The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
I
- I-Corps(Innovation Corps)
- IA(Information Assurance)
- IaC(Infrastructure as Code)
- IC(Integrated Circuit)
- ICC(Internet Control Message Protocol)
- ICE(Intrusion Countermeasures and Security)
- ICEC(In Cybersecurity Education & Certification)
- ICS(Industrial Control Systems)
- ICS-CERT(Industrial Control Systems Cyber Emergency Response Team)
- ICSP(Isolated Constrained Service Protection)
- ICSS(Industrial Control Systems Security)
- ICSV(Interactive Customer Service Vulnerability)
- ICT(Information and Communications Technology)
- ICT Supply Chain ThreatDefinition
- IDaaS(Identity as a Service)
- Identifiable PersonDefinition
- Identification and AuthenticationDefinition
- Identity and Access ManagementDefinition
- Identity VerificationDefinition
- Identity Web Services FrameworkDefinition
- Identity-Based Access ControlDefinition
- Identity-based authenticationDefinition
- Identity-Based EncryptionDefinition
- Identity, Credential, and Access Management(Identity, Credential, and Access Management)
- IDP(Identity Provider)
- IDPS(Intrusion Detection and Prevention System)
- IEEE(Institute of Electrical and Electronics Engineers)
- IEEE Engineering in Medicine and Biology SocietyDefinition
- IEEE Industrial Electronics SocietyDefinition
- IEEE Power & Energy SocietyDefinition
- IEEE Power System Communications and CybersecurityDefinition
- IEEE Robotics and Automation SocietyDefinition
- IEEE Vehicular Technology SocietyDefinition
- IGMP(Internet Group Management Protocol)
- IGP(Interior Gateway Protocol)
- IIoT(Industrial Internet of Things)
- IIP(Integrated Information Processing)
- IIS(Internet Information Services)
- IKE(Internet Key Exchange)
- IKE version 1(Internet Key Exchange version 1)
- IKE version 2Definition
- ILK(Integrated Link Key)
- ILTKDefinition
- IM(Instant Messaging)
- IMA(Integrity Measurement Architecture)
- IMAP(Internet Message Access Protocol)
- IMEI(International Mobile Equipment Identity)
- ImmutableDefinition
- IMO(International Maritime Organization)
- ImpactDefinition
- ImpersonizationDefinition
- ImplantDefinition
- IncidentDefinition
- Incident ManagementDefinition
- Incident ResponseDefinition
- Incident Response PlanDefinition
- IndicatorDefinition
- Indicator of CompromiseDefinition
- Indicators of Attack(IoA)
- Indirect IdentifierDefinition
- Industrial Control SystemDefinition
- Information and Communication(s) TechnologyDefinition
- Information AssuranceDefinition
- Information Assurance ComplianceDefinition
- Information Assurance Component (IAC)(Information Assurance Component)
- Information Assurance ManagerDefinition
- Information Assurance OfficerDefinition
- Information Assurance Technical FrameworkDefinition
- Information Assurance Technology Analysis CenterDefinition
- Information Assurance Vulnerability Alert (IAVA)(Information Assurance Vulnerability Alert)
- Information Assurance Vulnerability Bulletin (IAVB)(Information Assurance Vulnerability Bulletin)
- Information Assurance Workforce System ArchitectureDefinition
- Information Centric AnalyticsDefinition
- Information Design Assurance Red TeamDefinition
- Information DomainDefinition
- Information EnvironmentDefinition
- Information ExchangeDefinition
- Information Exchange AgreementDefinition
- Information Flow ControlDefinition
- Information ItemDefinition
- Information LeakageDefinition
- Information Life CycleDefinition
- Information ManagementDefinition
- Information Management PolicyDefinition
- Information ObjectDefinition
- Information Operations (IO)(Information Operations)
- Information OwnerDefinition
- Information Relevant to CybersecurityDefinition
- Information Resource ManagementDefinition
- Information ResourcesDefinition
- Information Resources Management(Information Resources Management)
- Information SecurityDefinition
- Information Security and Privacy Advisory BoardDefinition
- Information Security ArchitectDefinition
- Information Security ArchitectureDefinition
- Information Security Continuous Monitoring (ISCM)(Information Security Continuous Monitoring)
- Information Security Continuous Monitoring (ISCM) Process(Information Security Continuous Monitoring)
- Information Security Continuous Monitoring (ISCM) Program(Information Security Continuous Monitoring)
- Information Security Continuous Monitoring (ISCM) Strategy(Information Security Continuous Monitoring)
- Information Security Continuous Monitoring Target NetworkDefinition
