Skip to main content
A B C D E F G H I J K L M N O P Q R S T U V W X Z

I

IA

Information architecture

IA

Identity analytics

IAM

Identity and Access Management, also called Identity Management (IdM).

ICS

Industrial Control System

ICS-CERT

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), which is part of the US Cybersecurity and Infrastructure Security Agency (CISA).

ICT

Information and Communications Technology

ICT equipment

Any device that can process, store or communicate electronic information (e.g. computers, multifunction devices, mobile phones, digital cameras, electronic storage media and other radio devices).

ICT system

A related set of hardware and software used for processing, storing or communicating information, as well as the governance framework in which it operates.

IDCARE

Australia and New Zealand’s national identity and cyber support service. IDCARE offers free phone consultations and advice from specialised identity and cyber security counsellors.

Identity analytics

The process of analysing the access of individuals or systems to an organisation's IT resources.

Identity Management (IdM)

The process used in businesses and organisations to grant or deny employees and others authorisation to secure systems. Also known as Identity and Access Management (IAM).

Identity theft

When a victim’s personal details are stolen and used to perpetrate crime, commonly fraud. Identity theft is a serious crime and can result in long-term and far-reaching negative consequences for victims.

IdM

Identity Management, also known as Identity and Access Management (IAM)

IETF

Internet Engineering Task Force

IKE

Internet Key Exchange

Impersonation attack

Emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data.

Impersonation scam

A scam where a dishonest individual will try to convince you to make a payment or give personal or financial details by claiming to be from a trusted organisation.

In the wild

Malware operating on the internet that infects and affects users' computers. This is opposed to malware seen only in internal test environments or malware collections.

Incident

An event that is not part of normal operations that disrupts operational processes.

Incident Response Plan

A plan for responding to cyber security incidents.

Industrial Control Systems

Control systems and associated instrumentation used to efficiently operate and/or automate industrial processes. Industrial Control Systems include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC).

Information and communications technology (ICT)

An extensible term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as well as related enterprise software, middleware, storage and audio-visual systems, that enable users to access, store, transmit and manipulate information.

Information and communications technology (ICT) equipment

Any device that can process, store or communicate electronic information—for example, computers, multifunction devices and copiers, landline and mobile phones, digital cameras, electronic storage media and other radio devices.

Information security (INFOSEC)

The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.

Information Security Registered Assessors Program (IRAP)

An ACSC program that registers suitably qualified individuals to carry out security assessments for systems.

Infrared device

Devices such as mice, keyboards and pointing devices that have an infrared communications capability.

Instagram

An American photo and video sharing social networking service owned by Facebook.

Install updates

The process of establishing the update into the system.

Integrity

The assurance that information has been created, amended or deleted only by authorised individuals.

Intellectual property

The property of your mind or proprietary knowledge. It can be an invention, trade mark, design, brand or the application of your idea.

Interactive

The back and forth dialog between the user and the computer.

International SEO

The process of optimising your website so that search engines can easily identify which countries you want to target and which languages you use for business.

International Telecommunication Union (ITU)

A specialised agency of the United Nations that is responsible for issues that concern information and communication technologies. It is the oldest global international organisation. Originally called the International Telegraph Union.

International travel

Travel outside of Australia.

Internet

The global system of interconnected computer networks that use standardised communication protocols to link devices and provide a variety of information and communication facilities.

Internet Explorer

A series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems for many years.

Internet of Things (IoT)

The network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors and network connectivity, which enables these objects to connect to the internet and collect and exchange data.

Internet Protocol Security (IPsec)

A suite of protocols for secure communications through authentication or encryption of Internet Protocol (IP) packets as well as including protocols for cryptographic key establishment.

Internet Protocol telephony

The transport of telephone calls over IP networks.

Internet Protocol version 6 (IPv6)

A protocol used for communicating over packet switched networks. Version 6 is the successor to version 4 which is widely used on the internet.

Internet Security Association Key Management Protocol aggressive mode

A protocol that uses half the exchanges of main mode to establish an IPsec connection.

Internet Security Association Key Management Protocol main mode

A protocol that offers optimal security using six packets to establish an IPsec connection.

Internet Service Provider (ISP)

A company that provides subscribers with access to the internet.

Intrusion Detection System

An automated system used to identify an infringement of security policy. IDS can be host-based or network-based.

IoT

Internet of Things

IP

Internet Protocol

IP address

A code made up of a string of numbers that identifies a particular computer or device on the internet. Every computer requires an IP address to connect to the internet. Also known as an 'IP number' or simply an 'IP', short for Internet Protocol.

IPsec

Internet Protocol Security

IPv4

Internet Protocol version 4

IPv6

Internet Protocol version 6

IRAP

Information Security Registered Assessors Program

ISAKMP

Internet Security Association Key Management Protocol

ISM

Australian Government Information Security Manual

ISO

International Organisation for Standardisation

ISP

Internet Service Provider

ITU

International Telecommunications Union

i

iMac

A family of all-in-one desktop computers designed and built by Apple Inc.

iOS

A mobile device operating system created and developed by Apple exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone and iPod Touch; it also powered the iPad prior to the introduction of iPadOS in 2019. Originally called iPhone OS.

iPad

A line of tablet computers designed, developed and marketed by Apple Inc.

iPadOS

An operating system developed by Apple for the iPad family of devices.

iPhone

A phone made by Apple that combines a computer, media player, digital camera and cellular phone into one device with a touchscreen interface.

iPod

A line of portable media players and multi-purpose pocket computers designed and marketed by Apple Inc.

iTunes

A media player, media library, internet radio broadcaster, mobile device management utility and the client app for the iTunes Store, developed by Apple. It is used to purchase, play, download and organise digital multimedia.

iView

A video-on-demand and catch-up TV service run by the Australian Broadcasting Corporation (ABC).