Glossary 309 if-statement: the typical conditional statement keyword (2) in-depth: reusing one-time pad keystream characters (7) incident response: measures taken after a cyber incident to contain the damage, determine what happened, and recover (5) incriminate: to provide evidence of a crime (10) indemnify: to compensate for a loss (5) indicators of compromise (IOCs): detectable evidence that indicate a device has been compromised (4) influencing: the final step in a social engineering attack (4) information superhighway: a nickname for the Internet (2) information-theoretic secure: a cryptographic scheme that reveals no information about the plaintext and is therefore impervious to cryptanalysis and brute-force key search attacks (7) initialization vector (IV): the first block used in cipher block chaining (7) injection attack: an attack where hackers provide code as user input and trick the target computer into executing their input (4) input/output (I/O) devices: devices for interacting with a computer (2) insider threat: a person that works for the organization they attack (3) insult rate: the probability of false negatives for a biometric authentication method (8) insurance policy: a contract stating what is covered by the insurance agency and under what circumstances (5) integrity: preventing, or at least detecting, the unauthorized writing of data (4) intellectual property (IP): proprietary information that provides a competitive advantage to an organization (3) interdependent choices: the outcome for each player depends in part on the choices made by the other players (6) interdiction: a supply chain attack where hardware is intercepted in route to the target and compromised before it is delivered (4) International Humanitarian Law (IHL): another name for jus in bello (10) International Traffic in Arms Regulations (ITAR): a regulation that prohibits exporting technologies that provide a military advantage to the United States (10) Internet (the Net): the network of networks that became the global computer network (2) Internet Engineering Task Force (IETF): the group that manages the Internet’s protocols (2) Internet of Things: devices not normally thought of as computers that connect to the Internet (2)
RkJQdWJsaXNoZXIy MTM4ODY=