Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- ICT Supply Chain Threat Definition: A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.Related Term(s): supply chain, threat
- Identity and Access Management Definition: The methods and processes used to manage subjects and their authentication and authorizations to access specific objects. Synonym(s): consequence
- impact"the force of impression of one thing on another : a significant or major effect"
- impact assessment"a risk management tool that seeks to ensure an organization has sufficiently considered a system's relative benefits and costs before implementation. In the context of AI, an impact assessment helps to answer a simple question: alongside this system’s intended use, for whom could it fail?"
- impersonation"A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data(...)
- in-processing"Techniques that modify the algorithms in order to mitigate bias during model training. Model training processes could incorporate changes to the objective (cost) function or impose a new optimization constraint."
- in-processing algorithm"A bias mitigation algorithm that is applied to a model during its training."
- in silico"carrying out some experiment by means of a computer simulation"
- Inactive Record Inactive records are those Records related to closed, completed, or concluded activities. Inactive Records are no longer routinely referenced, but must be retained in order to fulfill reporting requirements or for purposes of audit or analysis. Inactive records generally reside in a long-term(...)
- Incident Definition: An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the(...)
- Incident Management Definition: The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
- Incident Response Definition: In the Workforce framework, cybersecurity work where a person: Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats; uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of(...)
- Incident Response Plan Definition: A set of predetermined and documented procedures to detect and respond to a cyber incident.
- inclusion"a cultural and environmental feeling of belonging and sense of uniqueness. It represents the extent to which employees feel valued, respected, encouraged to fully participate, and able to be their authentic selves."
- independence"Of software quality assurance (SQA), situation in which SQA is free from technical, managerial, and financial influences, intentional or unintentional"
- Indicator Definition: An occurrence or sign that an incident may have occurred or may be in progress.Related Term(s): precursor
- individual fairness"The goal of similar individuals receiving similar treatments or outcomes."
- Industrial Control System Definition: An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.Related Term(s): Supervisory Control and Data Acquisition, Operations Technology
- inference"The stage of ML in which a model is applied to a task. For example, a classifier model produces the classification of a test sample."
- Information and Communication(s) Technology Definition: Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.Related Term(s): information technology
- Information Assurance Definition: The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.Related Term(s): information security
- Information Assurance Compliance Definition: In the NICE Framework, cybersecurity work where a person: Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements; ensures(...)
- information input component"One of the three components of a model. This component delivers assumptions and data to the model."
- information security"preservation of confidentiality, integrity and availability of information; in addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved."
- Information Security Policy Definition: An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.Related Term(s): security policy