Short for Internal Hostile Structured, it is a threat defined by Symantec Corporation to mean an individual or group within an organization that is motivated to disrupt mission operations or exploit assets. An IHS threat is unlikely to act but has the greatest potential to cause damage. An example of an IHS threat might be a highly skilled, disgruntled employee who could benefit from disrupting operations.
Contrast with IHU (Internal Hostile Unstructured).
Short for Internal Hostile Unstructured, it is a threat defined by Symantec Corporation to mean an individual within an organization who has physical access to network components. An IHU threat might lack the skills to launch a sophisticated attack, and instead might deploy common viruses. Contrast with IHS (InternalHostile Structured).
(pronounced as separate letters) Short for Independent hardware vendor, a hardware-manufacturing company that specializes in a specific type of hardware device and not a complete computer system. The IHV typically also provides the software drivers for its hardware devices. Contrast with OEM.
- Internet Information Server (IIS)
Short for Internet Information Server, Microsoft’s Web server that runs on Windows NT platforms. In fact, IIS comes bundled with Windows NT 4.0. Because IIS is tightly integrated with the operating system, it is relatively easy to administer. However, currently IIS is available only for the Windows NT platform, whereas Netscape’s Web servers run on […]
Short for Internet Inter-ORB Protocol, a protocol developed by the Object Management Group (OMG) to implement CORBA solutions over the World Wide Web. IIOP enables browsers and servers to exchange integers, arrays, and more complex objects, unlike HTTP, which only supports transmission of text.
Short for incumbent local exchange carrier. An ILEC is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. Compare with CLEC, a company that competes with the already established local telephone business.