DD IEC/TS 62351-2:2008
Current
The latest, up-to-date edition.
Power systems management and associated information exchange. Data and communications security Glossary of terms
Hardcopy , PDF
English
30-06-2009
FOREWORD
1 Scope and object
2 Terms and definitions
2.1 Glossary references and permissions
2.2 Glossary of security and related communication terms
2.2.1 Abstract Communication Service Interface (ACSI)
2.2.2 Access
2.2.3 Access Authority
2.2.4 Access Control
2.2.5 Access Control List (ACL)
2.2.6 Accountability
2.2.7 Adequate Security
2.2.8 Advanced Encryption Standard (AES)
2.2.9 Alarm
2.2.10 Application Layer
2.2.11 Association
2.2.12 Assurance
2.2.13 Asymmetric Cipher
2.2.14 Asymmetric Cryptography
2.2.15 Asymmetric Key Pair
2.2.16 Attack
2.2.17 Audit
2.2.18 Audit Log
2.2.19 Audit Record Field
2.2.20 Audit Trail
2.2.21 Authentic Signature
2.2.22 Authentication
2.2.23 Authorization
2.2.24 Authorization Process
2.2.25 Authorized User
2.2.26 Availability
2.2.27 Back Door
2.2.28 Bandwidth
2.2.29 Biometric
2.2.30 Block Cipher
2.2.31 Boundary Protection
2.2.32 Buffer Overflow
2.2.33 Bump-in-the-Stack
2.2.34 Bump-in-the-Wire
2.2.35 Call Back
2.2.36 Certificate
2.2.37 Certificate Management
2.2.38 Certificate Revocation List (CRL)
2.2.39 Certification
2.2.40 Certification Authority (CA)
2.2.41 Chain of Custody
2.2.42 Challenge Handshake Authentication Protocol (CHAP)
2.2.43 Challenge-Response, Challenge-Response Protocol
2.2.44 Checksum
2.2.45 Cipher
2.2.46 Ciphertext
2.2.47 Cleartext
2.2.48 Client
2.2.49 Compromise
2.2.50 Computer Emergency Response Team (CERT)
2.2.51 Computer Virus
2.2.52 Confidentiality
2.2.53 Conformance Test
2.2.54 Control Network
2.2.55 Control System
2.2.56 Control System Operations
2.2.57 Cookie
2.2.58 Countermeasure
2.2.59 Cracker
2.2.60 Credential
2.2.61 Critical System Resource
2.2.62 Crypto-algorithm
2.2.63 Cryptographic Hash
2.2.64 Cryptographic Key
2.2.65 Cryptography
2.2.66 Cyber
2.2.67 Cyber Attack
2.2.68 Cyber Security
2.2.69 Cyclic Redundancy Check (CRC)
2.2.70 Data Authentication
2.2.71 Data Corruption
2.2.72 Data Encryption Standard (DES)
2.2.73 Data Integrity
2.2.74 Data Object (DO)
2.2.75 Data Security
2.2.76 Datagram
2.2.77 Decode
2.2.78 Decrypt
2.2.79 Decryption
2.2.80 De-Facto Standard
2.2.81 Defence in Depth
2.2.82 Denial of Service (DoS)
2.2.83 Designated Approving Authority (DAA)
2.2.84 Device
2.2.85 Diffie-Hellman Key Exchange
2.2.86 Digital Certificate
2.2.87 Digital Data
2.2.88 Digital Signature
2.2.89 Digital Signature Standard (DSS)
2.2.90 Distributed Control System (DCS)
2.2.91 Dongle
2.2.92 Eavesdropping
2.2.93 Electronic Deception
2.2.94 Elliptic Curve Cryptography
2.2.95 Encrypt
2.2.96 Encryption
2.2.97 Firewall
2.2.98 Flooding
2.2.99 Flow Control
2.2.100 Functions
2.2.101 Gateway
2.2.102 Generic Upper Layer Security (GULS)
2.2.103 Hacker
2.2.104 Hash Function
2.2.105 Honey Pot
2.2.106 Identification
2.2.107 IEEE 802.11i
2.2.108 Information Security
2.2.109 Instrumentation, Systems, and Automation
Society (ISA)
2.2.110 Integrity
2.2.111 Intelligent Electronic Device (IED)
2.2.112 Intercept
2.2.113 Interchangeability
2.2.114 Interface
2.2.115 Internet Protocol security (IPsec)
2.2.116 Interoperability
2.2.117 Intruder
2.2.118 Intrusion Detection System (IDS)
2.2.119 Key
2.2.120 Key Distribution
2.2.121 Key Logger
2.2.122 Key Pair
2.2.123 Key Update
2.2.124 Latency
2.2.125 Local Area Network (LAN)
2.2.126 Malicious Code
2.2.127 Malware
2.2.128 Management Information Base (MIB)
2.2.129 Man-in-the-Middle Attack
2.2.130 Manufacturing Message Specification (MMS)
2.2.131 Masquerade
2.2.132 Mockingbird
2.2.133 Multicast
2.2.134 Network Layer Protocol
