originally called the International Telegraph Union.

Internet

The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.

Internet of Things (IoT)

The network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors and network connectivity, which enables these objects to connect to the internet and collect and exchange data.

Internet Protocol (IP) address

A numerical representation of an address for a particular computer or device on a network or the internet. 

Internet Protocol Security (IPsec)

A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.

Internet Protocol telephony (IPT)

The transport of telephone calls over IP networks.

Internet Protocol version 6 (IPv6)

A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.

Internet Service Provider (ISP)

A company that provides subscribers with access to the internet.

Intrusion Detection System (IDS)

An automated system used to identify malicious or unwanted activities. An Intrusion Detection System can be host-based or network-based.

Intrusion Prevention System (IPS)

An automated system used to identify malicious or unwanted activities and react in real-time to block or prevent such activities. An Intrusion Prevention System can be host-based or network-based.

ISAKMP

Internet Security Association Key Management Protocol

ISO

International Organisation for Standardisation

IT equipment

Any device that can process, store or communicate data within IT environments, such as computers, multifunction devices, network devices, smartphones, electronic storage media and smart devices.