Cybersecurity Lexicon by Luis Ayala

Cybersecurity Lexicon by Luis Ayala

Author:Luis Ayala
Language: eng
Format: epub
Publisher: Apress, Berkeley, CA


Network-based IDS detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment. SOURCE: SP 800-36; CNSSI-4009

intrusion prevention system (IPS): System(s) detect an intrusive activity and can attempt to stop the activity, ideally before it reaches its targets. SOURCE: SP 800-36; CNSSI-4009

investigation: A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence. SOURCE: NICCS

I/O brick: A PLC storage system that handles a huge amount of I/O requests from machines and desktops.

IP camera cyber-attack: Hack into a BCS through an IP camera as the attack vector.

IP-controlled device: An intelligent electronic device that can be controlled over the Internet. So, an IP controlled rack-mount power controller allows remote access, real-time monitoring and customer management from a phone, computer, or tablet. Such a device would be useful to reboot a server, but this represents a huge security risk. I don’t recommend these if you want a secure building.

IP-enabled door lock: A door lock that allows a user to control and manage building access with a smartphone or tablet using a web app. Some smart locks notify when certain people enter or leave, and they can be customized for exactly how long a particular individual will have access, what days or even between what hours. Some smart locks have a built-in camera that takes a photo of the person who activates the lock. The security issues are too numerous to mention here.

IP forwarding: Also known as Internet routing is a process used to determine which path a packet or datagram can be sent. The process uses routing information to make decisions and is designed to send a packet over multiple networks. Generally, networks are separated from each other by routers.

IP flood attack: A denial-of-service attack that sends a host more “ping” packets than the protocol can handle.

IP masquerading (IPMASQ): Network address translation (NAT) that allows internal computers that don’t have an officially assigned IP address to communicate to other networks and the Internet. It allows one machine to act on behalf of other machines. Also called MASQ.

I/Os per second (IOPS): A measure of performance for a host-attached storage device or RAID controller.

islanding: Islanding refers to the condition in which a distributed generator (DG) continues to power a location even though electrical grid power from the electric utility is no longer present. Islanding can be dangerous to utility workers, who may not realize that a circuit is still powered, and it may prevent automatic reconnection of devices. For that reason, distributed generators must detect islanding and immediately stop producing power the commercial power is restored; this is referred to as anti-islanding.

isolation valve: A valve in a fluid handling system that stops the flow of process media to a given location, usually for maintenance or safety purposes.

IT manager: The individual responsible for the information system infrastructure related to the ICS.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.