• Shopping Cart
    There are no items in your cart

DD IEC/TS 62351-2:2008

Current

Current

The latest, up-to-date edition.

Power systems management and associated information exchange. Data and communications security Glossary of terms

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

30-06-2009

€322.53
Excluding VAT

FOREWORD
1 Scope and object
2 Terms and definitions
  2.1 Glossary references and permissions
  2.2 Glossary of security and related communication terms
      2.2.1 Abstract Communication Service Interface (ACSI)
      2.2.2 Access
      2.2.3 Access Authority
      2.2.4 Access Control
      2.2.5 Access Control List (ACL)
      2.2.6 Accountability
      2.2.7 Adequate Security
      2.2.8 Advanced Encryption Standard (AES)
      2.2.9 Alarm
      2.2.10 Application Layer
      2.2.11 Association
      2.2.12 Assurance
      2.2.13 Asymmetric Cipher
      2.2.14 Asymmetric Cryptography
      2.2.15 Asymmetric Key Pair
      2.2.16 Attack
      2.2.17 Audit
      2.2.18 Audit Log
      2.2.19 Audit Record Field
      2.2.20 Audit Trail
      2.2.21 Authentic Signature
      2.2.22 Authentication
      2.2.23 Authorization
      2.2.24 Authorization Process
      2.2.25 Authorized User
      2.2.26 Availability
      2.2.27 Back Door
      2.2.28 Bandwidth
      2.2.29 Biometric
      2.2.30 Block Cipher
      2.2.31 Boundary Protection
      2.2.32 Buffer Overflow
      2.2.33 Bump-in-the-Stack
      2.2.34 Bump-in-the-Wire
      2.2.35 Call Back
      2.2.36 Certificate
      2.2.37 Certificate Management
      2.2.38 Certificate Revocation List (CRL)
      2.2.39 Certification
      2.2.40 Certification Authority (CA)
      2.2.41 Chain of Custody
      2.2.42 Challenge Handshake Authentication Protocol (CHAP)
      2.2.43 Challenge-Response, Challenge-Response Protocol
      2.2.44 Checksum
      2.2.45 Cipher
      2.2.46 Ciphertext
      2.2.47 Cleartext
      2.2.48 Client
      2.2.49 Compromise
      2.2.50 Computer Emergency Response Team (CERT)
      2.2.51 Computer Virus
      2.2.52 Confidentiality
      2.2.53 Conformance Test
      2.2.54 Control Network
      2.2.55 Control System
      2.2.56 Control System Operations
      2.2.57 Cookie
      2.2.58 Countermeasure
      2.2.59 Cracker
      2.2.60 Credential
      2.2.61 Critical System Resource
      2.2.62 Crypto-algorithm
      2.2.63 Cryptographic Hash
      2.2.64 Cryptographic Key
      2.2.65 Cryptography
      2.2.66 Cyber
      2.2.67 Cyber Attack
      2.2.68 Cyber Security
      2.2.69 Cyclic Redundancy Check (CRC)
      2.2.70 Data Authentication
      2.2.71 Data Corruption
      2.2.72 Data Encryption Standard (DES)
      2.2.73 Data Integrity
      2.2.74 Data Object (DO)
      2.2.75 Data Security
      2.2.76 Datagram
      2.2.77 Decode
      2.2.78 Decrypt
      2.2.79 Decryption
      2.2.80 De-Facto Standard
      2.2.81 Defence in Depth
      2.2.82 Denial of Service (DoS)
      2.2.83 Designated Approving Authority (DAA)
      2.2.84 Device
      2.2.85 Diffie-Hellman Key Exchange
      2.2.86 Digital Certificate
      2.2.87 Digital Data
      2.2.88 Digital Signature
      2.2.89 Digital Signature Standard (DSS)
      2.2.90 Distributed Control System (DCS)
      2.2.91 Dongle
      2.2.92 Eavesdropping
      2.2.93 Electronic Deception
      2.2.94 Elliptic Curve Cryptography
      2.2.95 Encrypt
      2.2.96 Encryption
      2.2.97 Firewall
      2.2.98 Flooding
      2.2.99 Flow Control
      2.2.100 Functions
