-
-
- IFrame
- An IFrame (Inline Frame) is an HTML document embedded inside anot...
- IFrame (Inline Frame)
- An IFrame (Inline Frame) is an HTML...
- IISP
- The IISP (Institute of Information Security Professionals) is a Londo...
- IISP (Institute of Information Security Profess...
- iJacking
- According to the Identity Theft Resource Center, identity the...
- IKE
- The Internet Key Exchange (IKE) is an IPsec (Internet Protocol Security...
- IM spam
- Spim is spam delivered through instant messaging (IM) instead o...
- IM worm
- An IM worm is self-replicating malicious code that spreads in i...
- in the wild
- According to noted computer virus expert Paul Ducklin, ...
- incident
- An incident is an occurrence where a service or component fai...
- incident response
- Incident response is an organized approach ...
- incident response plan
- Incident response is an organized...
- incident response policy
- Incident response is an organ...
- Information Assurance Standard 6
- The Informati...
- Information Assurance Standard 6 (IAS 6)
- Information Security Breaches Survey
- The I...
- Information Security Breaches Survey (ISBS)
- information security management system
- information security management system (ISMS)
- information signature
- To fight terrorism, the Information...
- Information Technology Amendment Act 2008
- Information Technology Amendment Act 2008 (IT A...
- Information Technology Information Sharing and ...
- information-centric security
- Information-centric s...
- Infosys Technologies (Infosys Limited)
- Infranet Initiative
- The Infranet Initiative is a collaborat...
- initialization vector
- An initialization vector (IV) is an...
- initialization vector (IV)
- An initialization vector ...
- Inline Frame
- An IFrame (Inline Frame) is an HTML document embedded...
- insider threat
- An insider threat is a malicious hacker (also cal...
- instant messaging spam
- Spim is spam delivered through in...
- instant spam
- Spim is spam delivered through instant messaging (IM)...
- Institute of Information Security Professionals
- integer overflow
- Integer overflow is the result of trying to p...
- integrated access management
- Integrated access man...
- integrated access management (IAM)
- Integrate...
- integrated circuit for encryption/decryption
- integrated threat management
- Integrated threat man...
- integrity
- Integrity, in terms of data and network security, is the as...
- integrity check-value
- A cryptographic checksum is a mathe...
- intelligent video
- Intelligent video is digital video technolo...
- interlocking door controller
- A mantrap is a small ...
- internal cloud
- Private cloud (also called internal cloud) is a m...
- International Data Encryption Algorithm
- International Data Encryption Algorithm (IDEA)
- Internet Key Exchange
- The Internet Key Exchange (IKE) is ...
- Internet Key Exchange (IKE)
- The Internet Key Exchan...
- Internet Protocol Security
- IPsec (Internet Protocol ...
- Internet reboot keys
- Internet reboot keys are encrypted DN...
- Internet Security and Acceleration Server
- intrusion
- Intrusion detection (ID) is a type of security management s...
- intrusion detection
- Intrusion detection (ID) is a type of s...
- intrusion detection (ID)
- Intrusion detection (ID) is a...
- intrusion detection system
- Intrusion detection (ID) ...
- intrusion prevention
- Intrusion prevention is a preemptive ...
- inverse mapping
- Inverse mapping is a procedure used to create a...
- IP address forgery
- IP spoofing, also known as IP address for...
- IP camera
- An IP camera is a networked digital video camera that trans...
- IP spoofing
- IP spoofing, also known as IP address forgery, is a hij...
- IP spoofing (IP address forgery or a host file ...
- IP surveillance
- IP surveillance is a digitized and networked ve...
- IP tables
- Iptables is a generic table structure that defines rules an...
- IPS
- Intrusion prevention is a preemptive approach to network security used ...
- IPsec
- IPsec (Internet Protocol Security) is a framework for a set of prot...
- IPsec (Internet Protocol Security)
- IPsec (In...
- iptables
- Iptables is a generic table structure that defines rules and ...
- iris recognition
- Iris recognition is a method of identifying p...
- ISA Server
- Microsoft's ISA Server (Internet Security and Acceleratio...
- ISA Server (Internet Security and Acceleration ...
- ISBS
- The Information Security Breaches Survey is an independent security r...
- ISMS
- An information security management system (ISMS) is a set of policies...
- ISO 27001
- ISO 27001 (formally known as ISO/IEC 27001:2005) is a speci...
- ISO/IEC 38500
- ISO/IEC 38500 is an international standard created ...
- IT Act 2008
- The Information Technology Amendment Act, 2008 (IT Act ...
- IT ISAC
- IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC
- IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC (Information Technology Information Sha...
- IV
- An initialization vector (IV) is an arbitrary number that can be used alo...
- JavaScript hijacking
- JavaScript hijacking is a technique t...
- journaling file system
- A journaling file system is a fau...
- KBA
- Knowledge-based authentication (KBA) is an authentication scheme where ...
- Kerberos
- Kerberos is a secure method for authenticating a request for ...
- key
- In cryptography, a key is a variable value that is applied using an alg...
- key chain
- A key chain is a series of keys that can be created to help...
- key fob
- A key fob is a type of security token: a small hardware device ...
- key lifetime
- A cryptoperiod (sometimes called a key lifetime or a ...
- key logger
- A keylogger, sometimes called a keystroke logger, key log...
- key string
- A key string is the authentication code included in each ...
- key value pair
- A key-value pair (KVP) is a set of two linked dat...
- key-value pair
- A key-value pair (KVP) is a set of two linked dat...
- key-value pair (KVP)
- A key-value pair (KVP) is a set of tw...
- keylogger
- A keylogger, sometimes called a keystroke logger, key logge...
- keylogger (keystroke logger, key logger, or sys...
- keylogging software
- A keylogger, sometimes called a keystro...
- keystroke dynamics
- Keystroke dynamics are the patterns of rh...
- keystroke logger
- A keylogger, sometimes called a keystroke log...
- knowledge based authentication
- Knowledge-based a...
- knowledge process outsourcing
- Knowledge process o...
- knowledge process outsourcing (KPO)
- Knowled...
- knowledge-based authentication
- Knowledge-based a...
- knowledge-based authentication (KBA)
- Knowl...