2.2.135 Network Management
2.2.136 Non-repudiation
2.2.137 Object Identifier (OID)
2.2.138 Open Protocol
2.2.139 Open System
2.2.140 Open Systems Architecture
2.2.141 Open Systems Interconnection - Reference Model
(OSI-RM)
2.2.142 Password
2.2.143 Personal Identification Number (PIN)
2.2.144 Phishing
2.2.145 Physical Layer Protocol
2.2.146 Plaintext
2.2.147 Point-to-Point Protocol (PPP)
2.2.148 Port Scanning
2.2.149 Pretty Good Privacy (PGP)
2.2.150 Private Key
2.2.151 Protection Profile
2.2.152 Proxy, Proxy Server
2.2.153 Pseudorandom Number Generator (PRNG)
2.2.154 Public Key
2.2.155 Public Key Asymmetric Cryptographic Algorithm
2.2.156 Public Key Certificate
2.2.157 Public Key Cryptography
2.2.158 Public Key Infrastructure (PKI)
2.2.159 Replay Attack
2.2.160 Repudiation
2.2.161 Risk
2.2.162 Risk Assessment
2.2.163 Risk Management
2.2.164 Rivest, Shamir and Adleman (RSA)
2.2.165 Role Based Access Control (RBAC)
2.2.166 Secret Key
2.2.167 Secret Key Encryption
2.2.168 Secret Key Symmetric Cryptographic Algorithm
2.2.169 Secure Hash Algorithm (SHA)
2.2.170 Secure Shell (SSH)
2.2.171 Secure Sockets Layer (SSL)
2.2.172 Secure/Multipurpose Internet Mail Extensions
(S/MIME)
2.2.173 Security
2.2.174 Security Domain
2.2.175 Security Guidelines
2.2.176 Security Management
2.2.177 Security Performance
2.2.178 Security Perimeter
2.2.179 Security Policy
2.2.180 Security Risk Assessment
2.2.181 Security Services
2.2.182 Server
2.2.183 Session Key
2.2.184 Shoulder Surfing
2.2.185 Signature Certificate
2.2.186 Simple Network Management Protocol (SNMP)
2.2.187 Smart Card
2.2.188 Smurf
2.2.189 Sniffing
2.2.190 Social Engineering
2.2.191 Spoof
2.2.192 Spyware
2.2.193 Strong Authentication
2.2.194 Strong Secret
2.2.195 Supervisory Control and Data Acquisition (SCADA)
2.2.196 Symmetric Cryptography
2.2.197 Symmetric Key
2.2.198 Symmetric Key Algorithm
2.2.199 SYN Flood
2.2.200 Tamper Detection
2.2.201 Tampering
2.2.202 TASE.2
2.2.203 Threat
2.2.204 Throughput
2.2.205 Traffic Analysis
2.2.206 Transport Level Security (TLS)
2.2.207 Trap Door
2.2.208 Triple DES
2.2.209 Trojan Horse
2.2.210 Trust
2.2.211 Tunnel
2.2.212 Unforgeable
2.2.213 Update Key
2.2.214 Virtual Private Network (VPN)
2.2.215 Virus
2.2.216 Vulnerability
2.2.217 Vulnerability Assessment
2.2.218 Wide Area Network (WAN)
2.2.219 WiFi
2.2.220 Wired Equivalent Privacy (WEP)
2.2.221 Wireless Application Protocol (WAP)
2.2.222 Wireless LAN (WLAN)
2.2.223 Worm
2.2.224 X.509
3 Abbreviations
3.1.1 3DES
3.1.2 ACL
3.1.3 ACSI
3.1.4 AES
3.1.5 AGA
3.1.6 ANSI
3.1.7 BIS
3.1.8 BSI
3.1.9 BTW
3.1.10 CA
3.1.11 CERT
3.1.12 CHAP
3.1.13 CIP
3.1.14 CRC
3.1.15 CRL
3.1.16 DAA
3.1.17 DCS
3.1.18 DES
3.1.19 DO
3.1.20 DoS
3.1.21 DSS
3.1.22 ECC
3.1.23 EM/RF
3.1.24 EMS
3.1.25 FIPS
3.1.26 GULS
3.1.27 ICCP
3.1.28 IDS
3.1.29 IED
3.1.30 IEEE
3.1.31 IETF
3.1.32 IPS
3.1.33 IPsec
3.1.34 ISA
3.1.35 ISO
3.1.36 IT
3.1.37 LAN
3.1.38 MIB
3.1.39 MMS
3.1.40 NERC
3.1.41 NIST
3.1.42 OID
3.1.43 OSI-RM
3.1.44 PGP
3.1.45 PICS
3.1.46 PIN
3.1.47 PIXIT
3.1.48 PKI
3.1.49 PLC
3.1.50 PLC
3.1.51 PPP
3.1.52 PRNG
3.1.53 RA
3.1.54 RBAC
3.1.55 RSA
3.1.56 RTU
3.1.57 SCADA
3.1.58 SHA
3.1.59 SNMP
3.1.60 SSH
3.1.61 SSL
3.1.62 TASE.2
3.1.63 TDEA
3.1.64 TDES
3.1.65 TLS
3.1.66 VPN
3.1.67 WAN
3.1.68 WEP
3.1.69 WiFi
3.1.70 WLAN
3.1.71 WPA
BIBLIOGRAPHY
Describes the key terms used in the IEC 62351 series, and is not meant to be a definitive list.
Committee |
PEL/57
|
DocumentType |
Standard
|
Pages |
56
|
PublisherName |
British Standards Institution
|
Status |
Current
|
This part of IEC 62351 covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined.
Standards | Relationship |
IEC TS 62351-2:2008 | Identical |