      2.2.101 Gateway
      2.2.102 Generic Upper Layer Security (GULS)
      2.2.103 Hacker
      2.2.104 Hash Function
      2.2.105 Honey Pot
      2.2.106 Identification
      2.2.107 IEEE 802.11i
      2.2.108 Information Security
      2.2.109 Instrumentation, Systems, and Automation
              Society (ISA)
      2.2.110 Integrity
      2.2.111 Intelligent Electronic Device (IED)
      2.2.112 Intercept
      2.2.113 Interchangeability
      2.2.114 Interface
      2.2.115 Internet Protocol security (IPsec)
      2.2.116 Interoperability
      2.2.117 Intruder
      2.2.118 Intrusion Detection System (IDS)
      2.2.119 Key
      2.2.120 Key Distribution
      2.2.121 Key Logger
      2.2.122 Key Pair
      2.2.123 Key Update
      2.2.124 Latency
      2.2.125 Local Area Network (LAN)
      2.2.126 Malicious Code
      2.2.127 Malware
      2.2.128 Management Information Base (MIB)
      2.2.129 Man-in-the-Middle Attack
      2.2.130 Manufacturing Message Specification (MMS)
      2.2.131 Masquerade
      2.2.132 Mockingbird
      2.2.133 Multicast
      2.2.134 Network Layer Protocol
      2.2.135 Network Management
      2.2.136 Non-repudiation
      2.2.137 Object Identifier (OID)
      2.2.138 Open Protocol
      2.2.139 Open System
      2.2.140 Open Systems Architecture
      2.2.141 Open Systems Interconnection - Reference Model
              (OSI-RM)
      2.2.142 Password
      2.2.143 Personal Identification Number (PIN)
      2.2.144 Phishing
      2.2.145 Physical Layer Protocol
      2.2.146 Plaintext
      2.2.147 Point-to-Point Protocol (PPP)
      2.2.148 Port Scanning
      2.2.149 Pretty Good Privacy (PGP)
      2.2.150 Private Key
      2.2.151 Protection Profile
      2.2.152 Proxy, Proxy Server
      2.2.153 Pseudorandom Number Generator (PRNG)
      2.2.154 Public Key
      2.2.155 Public Key Asymmetric Cryptographic Algorithm
      2.2.156 Public Key Certificate
      2.2.157 Public Key Cryptography
      2.2.158 Public Key Infrastructure (PKI)
      2.2.159 Replay Attack
      2.2.160 Repudiation
      2.2.161 Risk
      2.2.162 Risk Assessment
      2.2.163 Risk Management
      2.2.164 Rivest, Shamir and Adleman (RSA)
      2.2.165 Role Based Access Control (RBAC)
      2.2.166 Secret Key
      2.2.167 Secret Key Encryption
      2.2.168 Secret Key Symmetric Cryptographic Algorithm
      2.2.169 Secure Hash Algorithm (SHA)
      2.2.170 Secure Shell (SSH)
      2.2.171 Secure Sockets Layer (SSL)
      2.2.172 Secure/Multipurpose Internet Mail Extensions
              (S/MIME)
      2.2.173 Security
      2.2.174 Security Domain
      2.2.175 Security Guidelines
      2.2.176 Security Management
      2.2.177 Security Performance
      2.2.178 Security Perimeter
      2.2.179 Security Policy
      2.2.180 Security Risk Assessment
      2.2.181 Security Services
      2.2.182 Server
      2.2.183 Session Key
      2.2.184 Shoulder Surfing
      2.2.185 Signature Certificate
      2.2.186 Simple Network Management Protocol (SNMP)
      2.2.187 Smart Card
      2.2.188 Smurf
      2.2.189 Sniffing
      2.2.190 Social Engineering
      2.2.191 Spoof
      2.2.192 Spyware
      2.2.193 Strong Authentication
      2.2.194 Strong Secret
      2.2.195 Supervisory Control and Data Acquisition (SCADA)
      2.2.196 Symmetric Cryptography
      2.2.197 Symmetric Key
      2.2.198 Symmetric Key Algorithm
      2.2.199 SYN Flood
      2.2.200 Tamper Detection
      2.2.201 Tampering
      2.2.202 TASE.2
      2.2.203 Threat
