IMEI is short for International Mobile Equipment Identity and is a unique number given to every single mobile phone, typically found behind the battery.
IMEI numbers of cellular phones connected to a GSM network are stored in a database (EIR – Equipment Identity Register) containing all valid mobile phone equipment.
When a phone is reported stolen or is not type approved, the number is marked invalid.
The number consists of four groups that looks this:
The first set of numbers is the type approval code (TAC). The first two digits represent the country code. The rest make up the final assembly code. The second group of numbers identifies the manufacturer:
01 and 02 = AEG
07 and 40 = Motorola
10 and 20 = Nokia
41and 44 = Siemens
51= Sony, Siemens, Ericsson
The third set is the serial number and the last single digit is an additional number (usually 0).
Acronym for International Mobile Subscriber Identity, IMSI is a unique number that is associated with all GSM and UMTS network mobile phone users. An International Mobile Subscriber Identity is up to 15 digits long. The first three digits represent the country code, followed by the the network code. The remaining digits, up to fifteen represents […]
- IM worm
(ī-em wërm) (n.) A worm (i.e., a self-replicating program typically designed to perform harm to a computer or network) that propagates over instant messaging applications. The worm spreads by accessing the user’s instant messaging address book, or buddy list, and sends itself to individual recipients from that list. Like a worm that spreads over the […]
Short for Internal Nonhostile Structured, it is a threat defined by Symantec Corporation to mean an individual within an organization who has physical access to network components. This individual may not motivated to disrupt mission operations but can do so by making common mistakes. Individuals executing INS threats are usually skilled and have tools to […]
Short for Internal Nonhostile Unstructured, it is a threat defined by Symantec Corporation to mean an individual within an organization who has physical access to network components. This individual is not motivated to disrupt mission operations but can do so unknowingly. INU threats are typically unskilled users who make mistakes that can impact mission operations. […]
IOPS is the standard unit of measurement for I/O (Input/Output) operations per second. This measurement is a performance-based measurement and is usually seen written as: Total IOPS: Average number of I/O operations per second. Read IOPS: Average number of read I/O operations per second. Write IOPS: Average number of write I/O operations per second.