Skip to main content

ImprintPages

What is ImpressPages? ImpressPages is a content management system, which is primarily based on the drag and drop principle. It was developed as Open Source and can be used free of charge. ImpressPages is especially known for its simple and extremely user-friendly operation. The main focus is on the...

In-Page Video Ad

What is an In-Page Video Ad? An In-Page Video Ad is a visual online advertising format in video form, based on the classic TV commercial. Unlike In-Stream Video Ads, which are shown during a live stream or other video, In-Page Video Ads are firmly embedded in a web page....

Inblogtitle

What does Inblogtitel mean? Typically, Google users use simple search to find specific phrases or keywords. As a result, these searches can take a lot of time, as the search engine displays many irrelevant search results, such as advertisements. The search operator Inblogtitle helps to make this search much...

Inbound link

What is an inbound link? Links are important for a modern website. They not only serve to inform the visitors of an internet presence, but are also rewarded by Google with an optimal ranking because they offer the users a real added value. “Inbound” in this context means “coming...

Indexation

Search engines index homepages to see how relevant they are for certain search queries, but how do Google, Bing and Co. do it? After a homepage or blog is finished, indexing is the first step before the SERPs, i.e. the pages of the search results. How does the so-called...

Indexed web pages

What are indexed web pages? Indexed web pages are web pages that have been included in the database of a search engine. If the web pages are part of a keyword catalogue (index), they are usually referred to as indexed web pages. How can you identify indexed websites? There...

Indicators of Compromise (IoCs)

Indicators of Compromise (IoCs) are specific data artifacts or other characteristics that indicate that a system has been compromised. They are usually grouped together in a list that can be read and completed by security software such as an antivirus program or firewall. Typical indicators include unusual network traffic,...

Industrial Control System (ICS)

Industrial Control System (ICS) is a term that generally describes different control systems as well as the corresponding instruments. Industrial Control System (ICS) are generally used for industrial control of the processes. They are small modular control systems for control panels or enormous interactive...

Infinity Scrolling

Infinity Scrolling (Infinite Scrolling), which means “infinite scrolling” in German, is a special technique from the field of web design. The visitor never reaches the end of a web page: If he scrolls down, new content is automatically loaded at the same time. The website keeps growing and seems...

Information infrastructure

The term “information infrastructure” is used to describe all organizational structures that relate to the standardized handling of information. As an infrastructure system, it is one of the fundamental infrastructure systems of a society, along with other systems such as telecommunications and the energy network. But a well-designed information...

Information Leakage Prevention

Description Information Leakage Prevention is a data loss prevention software. The software detects and prevents potential data breaches or data exfiltration transfers by monitoring, detecting and blocking sensitive data in use (endpoint actions), in motion (network traffic) and at rest (data storage). It is a marketing (information security) term....

Information On Demand

The term “Information On Demand” (IOD) is of English origin and translated into German means something like “information on demand”. In concrete terms, this means that information of various kinds can be provided and consumed for companies, organizations, customers and employees whenever it is needed. General information about Information...

Information Security

What does information security mean? Information security is understood to be the guarantee of the security of information technology systems and the data stored on them. This means that both the functionality of the systems is to be ensured and data is to be protected against unauthorized access. What...

Injection Attacks

What are injection attacks? Injection attacks are an effective type of cyber attack that exploits common vulnerabilities in Web applications. Injection attacks are primarily implemented as SQL attacks on database systems and represent a serious problem for database security. By loading the video, you agree to YouTube’s privacy policy.Learn...

Inode

What is an inode? The term inode is composed of the terms index and node. In the index, the table of contents, the administration of files is done with nodes, the inodes, in some file systems. These are entries. They hold the necessary metadata and the location of the...

Inpost title

What is an Inposttitle? An inposttitle is used in the context of search engine optimization and enables the content of websites to be better identified. An inposttitle can be compared to the signs on a house, which can be used to get a quick overview of the shops located...

Inside offender

What’s an inside man? Cybercriminals are usually the focus of attention when companies invest in their IT security. The attackers do not necessarily have to come from outside. Attackers who carry out their attacks within a company are referred to as internal criminals. These persons have already been inside...

IP cloaking

What is IP cloaking? IP cloaking, also known as “cloaking” or “IP delivery”, is a cloaking technique for search engine optimization (SEO). Crawlers (spiders of search engines) assign the website – despite the same URL – different content than human visitors. What is cloaking for? Cloaking allows websites to...

IP spoofing

What does IP spoofing mean? IP spoofing is the manipulation of the origin address of a data packet in network traffic. Addressing on the Internet is based on the standards of the Internet Protocol (IP). The data packets are switched on the basis of the IP addresses specified there....

IS Management Team

What is an IS management team? According to the BSI Standard 100-2 (IT – Basic Protection Procedure), the IS Management Team is the group of people who are responsible for the processes of maintaining information security in a larger institution. Who are the members of an IS Management Team?...

ISDN

What does ISDN mean? ISDN is the abbreviation for “Integrated Services Digital Network” or “Integrated Voice and Data Network”. It is a standard for digital telecommunication via telephone lines introduced in the late 1980s which replaced the old, analogue telephone network after about 100 years. Digital connection technology enables...

ISDN (Integrated Services Digital Network)

What does ISDN (Integrated Services Digital Network) mean? ISDN is the abbreviation for “Integrated Services Digital Network” or “Integrated Voice and Data Network”. It is a standard for digital telecommunication via telephone lines introduced in the late 1980s which replaced the old, analogue telephone network after about 100 years....

IT Security

What does IT security mean? IT security concerns information security in digital systems. This typically means preventing or at least reducing the probability of unauthorized access to information in IT systems. By loading the video, you agree to YouTube’s privacy policy.Learn more Load video Always unblock YouTube Risk Management...

IT Security Act

What is the IT security law? The IT Security Act of the Federal Office for Information Security (BSI – https://www.bsi.bund.de/) serves to protect so-called critical infrastructures in Germany. It came into force in 2015 with the aim of increasing the security of information technology systems of infrastructures that have...

IT Security Officer

What is an IT security officer? Two thirds of all German companies are exposed to cyber attacks every year. A company’s own IT security officer is responsible for ensuring that the company’s IT is secure on the network. Tasks of an IT security officer What does an IT security...

IT-Grundschutz

What is the basic IT protection? The IT-Grundschutz of the Federal Office for Information Security (BSI) is a methodology for identifying and implementing IT security measures in an organization. The aim is to establish an appropriate level of security for IT systems. To achieve this goal, the BSI recommends...

IT-Grundschutz Analysis

What is an IT-Grundschutz analysis? An IT-Grundschutz analysis takes place within the framework of IT-Grundschutz. This consists of a compilation of IT security measures for companies and authorities, which is published by the Federal Office for Information Security (BSI – https://www.bsi.bund.de/). By loading the video, you agree to YouTube’s...

IVW (Informationsgemeinschaft zur Feststellung der Verbreitung von Werbeträgern e.V.)

The IVW (Informationsgemeinschaft zur Feststellung der Verbreitung von Werbeträgern e.V.), based in Berlin, is a governmentally and economically independent testing institution that provides data on the marketing of media as advertising media and tests the distribution of advertising media. Reasons for the foundation The IVW has existed since 1949...