- Information Security Management SystemsDefinition
- Information Security MarketingDefinition
- Information Security OfficerDefinition
- Information Security Oversight OfficeDefinition
- Information Security PolicyDefinition
- Information Security Program PlanDefinition
- Information Security RiskDefinition
- Information Security Risk ManagementDefinition
- Information Security TestingDefinition
- Information SharingDefinition
- Information Sharing and Analysis CenterDefinition
- Information Sharing and Analysis OrganizationDefinition
- Information Sharing ArchitectureDefinition
- Information Sharing Environment (ISE)(Information Sharing Environment)
- Information StewardDefinition
- Information SystemDefinition
- Information System AdministratorDefinition
- Information System BoundaryDefinition
- Information System ComponentDefinition
- Information System Component InventoryDefinition
- Information System Contingency Plan(Information System Contingency Plan)
- Information System Life CycleDefinition
- Information System OwnerDefinition
- Information System ResilienceDefinition
- Information System Security EngineerDefinition
- Information System Security EngineeringDefinition
- Information System Security ManagerDefinition
- Information System Security OfficerDefinition
- Information System Security PlanDefinition
- Information System ServiceDefinition
- Information System UserDefinition
- information system-related security risksDefinition
- Information Systems Audit and Control AssociationDefinition
- Information Systems Security (INFOSEC)(Information Systems Security)
- Information Systems Security (INFOSEC) Boundary(Information Systems Security)
- Information Systems Security Manager (ISSM)(Information Systems Security Manager)
- Information Systems Security OperationsDefinition
- Information Systems Security ProgramDefinition
- Information Systems Security Program ManagerDefinition
- Information TechnologyDefinition
- Information Technology Asset ManagementDefinition
- Information Technology Infrastructure LibraryDefinition
- Information Technology Laboratory (of NIST)Definition
- Information Technology Operation and SupportDefinition
- Information Technology ProductDefinition
- Information Technology SecurityDefinition
- Information TypeDefinition
- Information ValueDefinition
- Informational LabelDefinition
- Informative Reference DeveloperDefinition
- Informative ReferencesDefinition
- INFORMS(Institute for Operations Research and the Management Sciences)
- InfoSec(Information Security)
- Infrastructure as a Service (IaaS)(Infrastructure as a Service)
- Infrastructure as CodeDefinition
- Ingress FilteringDefinition
- Insider ThreatDefinition
- Integrated Risk ManagementDefinition
- IntegrityDefinition
- Intel Advanced Encryption Standard New Instructions(AES-NI)
- Intel AES-NI(Advanced Encryption Standard New Instructions)
- Intel CET(Intel Control-Flow Enforcement Technology)
- Intel CIT(Intel Customer IT)
- Intel Cloud Integrity TechnologyDefinition
- Intel Control-Flow Enforcement TechnologyDefinition
- Intel MKTME(Intel Multi-Key Total Memory Encryption)
- Intel Multi-Key Total Memory EncryptionDefinition
- Intel Security LibrariesDefinition
- Intel Security Libraries for Data CenterDefinition
- Intel TDX(Trusted Domain Extensions)
- Intel TME(Intel Total Memory Encryption)
- Intel Total Memory EncryptionDefinition
- Intel TPM(Trusted Platform Module)
- Intel Transparent Supply ChainDefinition
- Intel Trust Domain ExtensionsDefinition
- Intel Trusted Execution Technology(Intel Trusted Execution Technology)
- Intel Trusted Platform ModuleDefinition
- Intel TSC(Intel Timestamp Counter)
- Intel TXT(Trusted Execution Technology)
- Intel Virtualization TechnologyDefinition
- Intel Virtualization Technology for Directed I/ODefinition
- Intel VT(Intel Virtualization Technology)
- Intel VT-d(Intel Virtualization Technology for Directed I/O)
- Intel VT-x(Intel Virtualization Technology for x86)
- IntentDefinition
- Intermittent Ad-Hoc ConnectionDefinition
- Internal Assessment EngagementDefinition
- Internal BGPDefinition
- Internal Border Gateway ProtocolDefinition
- Internal ControlDefinition
- Internal Gateway ProtocolDefinition
- Internal NetworkDefinition
- Internal Security ControlsDefinition
- Internal Security TestingDefinition
- Internal StateDefinition
- Internal Trusted StorageDefinition
- International Association for Automation and Robotics in ConstructionDefinition
