top of page

Cyber Terminologies and Fundamentals

Definitions 

Identity and Access Management (IAM)

A framework of policies and technologies for ensuring that the right individuals access the right resources.

Integrity Monitoring

A security technique that ensures data and systems remain unchanged unless authorized.

Insider Threat

A cybersecurity risk posed by employees or trusted individuals misusing their access privileges.

Incident Response

A structured approach to handling security breaches and cyber incidents.

Insecure Direct Object References (IDOR)

A vulnerability that allows attackers to access unauthorized data by manipulating input values.

Internet of Things (IoT) Security

Measures to protect internet-connected devices from cyber threats.

Intrusion Detection System (IDS)

A security tool that monitors network traffic for suspicious activity.

Information Disclosure Vulnerability

A weakness that allows unauthorized access to sensitive information.

Infrastructure as Code (IaC) Security

Best practices to secure automated cloud and infrastructure deployments.

Initialization Vector (IV)

A random value used in cryptographic algorithms to ensure unique encryption.

In-memory Malware

Malware that resides in system memory to evade traditional detection methods.

Intelligence Gathering

The process of collecting information about potential cybersecurity threats and attack methods.

Injection Attacks

A broad category of attacks where malicious input is injected into applications.

Indicator of Compromise (IoC)

Forensic data that helps detect cyber threats and security incidents.

Incident Handling

The process of managing and mitigating cybersecurity incidents efficiently.

Identity Theft

A cybercrime where an attacker fraudulently obtains and uses someone else's personal data.

Intent-Based Networking Security

A cybersecurity approach that uses AI-driven policies to secure networks.

Insecure Deserialization

A vulnerability that allows attackers to manipulate serialized data to execute code.

Inter-process Communication (IPC) Security

Protecting the communication between processes within a system.

Information Warfare

The use of information technology to gain an advantage over adversaries in conflicts.

bottom of page