Archives: Glossary Terms

HVA

High Value Asset

Read More

iCloud KeyChain

A cloud based sensitive information management system that allows users access across multiple devices.

Read More

Identity fabric

A set of services for managing identity and access management (IAM) across all of an organization’s data islands.

Read More

Identity management

Management, authentication, and authorization of identities, including their privileges, in an enterprise.

Read More

Identity orchestration

A subset of security orchestration, identity orchestration is the management of identities across an organization’s digital islands.

Read More

Identity theft 

The theft of a natural person’s identity for purposes of fraud.

Read More

IDS

Intrusion Detection System. Monitors networks and systems for malicious activities or policy violations

Read More

Imagery intelligence

The technical, geographic, and intelligence information derived through the interpretation or analysis of imagery and collateral materials. (Source: DoD Dictionary of Military and Associated Terms.) Compare and contrast ELINT, HUMINT,...

Read More

Incident response

An approach to managing, containing, remediating, and preventing recurrence of a cybersecurity incident.

Read More

Indicator of compromise

An artifact observed in a network or a system that constitutes forensic evidence of potential intrusion. Examples include, but are not limited to, malware signatures, IP addresses, and urls of...

Read More