I
nternational Electrotechnical Commission
Glossary
Electropedia
Terms defined in
IEC 62351-2
2.2.1
Abstract Communication Service Interface (ACSI)
2.2.2
Access
2.2.3
Access Authority
2.2.4
Access Control
2.2.5
Access Control List (ACL)
2.2.6
Accountability
2.2.7
Adequate Security
2.2.8
Advanced Encryption Standard (AES)
2.2.9
Alarm
2.2.10
Application Layer
2.2.11
Association
2.2.12
Assurance
2.2.13
Asymmetric Cipher
2.2.14
Asymmetric Cryptography
2.2.15
Asymmetric Key Pair
2.2.16
Attack
2.2.17
Audit
2.2.18
Audit Log
2.2.19
Audit Record Field
2.2.20
Audit Trail
2.2.21
Authentic Signature
2.2.22
Authentication
2.2.23
Authorization
2.2.24
Authorization Process
2.2.25
Authorized User
2.2.26
Availability
2.2.27
Back Door
2.2.28
Bandwidth
2.2.29
Biometric
2.2.30
Block Cipher
2.2.31
Boundary Protection
2.2.32
Buffer Overflow
2.2.33
Bump-in-the-Stack
2.2.34
Bump-in-the-Wire
2.2.35
Call Back
2.2.36
ertificate
2.2.37
Certificate Management
2.2.38
Certificate Revocation List (CRL)
2.2.39
Certification
2.2.40
Certification Authority (CA)
2.2.41
Chain of Custody
2.2.42
Challenge Handshake Authentication Protocol (CHAP)
2.2.43
Challenge-Response, Challenge-Response Protocol
2.2.44
Checksum
2.2.45
Cipher
2.2.46
Ciphertext
2.2.47
Cleartext
2.2.48
Client
2.2.49
Compromise
2.2.50
Computer Emergency Response Team (CERT)
2.2.51
Computer Virus
2.2.52
Confidentiality
2.2.53
Conformance Test
2.2.54
Control Network
2.2.55
Control System
2.2.56
Control System Operations
2.2.57
Cookie
2.2.58
Countermeasure
2.2.59
Cracker
2.2.60
Credential
2.2.61
Critical System Resource
2.2.62
Crypto-algorithm
2.2.63
Cryptographic Hash
2.2.64
Cryptographic Key
2.2.65
Cryptography
2.2.66
Cyber
2.2.67
Cyber Attack
2.2.68
Cyber Security
2.2.69
Cyclic Redundancy Check (CRC)
2.2.70
Data Authentication
2.2.71
Data Corruption
2.2.72
Data Encryption Standard (DES)
2.2.73
Data Integrity
2.2.74
Data Object (DO)
2.2.75
Data Security
2.2.76
Datagram
2.2.77
Decode
2.2.78
Decrypt
2.2.79
Decryption
2.2.80
De-Facto Standard
2.2.81
Defence in Depth
2.2.82
Denial of Service (DoS)
2.2.83
Designated Approving Authority (DAA)
2.2.84
Device
2.2.85
Diffie-Hellman Key Exchange
2.2.86
Digital Certificate
2.2.87
Digital Data
2.2.88
Digital Signature
2.2.89
Digital Signature Standard (DSS)
2.2.90
Distributed Control System (DCS)
2.2.91
Dongle
2.2.92
Eavesdropping
2.2.93
Electronic Deception
2.2.94
Elliptic Curve Cryptography
2.2.95
Encrypt
2.2.96
Encryption
2.2.97
Firewall
2.2.98
Flooding
2.2.99
Flow Control
2.2.100
Functions
2.2.101
Gateway
2.2.102
Generic Upper Layer Security (GULS)
2.2.103
Hacker
2.2.104
Hash Function
2.2.105
Honey Pot
2.2.106
Identification
2.2.108
Information Security
2.2.109
Instrumentation, Systems, and Automation Society (ISA)
2.2.110
Integrity
2.2.111
Intelligent Electronic Device (IED)
2.2.112
Intercept
2.2.113
Interchangeability
2.2.114
Interface
2.2.115
Internet Protocol security (IPsec)