- International Association of Computer Investigative SpecialistsDefinition
- International Association of Privacy ProfessionalsDefinition
- International Atomic Energy AgencyDefinition
- International Atomic TimeDefinition
- International Civil Aviation OrganizationDefinition
- InterNational Committee for Information Technology StandardsDefinition
- International Council on Large Electric Systems(CIGRÉ)
- International Council on Systems Engineering(INCOSE)
- International Criminal Police OrganizationDefinition
- International Cryptographic Module ConferenceDefinition
- International Earth Rotation and Reference Systems ServiceDefinition
- International Electrotechnical CommissionDefinition
- International Federation for Information ProcessingDefinition
- International Household Survey NetworkDefinition
- International Maritime OrganizationDefinition
- International Mobile Equipment IdentifierDefinition
- International Mobile Equipment Identity (IMEI)(International Mobile Equipment Identity)
- International Mobile Subscriber Identity (IMSI)(International Mobile Subscriber Identity)
- International Organization for StandardizationDefinition
- International Organization for Standardization/International Electrotechnical CommissionDefinition
- International Society of AutomationDefinition
- International Systems Security Engineering AssociationDefinition
- International Telecommunication Union - Telecommunication Standardization SectorDefinition
- International Terrestrial Reference FrameDefinition
- International Terrestrial Reference SystemDefinition
- International Traffic in Arms RegulationDefinition
- Internet Assigned Number AuthorityDefinition
- Internet Control Message ProtocolDefinition
- Internet Corporation for Assigned Names and Numbers(ICANN)
- Internet Engineering Task Force(Internet Engineering Task Force)
- Internet Exchange PointDefinition
- Internet Fibre-Channel ProtocolDefinition
- Internet Group Management ProtocolDefinition
- Internet Information ServerDefinition
- Internet Information ServicesDefinition
- Internet Infrastructure ProtectionDefinition
- Internet Key ExchangeDefinition
- Internet Message Access Protocol (IMAP)(Internet Message Access Protocol)
- Internet Number ResourceDefinition
- Internet of Medical ThingsDefinition
- Internet of Things(IoT)
- Internet ProtocolDefinition
- Internet Protocol (IP) AddressesDefinition
- Internet Protocol SecurityDefinition
- Internet Protocol version 4Definition
- Internet Protocol version 6Definition
- Internet Relay ChatDefinition
- Internet Research Task ForceDefinition
- Internet Router Discover ProtocolDefinition
- Internet Routing RegistryDefinition
- Internet Security Association and Key Management Protocol(ISAKMP)
- Internet Server Application Programming InterfaceDefinition
- Internet Service ProviderDefinition
- Internet Small Computer Systems InterfaceDefinition
- Internet Storage Name ServiceDefinition
- Internet Systems ConsortiumDefinition
- InteroperabilityDefinition
- INTERPOL(International Criminal Police Organization)
- InterpreterDefinition
- IntrusionDefinition
- Intrusion DetectionDefinition
- Intrusion Detection System (IDS)(Intrusion Detection System)
- Intrusion PreventionDefinition
- Intrusion Prevention System (IPS)(Intrusion Prevention System)
- InvalidateDefinition
- InventoryDefinition
- Inventory ManagementDefinition
- Inverse Cipher FunctionDefinition
- Inverse Cipher Operation/Inverse TransformationDefinition
- Inverse TransformationDefinition
- InvestigateDefinition
- InvestigationDefinition
- Investment Review BoardDefinition
- Invisible Internet Project(I2P)
- Invocation FieldDefinition
- IoC(Indicators of Compromise)
- IOPS(Input/Output Operations Per Second)
- iOSDefinition
- IoT(Internet of Things)
- IoT Device(Internet of Things Device)
- IoT PlatformDefinition
- IoT Product(Internet of Things)
- IoT Product ComponentDefinition
- IoT Product DeveloperDefinition
- IP(Intellectual Property)
- IP Multimedia SubsystemDefinition
- IP Payload Compression ProtocolDefinition
- IP Security(IP Security)
- IPA(Identity, Policy, Audit)
- IPC(Inter-Process Communication)
- IPComp(IP Payload Compression Protocol)
- IPFS(InterPlanetary File System)
- iPhone Operating SystemDefinition
- IPL(Initial Program Load)
- IPSec(Internet Protocol Security)
- ISC²(International Information System Security Certification Consortium)
- IT(Information Technology)
- IT AssetDefinition
- itSM(IT Service Management)
- ITWAC(Information Technology Web Application Controls)