All pages with prefix
Appearance
- In
- Inadvertent disclosure
- Incentive Mechanism
- Incident
- Incident Object Description Exchange Format
- Incident handling
- Incident response
- Incident response plan
- Incomplete Gamma Function
- Incremental testing
- Incs(X)
- Inculpatory Evidence
- Indefinite Delivery/Indefinite Quantity
- Independent
- Independent Basic Service Set
- Independent Qualified Reviewer
- Independent Regulatory Agency
- Independent and Identically Distributed
- Independent validation authority (IVA)
- Independent verification & validation (IV&V)
- Indications and Warnings
- Indicator
- Indicator of Compromise
- Indirect identifier
- Indirect prompt injection
- Indistinguishability under Adaptive Chosen-Ciphertext Attack
- Indistinguishability under Chosen-Ciphertext Attack
- Indistinguishability under Chosen-Plaintext Attack
- Individual
- Individual Privacy
- Individual accountability
- Individuals
- Industrial, Scientific, and Medical
- Industrial Automation and Control System
- Industrial Automation and Control Systems
- Industrial Control System Joint Working Group
- Industrial Internet Consortium
- Industrial Internet of Things
- Industrial Internet of Things Consortium
- Industrial Personal Computer
- Industrial Security
- Industrial control system (ICS)
- Industry IoT Consortium
- Inertial Measurement Units
- Inertial Navigation Systems
- Infeasible
- Infocomm Media Development Authority
- Information Access Division
- Information Assessment Methodology
- Information Assurance Manager
- Information Assurance Officer
- Information Assurance Technical Framework
- Information Assurance Technology Analysis Center
- Information Assurance Workforce System Architecture
- Information Centric Analytics
- Information Design Assurance Red Team
- Information Management Policy
- Information Relevant to Cybersecurity
- Information Resource Management
- Information Security Continuous Monitoring Target Network
- Information Security Management Systems
- Information Security Marketing
- Information Security Oversight Office
- Information Security Risk Management
- Information Security Testing
- Information Security and Privacy Advisory Board
- Information Set Decoding
- Information Sharing Architecture
- Information Sharing and Analysis Center
- Information Sharing and Analysis Organization
- Information System Administrator
- Information System Contingency Plan (ISCP)
- Information System Security Engineer
- Information System Security Engineering
- Information System Security Manager
- Information System User
- Information Systems Audit and Control Association
- Information Systems Security Program Manager
- Information Technology Asset Management
- Information Technology Infrastructure Library
- Information Technology Laboratory (of NIST)
- Information Technology Operation and Support
- Information and Communications Technology Risk Management
- Information and Communications Technology Risk Outcomes Framework
- Information and Technology
- Information and communications technology (ICT)
- Information assurance (IA)
- Information assurance (IA) professional
- Information assurance component (IAC)
- Information assurance vulnerability alert (IAVA)
- Information assurance vulnerability bulletin (IAVB)
- Information domain
- Information environment
- Information exchange
- Information exchange agreement
- Information flow control
- Information item
- Information leakage
- Information life cycle
- Information management
- Information object
- Information operations (IO)
- Information owner
- Information resources
- Information resources management (IRM)
- Information security
- Information security architect
- Information security architecture
- Information security continuous monitoring (ISCM)
- Information security continuous monitoring (ISCM) process
- Information security continuous monitoring (ISCM) program
- Information security continuous monitoring (ISCM) strategy
- Information security officer
- Information security policy
- Information security program plan
- Information security risk
- Information sharing environment (ISE)
- Information steward
- Information system-related security risks
- Information system boundary
- Information system component
- Information system component inventory
- Information system life cycle
- Information system owner (or program manager)
- Information system resilience
- Information system security officer
- Information system security plan
- Information system service
- Information systems security (INFOSEC)
- Information systems security (INFOSEC) boundary
- Information systems security manager (ISSM)
- Information technology product
- Information type
- Information value
- Informational label
- Informative Reference Developer
- Informative References
- Infra Red Data Association
- Infrared
- Infrastructure as a Service (IaaS)
- Infrastructure as code
- Ingress Filtering
- Ingress Protection
- Inherent Risk
- Inheritance
- Initial Analysis
- Initial Attestation Key
- Initial Boot Block
- Initial Device Identity
- Initial Privacy Assessment
- Initial Program Load
- Initialization Vector (IV)
- Injection
- Injection attack
- Input/Output Operations Per Second
- Input Block
- Input checking
- Insider
- Insider threat
- Insider threat program
- Inspectable space
- Inspection
- Inspector General
- Installation (as used herein)
- Installation (of keying material)
- Instant Messaging (IM)
- Instantiation of an RBG
- Institute for Defense Analyses
- Institute for Information Infrastructure Protection
- Institute for Operations Research and the Management Sciences
- Institute for Testing and Certification
- Institute of Electrical and Electronics Engineers
- Instruction Set Architecture
