Glossary I
Identification-and-authentication

IA

Identification and AuthenticationIdentification and Authentication (NIST SP 800-53 security control family) Information Assurance Measures that protect and defend information and information systems by ensuring ...

Read More

Identifiable-person

Identifiable Person

One who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his ...

Read More

Identification

Identification

The process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items. See CNSSI ...

Read More

Identified-information

Identified Information

Information that explicitly identifies an individual  See NISTIR 8053 for more information. 

Read More

Identifier

Identifier

Unique data used to represent a person’s identity and associated attributes. A name or a card number are examples of identifiers. See NIST SP 800-79-2 under Identifier and  NIST SP ...

Read More

Identity

Identity

The set of physical and behavioral characteristics by which an individual is uniquely recognizable. See FIPS 201 under Identity [Withdrawn] and  NIST SP 800-79-2 under Identity for more information. A set ...

Read More

Identity Assurance Level (IAL)

Identity Assurance Level (IAL)

A category that conveys the degree of confidence that the applicant’s claimed identity is their real identity. See NIST SP 800-63-3 for more information. 

Read More

Identity-Provider

Identity Provider (IdP)

The party that manages the subscriber’s primary authentication credentials and issues assertions derived from those credentials. This is commonly the CSP as discussed within this ...

Read More

Identity Registration

Identity Registration

The process of making a person’s identity known to the personal identity verification (PIV) system, associating a unique identifier with that identity, and collecting and ...

Read More

Identity prooofing

Identity Proofing

Verifying the claimed identity of an applicant by authenticating the identity source documents provided by the applicant.  See NIST SP 800-79-2 for more information. The process by which a ...

Read More

Identity Token

Identity Token

Smart card, metal key, or other physical object used to authenticate identity. See CNSSI 4009-2015 for more information. 

Read More

Identity-Verification-1

Identity Verification

The process of testing the media to ensure the information cannot be read. See NIST SP 800-88 Rev. 1 under Verification for more information. Confirmation, through the provision of objective ...

Read More

IMPACT

Impact

The effect on organizational operations, organizational assets, individuals, other organizations, or the Nation (including the national security interests of the United States) of a loss ...

Read More

IMAP

IMAP

Internet Message Access ProtocolInternet Message Access Protocol Mail Delivery AgentA method of communication used to read electronic messages stored in a remote server. See NISTIR ...

Read More

IMEI

IMEI

International Mobile Equipment IdentifierInternational Mobile Equipment IdentityA unique number programmed into GSM and UMTS mobile phones.See NISTIR 7250 and  NISTIR 7387 under International Mobile Equipment Identity for more ...

Read More

Impact Value

Impact Value

The assessed potential impact resulting from a compromise of the confidentiality, integrity, or availability of information expressed as a value of low, moderate ...

Read More

Incident Response Plan

Incident Response Plan

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against ...

Read More

Integrity

Integrity

Integrity provides assurances that data has not changed. This includes ensuring that no one has modified, tampered with, or corrupted the data. Ideally, only authorized ...

Read More