International Electrotechnical Commission
Glossary

Terms defined in IEC 62351-2


2.2.1Abstract Communication Service Interface (ACSI)
2.2.2Access
2.2.3Access Authority
2.2.4Access Control
2.2.5Access Control List (ACL)
2.2.6Accountability
2.2.7Adequate Security
2.2.8Advanced Encryption Standard (AES)
2.2.9Alarm
2.2.10Application Layer
2.2.11Association
2.2.12Assurance
2.2.13Asymmetric Cipher
2.2.14Asymmetric Cryptography
2.2.15Asymmetric Key Pair
2.2.16Attack
2.2.17Audit
2.2.18Audit Log
2.2.19Audit Record Field
2.2.20Audit Trail
2.2.21Authentic Signature
2.2.22Authentication
2.2.23Authorization
2.2.24Authorization Process
2.2.25Authorized User
2.2.26Availability
2.2.27Back Door
2.2.28Bandwidth
2.2.29Biometric
2.2.30Block Cipher
2.2.31Boundary Protection
2.2.32Buffer Overflow
2.2.33Bump-in-the-Stack
2.2.34Bump-in-the-Wire
2.2.35Call Back
2.2.36ertificate
2.2.37Certificate Management
2.2.38Certificate Revocation List (CRL)
2.2.39Certification
2.2.40Certification Authority (CA)
2.2.41Chain of Custody
2.2.42Challenge Handshake Authentication Protocol (CHAP)
2.2.43Challenge-Response, Challenge-Response Protocol
2.2.44Checksum
2.2.45Cipher
2.2.46Ciphertext
2.2.47Cleartext
2.2.48Client
2.2.49Compromise
2.2.50Computer Emergency Response Team (CERT)
2.2.51Computer Virus
2.2.52Confidentiality
2.2.53Conformance Test
2.2.54Control Network
2.2.55Control System
2.2.56Control System Operations
2.2.57Cookie
2.2.58Countermeasure
2.2.59Cracker
2.2.60Credential
2.2.61Critical System Resource
2.2.62Crypto-algorithm
2.2.63Cryptographic Hash
2.2.64Cryptographic Key
2.2.65Cryptography
2.2.66Cyber
2.2.67Cyber Attack
2.2.68Cyber Security
2.2.69Cyclic Redundancy Check (CRC)
2.2.70Data Authentication
2.2.71Data Corruption
2.2.72Data Encryption Standard (DES)
2.2.73Data Integrity
2.2.74Data Object (DO)
2.2.75Data Security
2.2.76Datagram
2.2.77Decode
2.2.78Decrypt
2.2.79Decryption
2.2.80De-Facto Standard
2.2.81Defence in Depth
2.2.82Denial of Service (DoS)
2.2.83Designated Approving Authority (DAA)
2.2.84Device
2.2.85Diffie-Hellman Key Exchange
2.2.86Digital Certificate
2.2.87Digital Data
2.2.88Digital Signature
2.2.89Digital Signature Standard (DSS)
2.2.90Distributed Control System (DCS)
2.2.91Dongle
2.2.92Eavesdropping
2.2.93Electronic Deception
2.2.94Elliptic Curve Cryptography
2.2.95Encrypt
2.2.96Encryption
2.2.97Firewall
2.2.98Flooding
2.2.99Flow Control
2.2.100Functions
2.2.101Gateway
2.2.102Generic Upper Layer Security (GULS)
2.2.103Hacker
2.2.104Hash Function
2.2.105Honey Pot
2.2.106Identification
2.2.108Information Security
2.2.109Instrumentation, Systems, and Automation Society (ISA)
2.2.110Integrity
2.2.111Intelligent Electronic Device (IED)
2.2.112Intercept
2.2.113Interchangeability
2.2.114Interface
2.2.115Internet Protocol security (IPsec)
2.2.116Interoperability
2.2.117Intruder
2.2.118Intrusion Detection System (IDS)
2.2.119Key
2.2.120Key Distribution
2.2.121Key Logger
2.2.122Key Pair
2.2.123Key Update
2.2.124Latency
2.2.125Local Area Network (LAN)
2.2.126Malicious Code
2.2.127Malware
2.2.128Management Information Base (MIB)
2.2.129Man-in-the-Middle Attack
2.2.130Manufacturing Message Specification (MMS)
2.2.131Masquerade
2.2.132Mockingbird
2.2.133Multicast
2.2.134Network Layer Protocol
2.2.135Network Management
2.2.136Non-repudiation
2.2.137Object Identifier (OID)
2.2.138Open Protocol
2.2.139Open System
2.2.140Open Systems Architecture
2.2.141Open Systems Interconnection – Reference Model (OSI-RM)
2.2.142Password
2.2.143Personal Identification Number (PIN)
2.2.144Phishing
2.2.145Physical Layer Protocol
2.2.146Plaintext
2.2.147Point-to-Point Protocol (PPP)
2.2.148Port Scanning
2.2.149Pretty Good Privacy (PGP)
2.2.150Private Key
2.2.151Protection Profile
2.2.152Proxy, Proxy Server
2.2.153Pseudorandom Number Generator (PRNG)
2.2.154Public Key
2.2.155Public Key Asymmetric Cryptographic Algorithm
2.2.156Public Key Certificate
2.2.157Public Key Cryptography
2.2.158Public Key Infrastructure (PKI)
2.2.159Replay Attack
2.2.160Repudiation
2.2.161Risk
2.2.162Risk Assessment
2.2.163Risk Management
2.2.164Rivest, Shamir and Adleman (RSA)
2.2.165Role Based Access Control (RBAC)
2.2.166Secret Key
2.2.167Secret Key Encryption
2.2.168Secret Key Symmetric Cryptographic Algorithm
2.2.169Secure Hash Algorithm (SHA)
2.2.170Secure Shell (SSH)
2.2.171Secure Sockets Layer (SSL)
2.2.172Secure/ Multipurpose Internet Mail Extensions (S/MIME)
2.2.173Security
2.2.174Security Domain
2.2.175Security Guidelines
2.2.176Security Management
2.2.177Security Performance
2.2.178Security Perimeter
2.2.179Security Policy
2.2.180Security Risk Assessment
2.2.181Security Services
2.2.182Server
2.2.183Session Key
2.2.184Shoulder Surfing
2.2.185Signature Certificate
2.2.186Simple Network Management Protocol (SNMP)
2.2.187Smart Card
2.2.188Smurf
2.2.189Sniffing
2.2.190Social Engineering
2.2.191Spoof
2.2.192Spyware
2.2.193Strong Authentication
2.2.194Strong Secret
2.2.195Supervisory Control and Data Acquisition (SCADA)
2.2.196Symmetric Cryptography
2.2.197Symmetric Key
2.2.198Symmetric Key Algorithm
2.2.199SYN Flood
2.2.200Tamper Detection
2.2.201Tampering
2.2.203Threat
2.2.204Throughput
2.2.205Traffic Analysis
2.2.206Transport Level Security (TLS)
2.2.207Trap Door
2.2.208Triple DES
2.2.209Trojan Horse
2.2.210Trust
2.2.211Tunnel
2.2.212Unforgeable
2.2.213Update Key
2.2.214Virtual Private Network (VPN)
2.2.215Virus
2.2.216Vulnerability
2.2.217Vulnerability Assessment
2.2.218Wide Area Network (WAN)
2.2.219WiFi
2.2.220Wired Equivalent Privacy (WEP)
2.2.221Wireless Application Protocol (WAP)
2.2.222Wireless LAN (WLAN)
2.2.223Worm