Cybersecurity Lexicon by Luis Ayala
Author:Luis Ayala
Language: eng
Format: epub
Publisher: Apress, Berkeley, CA
Network-based IDS detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment. SOURCE: SP 800-36; CNSSI-4009
intrusion prevention system (IPS): System(s) detect an intrusive activity and can attempt to stop the activity, ideally before it reaches its targets. SOURCE: SP 800-36; CNSSI-4009
investigation: A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence. SOURCE: NICCS
I/O brick: A PLC storage system that handles a huge amount of I/O requests from machines and desktops.
IP camera cyber-attack: Hack into a BCS through an IP camera as the attack vector.
IP-controlled device: An intelligent electronic device that can be controlled over the Internet. So, an IP controlled rack-mount power controller allows remote access, real-time monitoring and customer management from a phone, computer, or tablet. Such a device would be useful to reboot a server, but this represents a huge security risk. I don’t recommend these if you want a secure building.
IP-enabled door lock: A door lock that allows a user to control and manage building access with a smartphone or tablet using a web app. Some smart locks notify when certain people enter or leave, and they can be customized for exactly how long a particular individual will have access, what days or even between what hours. Some smart locks have a built-in camera that takes a photo of the person who activates the lock. The security issues are too numerous to mention here.
IP forwarding: Also known as Internet routing is a process used to determine which path a packet or datagram can be sent. The process uses routing information to make decisions and is designed to send a packet over multiple networks. Generally, networks are separated from each other by routers.
IP flood attack: A denial-of-service attack that sends a host more “ping” packets than the protocol can handle.
IP masquerading (IPMASQ): Network address translation (NAT) that allows internal computers that don’t have an officially assigned IP address to communicate to other networks and the Internet. It allows one machine to act on behalf of other machines. Also called MASQ.
I/Os per second (IOPS): A measure of performance for a host-attached storage device or RAID controller.
islanding: Islanding refers to the condition in which a distributed generator (DG) continues to power a location even though electrical grid power from the electric utility is no longer present. Islanding can be dangerous to utility workers, who may not realize that a circuit is still powered, and it may prevent automatic reconnection of devices. For that reason, distributed generators must detect islanding and immediately stop producing power the commercial power is restored; this is referred to as anti-islanding.
isolation valve: A valve in a fluid handling system that stops the flow of process media to a given location, usually for maintenance or safety purposes.
IT manager: The individual responsible for the information system infrastructure related to the ICS.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7704)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6612)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6601)
Running Windows Containers on AWS by Marcio Morales(6129)
Kotlin in Action by Dmitry Jemerov(5072)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4940)
Combating Crime on the Dark Web by Nearchos Nearchou(4522)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4421)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4380)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4192)
The Age of Surveillance Capitalism by Shoshana Zuboff(3961)
Python for Security and Networking - Third Edition by José Manuel Ortega(3764)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3513)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3429)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Wireshark by Lisa Bock(3305)
