- IEEE 802.11i Also known as WPA2 (Wi-Fi Protected Access 2), IEEE 802.11i is an amendment to the original IEEE 802.11 standard, providing enhanced security in wireless networks. It includes provisions for robust encryption via Advanced Encryption Standard (AES), secure authentication methods, and key management protocols, ensuring the protection of sensitive information in a wireless environment.
- IEEE 802.15.4IEEE 802.15.4 is a technical standard governing low-rate wireless personal area networks (LR-WPANs). It specifies the physical layer and media access control for LR-WPANs, focusing on simple, low-cost communication with low power consumption. The standard underpins technologies such as Zigbee and Thread, facilitating their application in IoT devices like smart home systems and sensor networks.
- IEEE (Institute of Electrical and Electronics Engineers) A professional organization composed of engineers, scientists, and students. Its purpose is to advance technology for the benefit of humanity. It sets standards for various fields, including electronics, telecommunications, and computing. The organization's work impacts network protocols, communication standards, hardware interfaces, and numerous other technological facets.
- Immutable Infrastructure The concept of replacing existing infrastructure components or systems instead of updating them. With an immutable infrastructure, once a system or component is deployed, it is not modified – any changes lead to a new deployment of a system or component. This philosophy is intended to increase the reliability, consistency, and repeatability of infrastructure, helping to mitigate risks associated with changes and providing a high level of auditability.
- Impact The potential consequences or damage that could occur due to a threat exploiting a vulnerability. This could involve loss of integrity, availability or confidentiality of data, financial losses, damage to reputation, legal implications, or other negative effects on an organization or individual. The severity of the impact can help to prioritize response strategies and investment in preventative measures.
- Impact Analysis A process used to understand the potential consequences of a change in a system, application, or another component of an organization's operations. Impact analysis can be used in various contexts, such as assessing the potential effects of a security incident or evaluating the implications of a new policy or process. It aids in decision-making, planning, and risk management, helping to identify potential risks, required resources, and strategies for minimizing negative effects.
- Impact assessment A systematic process that identifies and evaluates the potential consequences (positive or negative) of a proposed action or decision. In a security context, it often involves understanding the effects of a security breach, policy change, or new technology deployment. The assessment could consider multiple factors, including potential financial, reputational, operational, and legal impacts.
- Impairment Any event or condition that disrupts the optimal functioning of a system, application, or network. It can be caused by a wide range of incidents, including hardware failure, software bugs, malicious attacks, or network congestion. The objective of many security protocols is to identify and resolve impairments to maintain system reliability and availability.
- Impersonation This involves an entity pretending to be another with the intent to deceive. It's often used as a technique in deceptive attacks, where an attacker may impersonate a legitimate user, system, or device to gain unauthorized access or provoke actions that compromise security. Countermeasures against impersonation include robust authentication protocols, awareness training, and anomaly detection systems.
- Implement The process of putting a plan or decision into effect, often involving the setup, configuration, and integration of hardware, software, or protocols. In the context of security, implementation could involve the application of a new policy, the installation of a new security system, or the enforcement of a security standard across an organization. Proper implementation is crucial to ensure the effectiveness of security measures and minimize potential vulnerabilities.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.