IEC 60050-351:2013 | International Electrotechnical Vocabulary (IEV) - Part 351: Control technology |
ISO/IEC 18028-1:2006 | Information technology Security techniques IT network security Part 1: Network security management |
IEC 60870-5-102:1996 | Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
IEC 61850-7-2:2010 | Communication networks and systems for power utility automation - Part 7-2: Basic information and communication structure - Abstract communication service interface (ACSI) |
IEC 61850-9-1:2003 | Communication networks and systems in substations - Part 9-1: Specific Communication Service Mapping (SCSM) - Sampled values over serial unidirectional multidrop point to point link |
FIPS PUB 140 : 0001 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO 9506-2:2003 | Industrial automation systems Manufacturing Message Specification Part 2: Protocol specification |
ISO/IEC 18028-4:2005 | Information technology Security techniques IT network security Part 4: Securing remote access |
ISO/IEC 18043:2006 | Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
IEC 60870-5-104:2006+AMD1:2016 CSV | Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles |
IEC 60870-5-103:1997 | Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 11770-4:2006 | Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO 9498:1993 | Fluorspar Experimental methods for checking the bias of sampling and sample preparation |
ISO/IEC 18014-2:2009 | Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens |
ISO/IEC 18028-2:2006 | Information technology Security techniques IT network security Part 2: Network security architecture |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 10731:1994 | Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 9506-1:2003 | Industrial automation systems Manufacturing Message Specification Part 1: Service definition |
IEC 60870-5-101:2003+AMD1:2015 CSV | Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks |
IEC 61850-7-1:2011 | Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models |
ISO/IEC 21827:2008 | Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®) |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
IEC 61850-8-1:2011 | Communication networks and systems for power utility automation - Part 8-1: Specific communication service mapping (SCSM) - Mappings to MMS (ISO 9506-1 and ISO 9506-2) and to ISO/IEC 8802-3 |
ISO/IEC TR 15443-3:2007 | Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
IEC 61850-9-2:2011 | Communication networks and systems for power utility automation - Part 9-2: Specific communication service mapping (SCSM) - Sampled values over ISO/IEC 8802-3 |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
IEC 61850-7-420:2009 | Communication networks and systems for power utility automation - Part 7-420: Basic communication structure - Distributed energy resources logical nodes |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
IEC 61850-7-4:2010 | Communication networks and systems for power utility automation - Part 7-4: Basic communication structure - Compatible logical node classes and data object classes |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
IEC 61850-7-3:2010 | Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC Guide 2:2004 | Standardization and related activities — General vocabulary |
IEC 61850-10:2012 | Communication networks and systems for power utility automation - Part 10: Conformance testing |
ISA 99 CD : 2010 | SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
ISA 5.1 : 1984 | INSTRUMENTATION SYMBOLS AND IDENTIFICATION |
IEC TR 60870-1-3:1997 | Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.