2.2.116
Interoperability
2.2.117
Intruder
2.2.118
Intrusion Detection System (IDS)
2.2.119
Key
2.2.120
Key Distribution
2.2.121
Key Logger
2.2.122
Key Pair
2.2.123
Key Update
2.2.124
Latency
2.2.125
Local Area Network (LAN)
2.2.126
Malicious Code
2.2.127
Malware
2.2.128
Management Information Base (MIB)
2.2.129
Man-in-the-Middle Attack
2.2.130
Manufacturing Message Specification (MMS)
2.2.131
Masquerade
2.2.132
Mockingbird
2.2.133
Multicast
2.2.134
Network Layer Protocol
2.2.135
Network Management
2.2.136
Non-repudiation
2.2.137
Object Identifier (OID)
2.2.138
Open Protocol
2.2.139
Open System
2.2.140
Open Systems Architecture
2.2.141
Open Systems Interconnection – Reference Model (OSI-RM)
2.2.142
Password
2.2.143
Personal Identification Number (PIN)
2.2.144
Phishing
2.2.145
Physical Layer Protocol
2.2.146
Plaintext
2.2.147
Point-to-Point Protocol (PPP)
2.2.148
Port Scanning
2.2.149
Pretty Good Privacy (PGP)
2.2.150
Private Key
2.2.151
Protection Profile
2.2.152
Proxy, Proxy Server
2.2.153
Pseudorandom Number Generator (PRNG)
2.2.154
Public Key
2.2.155
Public Key Asymmetric Cryptographic Algorithm
2.2.156
Public Key Certificate
2.2.157
Public Key Cryptography
2.2.158
Public Key Infrastructure (PKI)
2.2.159
Replay Attack
2.2.160
Repudiation
2.2.161
Risk
2.2.162
Risk Assessment
2.2.163
Risk Management
2.2.164
Rivest, Shamir and Adleman (RSA)
2.2.165
Role Based Access Control (RBAC)
2.2.166
Secret Key
2.2.167
Secret Key Encryption
2.2.168
Secret Key Symmetric Cryptographic Algorithm
2.2.169
Secure Hash Algorithm (SHA)
2.2.170
Secure Shell (SSH)
2.2.171
Secure Sockets Layer (SSL)
2.2.172
Secure/ Multipurpose Internet Mail Extensions (S/MIME)
2.2.173
Security
2.2.174
Security Domain
2.2.175
Security Guidelines
2.2.176
Security Management
2.2.177
Security Performance
2.2.178
Security Perimeter
2.2.179
Security Policy
2.2.180
Security Risk Assessment
2.2.181
Security Services
2.2.182
Server
2.2.183
Session Key
2.2.184
Shoulder Surfing
2.2.185
Signature Certificate
2.2.186
Simple Network Management Protocol (SNMP)
2.2.187
Smart Card
2.2.188
Smurf
2.2.189
Sniffing
2.2.190
Social Engineering
2.2.191
Spoof
2.2.192
Spyware
2.2.193
Strong Authentication
2.2.194
Strong Secret
2.2.195
Supervisory Control and Data Acquisition (SCADA)
2.2.196
Symmetric Cryptography
2.2.197
Symmetric Key
2.2.198
Symmetric Key Algorithm
2.2.199
SYN Flood
2.2.200
Tamper Detection
2.2.201
Tampering
2.2.203
Threat
2.2.204
Throughput
2.2.205
Traffic Analysis
2.2.206
Transport Level Security (TLS)
2.2.207
Trap Door
2.2.208
Triple DES
2.2.209
Trojan Horse
2.2.210
Trust
2.2.211
Tunnel
2.2.212
Unforgeable
2.2.213
Update Key
2.2.214
Virtual Private Network (VPN)
2.2.215
Virus
2.2.216
Vulnerability
2.2.217
Vulnerability Assessment
2.2.218
Wide Area Network (WAN)
2.2.219
WiFi
2.2.220
Wired Equivalent Privacy (WEP)
2.2.221
Wireless Application Protocol (WAP)
2.2.222
Wireless LAN (WLAN)
2.2.223
Worm