Skip to main content

ImpressPages

What is ImpressPages? ImpressPages is a content management system, which is primarily based on the drag and drop principle. It was developed as open source and can be used free of charge. ImpressPages is known mainly for its simple and extremely user-friendly operation. The main focus is on the...

In-Page Video Ad

What is a In-Page Video Ad? A In-Page Video Ad is a visual online advertising format in video form, based on the classic TV commercial. Unlike in-stream video ads, which are shown during a livestream or other video, In-Page Video Ads are permanently embedded in a web page. A...

Inblogtitle

What does inblog title mean? Usually, users at Google use the simple search to find certain phrases or keywords. As a result, these searches can take a lot of time because the search engine displays many irrelevant search results, such as switched advertisements. The search operator Inblogtitle helps to...

Inbound Link

What is a Inbound Link? Links are important for a modern website. They not only serve to inform the visitors of a website, but are also rewarded by Google with an optimal ranking, because they have to offer the users a real added value. “Inbound” in this context means...

Indexed websites

What are Indexed Web Pages? Indexed web pages are web pages that have been included in a search engine’s database. If the web pages are part of a keyword catalog (index), they are usually referred to as indexed web pages. How can you determine indexed web pages? There are...

Indexing

Search engines index homepages to see how relevant they are for certain search queries but how do Google, Bing and Co. go about it? After a homepage or a blog is finished, the indexing is done before it is shown in the SERPs, i.e. the pages of the search...

Indicators of Compromise (IoCs)

Indicators of Compromise (IoCs – indicators of compromise) are specific data artifacts or other characteristics that indicate that a system has been compromised. They are usually grouped together in a list that can be read and added to by security software such as an antivirus program or firewall. Typical...

Industrial Control System (ICS)

Industrial Control System (ICS) is a term that generally describes various control systems as well as the corresponding instruments. Industrial Control System (ICS) are generally used for industrial control of processes. They are Whether low modular or hugely interactive, they all receive data from the so-called remote sensors. These...

Infinity Scrolling

Infinity Scrolling (Infinite Scrolling) is a special technique from the field of web design, which means “infinite scrolling”. The visitor never reaches the end of a web page: If he scrolls down, new content is automatically loaded at the same time. The website keeps growing and seems endless. Alternatively,...

Information infrastructure

The term “information infrastructure” refers to all organizational structures that relate to the standardized handling of information. As an infrastructure system, it is one of the fundamental infrastructure systems of a society, along with other systems such as telecommunications and the energy network. But a well-designed information system also...

Information Leakage Prevention

Description Information Leakage Prevention is a data loss prevention software. The software detects and prevents potential data breaches or data exfiltration transfers by monitoring, detecting and blocking sensitive data in use (endpoint actions), in motion (network traffic) and at rest (data storage). It is a marketing (information security) term....

Information On Demand

The term “Information On Demand” (IOD) is of English origin and translated into German means something like “information on demand”. In concrete terms, this means that information of various kinds can be provided and consumed by companies, organisations, customers and employees whenever it is needed. General information about Information...

Information Security

What does information security mean? Information security means ensuring the security of information technology systems and the data stored on them. The functionality of the systems should be ensured and data should be protected from unauthorized access. What are the protection goals of information security? The protection goals are...

Injection attacks

What are injection attacks? Injection attacks are an effective type of cyberattack that exploit common vulnerabilities in web applications. Injection attacks are primarily implemented as SQL attacks against database systems and pose a serious problem for database security. By loading the video, you agree to YouTube’s privacy policy.Learn more...

Inode

What is a Inode? The term Inode is a combination of the terms index and node. In the index, the table of contents, the administration of files takes place with some file systems with nodes, the Inodes. These are entries. These are entries. They hold the necessary metadata and...

Inposttitle

What is a Inposttitle? A Inposttitle is used in the context of search engine optimisation and enables the content of websites to be identified more easily. A Inposttitle is comparable to the signage on a house, with the help of which you can quickly get an overview of the...

Inside Perpetrator

What’s an inside offender? Cybercriminals are usually the focus of attention when companies invest in their IT security. However, the attackers do not necessarily have to come from the outside. Internal perpetrators are attackers who carry out their attacks within a company. These people have already been inside the...

IP-Cloaking

What is IP-Cloaking? IP-Cloaking , also called “Cloaking” or “IP-Delivery”, is a cloaking technique for search engine optimization (SEO). Crawlers (spiders of the search engines) assign the website – despite the same URL – different content than human visitors. What is Cloaking used for ? Cloaking enables websites to...

IP-Spoofing

What does IP-Spoofing mean ? IP-Spoofing is the manipulation of the originating address of a data packet in network traffic. Addressing on the Internet is based on the Internet Protocol (IP) standards. The data packets are switched using the IP addresses specified there. How does IP-Spoofing work? Each data...

IS-Management-Team

What is a IS-Management-Team? According to the BSI Standard 100-2 (IT – Basic Protection Procedure), the IS-Management-Team is the association of persons who are responsible for the processes of maintaining information security in a larger institution. Who are the members of a IS-Management-Teams? The members of the IS-Management-Teams are...

ISDN (Integrated Services Digital Network)

What does ISDN (Integrated Services Digital Network) mean? ISDN is short for “Integrated Services Digital Network” or “Integrated Voice and Data Network”. It is a standard for digital telecommunications over telephone lines that was introduced in the late 1980s and replaced the old analogue telephone network after about 100...

IT baseline analysis

What is a basic IT protection analysis? An IT baseline protection analysis takes place within the framework of IT baseline protection. This consists of a compilation of IT security measures for companies and public authorities, which is published by the Federal Office for Information Security (BSI – https://www.bsi.bund.de/). By...

IT Security

What does IT security mean? IT security concerns the security of information in digital systems. This typically means preventing or at least reducing the probability of unauthorized access to information in IT systems. By loading the video, you agree to YouTube’s privacy policy.Learn more Load video Always unblock YouTube...

IT Security Act

What is the IT Security Act? The IT Security Act of the Federal Office for Information Security (BSI – https://www.bsi.bund.de/) serves to protect so-called critical infrastructures in Germany. It came into force in 2015 with the aim of increasing the security of information technology systems of infrastructures that have...

IT Security Officer

What is an IT security officer? Two thirds of all German companies are exposed to cyber attacks in a year. A company’s own IT security officer is responsible for securing the company’s IT in the network. Tasks of an IT security officer What does an IT security officer do?...

IT-Grundschutz

What is IT-Grundschutz? The IT-Grundschutz of the German Federal Office for Information Security (BSI) is a methodology for identifying and implementing IT security measures in an organisation. The aim is to establish an appropriate level of security for IT systems. To achieve this goal, the BSI recommends catalogues of...