Short for Internet Message Access Protocol, a protocol for retrieving e-mail messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
IMAP was developed at Stanford University in 1986.
- International Mobile Equipment Identity (IMEI)
IMEI is short for International Mobile Equipment Identity and is a unique number given to every single mobile phone, typically found behind the battery. IMEI numbers of cellular phones connected to a GSM network are stored in a database (EIR – Equipment Identity Register) containing all valid mobile phone equipment. When a phone is reported […]
Acronym for International Mobile Subscriber Identity, IMSI is a unique number that is associated with all GSM and UMTS network mobile phone users. An International Mobile Subscriber Identity is up to 15 digits long. The first three digits represent the country code, followed by the the network code. The remaining digits, up to fifteen represents […]
- IM worm
(ī-em wërm) (n.) A worm (i.e., a self-replicating program typically designed to perform harm to a computer or network) that propagates over instant messaging applications. The worm spreads by accessing the user’s instant messaging address book, or buddy list, and sends itself to individual recipients from that list. Like a worm that spreads over the […]
Short for Internal Nonhostile Structured, it is a threat defined by Symantec Corporation to mean an individual within an organization who has physical access to network components. This individual may not motivated to disrupt mission operations but can do so by making common mistakes. Individuals executing INS threats are usually skilled and have tools to […]
Short for Internal Nonhostile Unstructured, it is a threat defined by Symantec Corporation to mean an individual within an organization who has physical access to network components. This individual is not motivated to disrupt mission operations but can do so unknowingly. INU threats are typically unskilled users who make mistakes that can impact mission operations. […]