АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ (key compromise) Impersonation resistanceICT securityICТ security policyID CWEID tokenIdeal random sequenceIdeal secret sharing schemeIdentifiabilityIdentificationIdentification and authentication (I&A)Identification protocolIdentification schemeIdentification systemIdentification transactionIdentifierIdentityIdentityIdentity and access management (IAM)Identity awarenessIdentity based encryptionIdentity governance and administration (IGA)Identity management (IdM)Identity threat detection and respons (IDTR)Identity-based cryptosystemIllegal accessImitationImitation resistanceImpartialityImpersonationImplicit key authenticationImplicit key authentication from entity A to entity BImputationIncidentIncident responseIncident response platform (IRP)Indicator of compromise (IoC)Industrial internetIndustrial internetIndustrial internet of things (IIoT)Industrial internet of things (IIoT)InferenceInformalInformationInformation and communication system (ICS)Information and communication technology (ICT)Information assetsInformation assets confidentialityInformation assets integrityInformation assurance (IA)Information availability, accessibilityInformation disseminationInformation environmentInformation flow controlInformation for useInformation hidingInformation infrastructureInformation integrity violationInformation leakage channelInformation lossInformation modelInformation objectInformation objectsInformation operationInformation ownerInformation processInformation processingInformation processing facility(ies)Information processing systemInformation protection and control (IPC)Information protection measureInformation resourceInformation rights management (IRM)Information risk assessmentInformation securityInformation security conceptInformation security eventInformation security incidentInformation security intruder modelInformation security measureInformation security monitoringInformation security operation center (ISOC)Information security resourceInformation security tasksInformation security threatInformation security vulnerabilityInformation spaceInformation sphereInformation systemInformation system security (INFOSEC)Information targetInformation technical protection facilityInformation technologyInformation technology security evaluation criteriaInformation warInformation weaponInformation with restricted accessInformation-telecommunication systemInformation-theoretic (Shannon) securityInformatizationInfrastructureIngress filteringInitialization vectorInjection flawsInput variableInsecurity channelInside adversaryInside intrusionInsiderInstanceInteger factoring problemIntegrityIntegrityIntegrity protection algorithmIntegrity protection, protection from imitation, imitation protectionIntegrity system, symmetric data authentication cryptosystemInteractive authenticationInteractive proofInteractive protocolInterdiction free functionIntermediate biometric sampleInternational cyber crimeInternet fraudInternet of things (IoT)Intruder modelIntrusionIntrusion detectionIntrusion detection system (IDS)Intrusion prevention system (IPS)Involutive encryption algorithmIoT deviceIoT systemIP address spoofingIsolated communication networksIterative encryption algorithm