Archives: Glossary Terms

Inference attack 

A data mining technique in which an attacker infers data from related known data without actually accessing a database containing the inferred data.

Read More

Inline network device

A device that receives packets and forwards them to their destination. Examples include routers, switches, firewalls, intrusion detection and intrusion prevention systems, web application firewalls, anti-malware and network taps.

Read More

intelligence

In the context of cybersecurity, and not confined to intelligence developed for military purposes, intelligence is knowledge of threats, developed by analyzing various sources of information. The US DOD Dictionary...

Read More

Internationalized Domain Name homograph attack

A form of homographic attack that uses apparently similar or identical characters from different language sets to spoof a domain. Also called IDN homograph attack. Compare typosquatting.

Read More

Intrusion kill chain

A cybersecurity first principle strategy that seeks to disrupt known adversary activity at any one of several points in an attack sequence.

Read More

IoA

Indicator of Attack. A clue that an attack may have occurred and/or is occurring. Or a precursor to an attack. A successful attack results in compromise.

Read More

IoC

Indicator of Compromise. A clue that data exfiltration and/or harm may have occurred and/or is occurring

Read More

iOS

An operating system designed primarily for mobile devices, like tablets and smartphones. Developed and sold by Apple.

Read More

IoT botnet

A group of hacked computers, smart appliances and Internet-connected devices co-opted for illicit purposes.

Read More

IPS

Intrusion Prevention System. An IPS is an IDS with the ability to execute real-time responses to active attacks and violations. Also see Next Gen Firewall.

Read More