Glossary
Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
IBM i
IBM operating system (also known as iSeries, AS/400). For more details on IBM i terms visit the IBM online glossary.
identity and access management (IAM)
The policies, programs, and technologies that reduce identity-related access risks within a business by managing digital identities and user access to data, systems, and resources.
incident response plan (IRP)
An Incident Response Plan is a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.
indicators of compromise (IOC)
Pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.
information rights management (IRM)
Information rights management is a subset of digital rights management technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or enterprise digital rights.
infrastructure as a service (IaaS)
A form of cloud computing that provides virtual computing resources such as storage, networking, and other capabilities over the internet.
infrastructure protection (IP)
Infrastructure protection pertains to the security of critical business application infrastructure and protecting technology, systems, and business assets. Infrastructure protection (IP) is also used internally in Fortra to define the IT Infrastructure Protection business unit encompassing Fortra's Core Security, Cobalt Strike, Digital Defense, Beyond Security, and Outflank product lines.
internal penetration testing (IPT)
An internal network pen test is performed to help gauge what an attacker could achieve with initial access to a network. An internal network pen test can mirror insider threats, such as employees intentionally or unintentionally performing malicious actions.
International Traffic in Arms Regulations (ITAR)
The U.S. regulation that requires companies that manufacture, sell, or distribute defense articles or services to comply with the regulations as defined in the United States Munitions List (USML). The goal is to restrict and control the export of military technologies.
internet of things (IoT)
The network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.
intrusion detection and prevention
Intrusion detection and intrusion prevention. Intrusion detection and prevention are two broad terms describing application security practices used to mitigate attacks and block new threats. The first is a reactive measure that identifies and mitigates ongoing attacks using an intrusion detection system.
intrusion detection system (IDS)
An IDS, also known as an intrusion detection system, is a software or physical device that monitors activity to detect any signs of unauthorized access. When it detects a potential intrusion, it alerts a central security system that keeps track of security events and information.
intrusion prevention system (IPS)
Intrusion prevention systems are network security solutions that examine a network for illegitimate access. If it discovers a possible intrusion, it prevents the intruder from moving further into the network or removes them completely. Intrusion prevention systems can come in the form of physical devices or software applications. They are also referred to as IPS.