АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ ICT securityICТ security policyIdeal random sequenceIdeal secret sharing schemeIdentificationIdentification and authentication (I&A)Identification protocolIdentification schemeIdentification systemIdentifierIdentityIdentityIdentity and access management (IAM)Identity awarenessIdentity based encryptionIdentity management (IdM)Illegal accessImitationImitation resistanceImplicit key authenticationIncidentInformalInformationInformation and communication system, ICSInformation and communication technology, ICTInformation assetsInformation assets confidentialityInformation assets integrityInformation assurance (IA)Information availability, accessibilityInformation disseminationInformation environmentInformation flow controlInformation hidingInformation infrastructureInformation integrity violationInformation leakage channelInformation lossInformation objectInformation objectsInformation OperationInformation ownerInformation processInformation processingInformation processing facility(ies)Information processing systemInformation protection and control (IPC)Information protection measureInformation resourceInformation rights management (IRM)Information risk assessmentInformation securityInformation security conceptInformation security eventInformation security incidentInformation security intruder modelInformation security measureInformation security monitoringInformation security operation center, ISOCInformation security resourceInformation security threatInformation security vulnerabilityInformation spaceInformation sphereInformation systemInformation system security (INFOSEC)Information targetInformation technical protection facilityInformation technologyInformation technology security evaluation criteriaInformation warInformation weaponInformation with restricted accessInformation-telecommunication systemInformation-theoretic (Shannon) securityInformatizationInfrastructureIngress filteringInitialization vectorInjection flawsInput variableInsecurity channelInside adversaryInside intrusionInsiderInteger factoring problemIntegrityIntegrity protection algorithmIntegrity protection, protection from imitationIntegrity systemInteractive authenticationInteractive proofInteractive protocolInterdiction free functionIntermediate biometric sampleInternational cyber crimeInternet fraudInternet of thingsIntruder modelIntrusionIntrusion detectionIntrusion detection system (IDS)Intrusion prevention system (IPS)Involutive encryption algorithmIP address spoofingIsolated communication networksIterative encryption algorithm