Skip to main content



Information architecture


Identity analytics


Identity Management (IdM), also known as Identity & Access Management


Industrial Control System


Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) which is part of the Cybersecurity and Infrastructure Security Agency (CISA).


Information and Communications Technology

ICT equipment

Any device that can process, store or communicate electronic information (e.g. computers, multifunction devices, mobile phones, digital cameras, electronic storage media and other radio devices).

ICT system

A related set of hardware and software used for the processing, storage or communication of information and the governance framework in which it operates.


IDCARE is Australia and New Zealand’s national identity and cyber support service. IDCARE offer free phone consultations and advice from specialised identity and cyber security counsellors.

Identity Analytics

The process of analysing the access of individuals or systems to an organisations IT resources.

Identity Management, also known as Identity & Access Management

Identity and access management is the process used in businesses and organisations to grant or deny employees and others authorisation to secure systems.

Identity theft

Where a victim’s personal details are stolen and used to perpetrate crime – commonly fraud. Identity theft is a serious crime and can result in long term and far-reaching negative consequences for victims.


Identity Management, also known as Identity & Access Management (IAM)


Internet Engineering Task Force


Internet Key Exchange

Impersonation Attack

Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

Impersonation scam

An impersonation scam is a scam where a dishonest individual will try to convince you to make a payment, give personal or financial details by claiming to be from a trusted organisation.

In the wild

Describes malware found in operation on the internet that infects and affects users' computers. This is opposed to malware seen only in internal test environments or malware collections.


An incident is an event that is not part of normal operations that disrupts operational processes.

Incident Response Plan

A plan for responding to cyber security incidents.

Industrial Control Systems

A collective term describing control systems and associated instrumentation used to efficiently operate and/or automate industrial processes. ICS include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).

Information and Communication Technology

Information and communications technology is an extensible term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as well as necessary enterprise software, middleware, storage, and audio-visual systems, that enable users to access, store, transmit, and manipulate information.

Information Communications Technology equipment

Any device that can process, store or communicate electronic information—for example, computers, multifunction devices and copiers, landline and mobile phones, digital cameras, electronic storage media and other radio devices.

Information security

The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.

Information Security Registered Assessors Program

An initiative of the ACSC designed to register suitably qualified individuals to carry out security assessments for systems.

Infrared device

Devices such as mice, keyboards and pointing devices that have an infrared communications capability.


Instagram is an American photo and video sharing social networking service owned by Facebook, Inc.

Install updates

The process of establishing the update into the system.


The assurance that information has been created, amended or deleted only by authorised individuals.

Intellectual property

Intellectual property is the property of your mind or proprietary knowledge.


The back and forth dialog between the user and the computer.

International SEO

International SEO is the process of optimizing your website so that search engines can easily identify which countries you want to target and which languages you use for business.

International Telecommunication Union

The International Telecommunication Union (ITU), originally the International Telegraph Union, is a specialised agency of the United Nations that is responsible for issues that concern information and communication technologies. It is the oldest global international organisation.

International Travel

Travel outside of Australia.


The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.

Internet Explorer

Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems.

Internet of Things

The network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to connect to the internet and collect and exchange data.

Internet Protocol Security

A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.

Internet Protocol telephony

The transport of telephone calls over IP networks.

Internet Protocol version 6

A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.

Internet Security Association Key Management Protocol aggressive mode

A protocol that uses half the exchanges of main mode to establish an IPsec connection.

Internet Security Association Key Management Protocol main mode

A protocol that offers optimal security using six packets to establish an IPsec connection.

Internet Service Provider

A company that provides subscribers with access to the internet.

Intrusion Detection System

An automated system used to identify an infringement of security policy. IDS can be host-based or network-based.


Internet of Things


Internet Protocol

IP Address

Also known as an “IP number” or simply an “IP”, short for Internet Protocol. A code made up of a string of numbers that identifies a particular computer on the Internet. Every computer requires an IP address to connect to the Internet.


Internet Protocol Security


Internet Protocol version 4


Internet Protocol version 6


Information Security Registered Assessors Program


Internet Security Association Key Management Protocol


Australian Government Information Security Manual


International Organisation for Standardisation


Internet Service Provider


International Telecommunications Union



iMac is a family of all-in-one Macintosh desktop computers designed and built by Apple Inc.


iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone, and iPod Touch; it also powered the iPad prior to the introduction of iPadOS in 2019.


iPad is a line of tablet computers designed, developed and marketed by Apple Inc.


iPadOS is an operating system developed by Apple for the iPad family of devices.


iPhone is a smartphone made by Apple that combines a computer, iPod, digital camera and cellular phone into one device with a touchscreen interface.


The iPod is a line of portable media players and multi-purpose pocket computers designed and marketed by Apple Inc.


iTunes, developed by Apple Inc., is a media player, media library, internet radio broadcaster, mobile device management utility, and the client app for the iTunes Store. 

It is used to purchase, play, download, and organise digital multimedia, on personal computers running the macOS and Windows operating systems (in 2019, Apple announced that iTunes in macOS Catalina would be replaced by separate apps, namely Music, Podcasts, and TV. Finder would take over the device management capabilities).


iView is a video on demand and catch up TV service run by the Australian Broadcasting Corporation.