A service model for outsourcing remote equipment with specified parameters. Under the IaaS model, the provider grants the client access to a virtual server with an installed operating system, or to several hosts connected into a network. The user can… Read Full Article

An ICO is the initial sale of a limited amount of cryptocurrency to investors. It is a way to raise financing (often through crowdfunding) and issue coins for the first time. Besides tokens, the issuer can offer buyers additional services… Read Full Article

Identity theft occurs when a fraudster obtains enough personal information from the victim (name, address, date of birth, etc.) to enable them to commit identity fraud – i.e. the use of stolen credentials to obtain goods or services by deception.… Read Full Article

An intrusion detection system (IDS) is a software product or device that detects unauthorized and malicious activity in a computer network or on a separate host. An IDS’s purpose is to detect cybercriminal attempts to penetrate the infrastructure and to… Read Full Article

A standard describing the authorization process and delimitation of access rights in most modern network systems. The IEEE 802.1x specification prohibits a client that does not pass the authentication procedure from fully using the router. The standard is developed and… Read Full Article

A transport protocol for retrieving messages from a mail server, created as an alternative to POP3. IMAP provides flexible management of messages, maintains the connection to the server during the entire session, and downloads only user-selected messages onto the client… Read Full Article

Incident management in cybersecurity is a set of measures designed to combat cyberthreats and minimize the consequences of attacks. Incident management covers monitoring of security events, as well as incident response, investigation, and prevention. Incident management breakdown The incident management… Read Full Article

Incident response in the field of information security is a set of measures to detect and stop a cyberattack or a data leak from an organization’s infrastructure, and to clear up any consequences. The primary goal of incident response is… Read Full Article

In the field of computer security, an Indicator of compromise (IoC) is an object or activity that, observed on a network or on a device, indicates a high probability of unauthorized access to the system — in other words, that… Read Full Article

Infection chain is the infosec term for a set of multistage attack tools, each of which downloads the next to an infected system with the goal of installing and running a payload. In the realm of information security, the term… Read Full Article

A random or pseudorandom sequence of characters added to an encryption key to enhance security. An initialization vector (IV) complicates determining patterns in a series of data containing cryptographic signatures, and makes it more resistant to hacking. The IV does… Read Full Article

An insider threat is a risk for an organization that comes from people inside the security loop. These people, known as insiders, can include either current or former employees of the company, as well as contractors or partners — that… Read Full Article

A type of telephone fraud that utilizes technical means to make unauthorized calls to premium numbers. Cybercriminals use hacked phones, stolen SIM cards, and compromised corporate PBXs to direct calls to their own or leased lines with billing of incoming… Read Full Article

The term Internet of things (often abbreviated to IoT) is used to describe everyday objects that are connected to the Internet and are able to collect and transfer data automatically, without the need for human interaction. The Internet of things… Read Full Article

A company that provides Internet access and other related services to individuals and organizations. In addition to broadband or dialup connections, ISPs can offer: hosting domain name registration virtual server leasing and other services

The unique address of a computer or other device online. An IP address consists of several groups of numeric (IPv4) or alphanumeric (IPv6) characters. A public or external IP address identifies hardware connected to the Internet. An internal address is… Read Full Article

An intrusion prevention system (IPS) is a program or device for detecting and blocking suspicious activity on a network or individual computer. Read Full Article

The fourth version of the Internet Protocol, used to transfer data between devices online. It defines the IP address format and the structure of packets, or standard blocks of information. IPv4 addresses are written in the form of four values… Read Full Article

An improved version of IPv4 for the transfer of information between devices in local and global networks. Its 128-bit identifier gives IPv6 a larger address space. IPv6 addresses consist of eight groups of characters, separated by a colon. The format… Read Full Article

An incident response platform (IRP) is an automated cybersecurity system for responding to incidents. Read Full Article

A computer protocol for transmitting SCSI commands over TCP/IP. iSCSI is used to create distributed data storage systems and dynamically connect additional disk space to the server. The storage can be located at a considerable distance from the server and… Read Full Article