loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  (Next)
  ALL

I

Identity and Access Management (IAM)

A framework for managing users, roles, permissions, and authentication mechanisms within cloud environments. IAM enforces least privilege and access control policies.

IEC 61850

IEC 61850 is a standard communication protocol for electrical substations, used to ensure interoperability between devices and systems in the power grid, particularly for monitoring, protection, and control applications in ICS environments.

IEC 62443

IEC 62443 is a series of international standards that provide guidelines for the security of Industrial Automation and Control Systems (IACS). It covers security policies, procedures, and technologies for protecting ICS from cyber threats.

IMEI (International Mobile Equipment Identity)

A unique identifier assigned to many cellular devices. IMEI data can appear in provider records and device diagnostics and may help link a SIM/account to a specific handset when combined with other evidence.

Immutable

A property describing data that cannot be altered without detection once recorded and confirmed on a blockchain.

Incident Response (IR)

A structured approach to managing and investigating cybersecurity events. In a law enforcement context, IR concepts (containment, eradication, recovery, logging) can overlap with criminal investigation steps when evidence collection and chain of custody are required.

Inculpatory Evidence

Evidence that supports the conclusion that a person committed an offense. In digital investigations, this can include authenticated messages, device artifacts showing creation/possession, login records, file transfers, or coordinated activity across accounts and devices.

Indicator of Compromise (IOC)

A data point associated with malicious activity, such as a file hash, domain, IP, registry key, mutex name, or process behavior. IOCs guide searches and detections but typically require corroboration to prove criminal responsibility.

Industrial Control Systems (ICS)

Industrial Control Systems (ICS) are integrated hardware and software systems used to monitor and control industrial processes, such as manufacturing, energy production, water treatment, and more. These systems often include SCADA, DCS, and PLC components.

Industrial Cybersecurity

Industrial Cybersecurity refers to the practice of protecting ICS, IIoT, SCADA, and other industrial systems from cyber threats, ensuring the integrity, availability, and confidentiality of critical infrastructure and operations.


Page:  1  2  3  4  (Next)
  ALL