- Instruction Set Extension
- Instructional System Methodology
- Int(X)
- Integer Factorization Cryptography
- Integer Module Learning With Errors
- Integer to Byte String conversion routine
- Integrated Adaptive Cyber Defense
- Integrated CCI (controlled cryptographic items) component
- Integrated Circuit(s) Card Device
- Integrated Circuit Card
- Integrated Circuit Card ID (ICCID)
- Integrated Circuit Card Identification
- Integrated Circuit Chip
- Integrated Control and Safety Systems
- Integrated Development Environment
- Integrated Digital Enhanced Network (iDEN)
- Integrated Drive Electronics
- Integrated Risk Management
- Integrated circuit
- Integrating Data for Analysis, Anonymization, and Sharing
- Integrator
- Integrity Impact
- Integrity Key
- Integrity Measurement Architecture
- Integrity authentication
- Integrity check value
- Integrity of Ciphertexts
- Integrity protection
- Integrity verification
- Integrity violation
- Intel AES-NI
- Intel Advanced Encryption Standard New Instructions
- Intel CET
- Intel CIT
- Intel Cloud Integrity Technology
- Intel Control-Flow Enforcement Technology
- Intel MKTME
- Intel Multi-Key Total Memory Encryption
- Intel Security Libraries
- Intel Security Libraries for Data Center
- Intel TDX
- Intel TME
- Intel TPM
- Intel TSC
- Intel TXT
- Intel Total Memory Encryption
- Intel Transparent Supply Chain
- Intel Trust Domain Extensions
- Intel Trusted Execution Technology
- Intel Trusted Platform Module
- Intel VT
- Intel VT-d
- Intel VT-x
- Intel Virtualization Technology
- Intel Virtualization Technology for Directed I/O
- Intellectual property
- Intelligence
- Intelligence Advanced Research Projects Activity
- Intelligence Community Directive
- Intelligence Community Standard
- Intelligence activities
- Intelligence community (IC)
- Intelligent Transportation System Joint Program Office
- Intelligent Virtual Assistant
- Intended owner
- Intended signatory
- Inter-Enterprise Subsystem
- Inter-Integrated Circuit
- Inter-control Center Communications Protocol
- Inter-process Communication
- Inter-range Instrumentation Group Time Code
- Inter-range Instrumentation Group Time Code B
- InterNational Committee for Information Technology Standards
- InterPlanetary File System
- Inter Switch Link
- Interactive User
- Interactive application security testing
- Interagency Council on Standards Policy
- Interagency Council on Statistical Policy
- Interagency International Cybersecurity Standardization Working Group
- Interagency Working Group
- Interchangeable
- Interconnection
- Interconnection Service Agreement
- Interconnection security agreement (ISA)
- Interface
- Interface Capabilities
- Interface Configuration Utility
- Interface device
- Interference detection and mitigation
- Interim Approval to Operate
- Interim authorization to test (IATT)
- Interior Border Gateway Protocol
- Interior Gateway Protocol
- Intermediary Service
- Intermediate Certification Authority (CA)
- Intermediate Link Key
- Intermediate Long Term Key
- Intermittent ad-hoc connection
- Internal BGP
- Internal Border Gateway Protocol
- Internal Control
- Internal Gateway Protocol
- Internal Security Testing
- Internal State
- Internal Trusted Storage
- Internal assessment engagement
- Internal network
- Internal security controls
- International Association for Automation and Robotics in Construction
- International Association of Computer Investigative Specialists
- International Association of Privacy Professionals
- International Atomic Energy Agency
- International Atomic Time
- International Civil Aviation Organization
- International Council on Large Electric Systems
- International Council on Systems Engineering
- International Criminal Police Organization
- International Cryptographic Module Conference
- International Earth Rotation and Reference Systems Service
- International Electrotechnical Commission
- International Federation for Information Processing
- International Household Survey Network
- International Maritime Organization
- International Mobile Equipment Identifier
- International Mobile Equipment Identity (IMEI)
- International Mobile Subscriber Identity (IMSI)
- International Organization for Standardization
- International Organization for Standardization/International Electrotechnical Commission
- International Society of Automation
- International Telecommunication Union - Telecommunication
- International Terrestrial Reference Frame
- International Terrestrial Reference System
- International Traffic in Arms Regulation
- Internet Architecture Board
- Internet Assigned Number Authority
- Internet Assigned Numbers Authority
- Internet Control Message Protocol
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force (IETF)
- Internet Exchange Point
- Internet Fibre-Channel Protocol
- Internet Group Management Protocol
- Internet Information Server
- Internet Information Services
- Internet Infrastructure Protection
- Internet Key Exchange
- Internet Key Exchange (IKE)
- Internet Message Access Protocol (IMAP)
- Internet Number Resource
- Internet Protocol
- Internet Protocol (IP) addresses
- Internet Protocol Security
- Internet Protocol version
- Internet Protocol version 4
- Internet Protocol version 6
- Internet Relay Chat
- Internet Research Task Force
- Internet Router Discover Protocol
- Internet Routing Registry
- Internet Security Association and Key Management Protocol
- Internet Server Application Programming Interface
- Internet Service Provider
- Internet Small Computer Systems Interface
- Internet Storage Name Service
- Internet Systems Consortium
- Internet of Medical Things
- Internet of things
- Internetwork Operating System
- Internetwork Packet Exchange
- Interoperability
- Interoperability Test