Information Systems Security Product –
Item (chip, module, assembly, or equipment), technique, or service that performs or relates to information systems security.
Information Technology –
Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency. For purposes of the preceding sentence, equipment is used by an executive agency if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency which— 1) requires the use of such equipment; or 2) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources.
Information Type –
A specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management), defined by an organization or in some instances, by a specific law, Executive Order, directive, policy, or regulation.
Information Value –
A qualitative measure of the importance of the information based upon factors such as: level of robustness of the Information Assurance controls allocated to the protection of information based upon: mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other countries, perishability/longevity of the information (e.g., short life data versus long life intelligence source data), and potential impact of loss of confidentiality and integrity and/or availability of the information.
Initialization Vector (IV) –
A vector used in defining the starting point of an encryption process within a cryptographic algorithm.
Initialize –
Setting the state of a cryptographic logic prior to key generation, encryption, or other operating mode.
Initiator –
The entity that initiates an authentication exchange.
Inside Threat –
An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.
Inside(r) Threat –
An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service.
Inspectable Space –
Three dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and remove a potential TEMPEST exploitation exists. Synonymous with zone of control.
Integrity –
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Integrity –
The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. The property whereby an entity has not been modified in an unauthorized manner.
Integrity Check Value –
Checksum capable of detecting modification of an information system.
Intellectual Property –
Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation. Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.
Interconnection Security Agreement (ISA) –
An agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection. The ISA also supports a Memorandum of Understanding or Agreement (MOU/A) between the organizations. A document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities. It includes a variety of descriptive, technical, procedural, and planning information. It is usually preceded by a formal MOA/MOU that defines high-level roles and responsibilities in management of a cross-domain connection.
Interface –
Common boundary between independent systems or modules where interactions take place.
Interface Control Document –
Technical document describing interface controls and identifying the authorities and responsibilities for ensuring the operation of such controls. This document is baselined during the preliminary design review and is maintained throughout the information system life cycle.
Interim Approval to Operate – (IATO)
Temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system. (To be replaced by ATO and POA&M)
Interim Approval to Test (IATT) –
Temporary authorization to test an information system in a specified operational information environment within the time frame and under the conditions or constraints enumerated in the written authorization.
Intermediate Certification Authority (CA) –
A Certification Authority that is subordinate to another CA, and has a CA subordinate to itself.