      2.2.204 Throughput
      2.2.205 Traffic Analysis
      2.2.206 Transport Level Security (TLS)
      2.2.207 Trap Door
      2.2.208 Triple DES
      2.2.209 Trojan Horse
      2.2.210 Trust
      2.2.211 Tunnel
      2.2.212 Unforgeable
      2.2.213 Update Key
      2.2.214 Virtual Private Network (VPN)
      2.2.215 Virus
      2.2.216 Vulnerability
      2.2.217 Vulnerability Assessment
      2.2.218 Wide Area Network (WAN)
      2.2.219 WiFi
      2.2.220 Wired Equivalent Privacy (WEP)
      2.2.221 Wireless Application Protocol (WAP)
      2.2.222 Wireless LAN (WLAN)
      2.2.223 Worm
      2.2.224 X.509
3 Abbreviations
      3.1.1 3DES
      3.1.2 ACL
      3.1.3 ACSI
      3.1.4 AES
      3.1.5 AGA
      3.1.6 ANSI
      3.1.7 BIS
      3.1.8 BSI
      3.1.9 BTW
      3.1.10 CA
      3.1.11 CERT
      3.1.12 CHAP
      3.1.13 CIP
      3.1.14 CRC
      3.1.15 CRL
      3.1.16 DAA
      3.1.17 DCS
      3.1.18 DES
      3.1.19 DO
      3.1.20 DoS
      3.1.21 DSS
      3.1.22 ECC
      3.1.23 EM/RF
      3.1.24 EMS
      3.1.25 FIPS
      3.1.26 GULS
      3.1.27 ICCP
      3.1.28 IDS
      3.1.29 IED
      3.1.30 IEEE
      3.1.31 IETF
      3.1.32 IPS
      3.1.33 IPsec
      3.1.34 ISA
      3.1.35 ISO
      3.1.36 IT
      3.1.37 LAN
      3.1.38 MIB
      3.1.39 MMS
      3.1.40 NERC
      3.1.41 NIST
      3.1.42 OID
      3.1.43 OSI-RM
      3.1.44 PGP
      3.1.45 PICS
      3.1.46 PIN
      3.1.47 PIXIT
      3.1.48 PKI
      3.1.49 PLC
      3.1.50 PLC
      3.1.51 PPP
      3.1.52 PRNG
      3.1.53 RA
      3.1.54 RBAC
      3.1.55 RSA
      3.1.56 RTU
      3.1.57 SCADA
      3.1.58 SHA
      3.1.59 SNMP
      3.1.60 SSH
      3.1.61 SSL
      3.1.62 TASE.2
      3.1.63 TDEA
      3.1.64 TDES
      3.1.65 TLS
      3.1.66 VPN
      3.1.67 WAN
      3.1.68 WEP
      3.1.69 WiFi
      3.1.70 WLAN
      3.1.71 WPA
BIBLIOGRAPHY

Describes the key terms used in the IEC 62351 series, and is not meant to be a definitive list.

Committee
PEL/57
DocumentType
Standard
Pages
56
PublisherName
British Standards Institution
Status
Current

This part of IEC 62351 covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined.

Standards Relationship
IEC TS 62351-2:2008 Identical

IEC 60050-351:2013 International Electrotechnical Vocabulary (IEV) - Part 351: Control technology
ISO/IEC 18028-1:2006 Information technology Security techniques IT network security Part 1: Network security management
IEC 60870-5-102:1996 Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
IEC 61850-7-2:2010 Communication networks and systems for power utility automation - Part 7-2: Basic information and communication structure - Abstract communication service interface (ACSI)
IEC 61850-9-1:2003 Communication networks and systems in substations - Part 9-1: Specific Communication Service Mapping (SCSM) - Sampled values over serial unidirectional multidrop point to point link
FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO 9506-2:2003 Industrial automation systems Manufacturing Message Specification Part 2: Protocol specification
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO/IEC 18043:2006 Information technology Security techniques Selection, deployment and operations of intrusion detection systems
IEC 60870-5-104:2006+AMD1:2016 CSV Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles
IEC 60870-5-103:1997 Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 11770-4:2006 Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets
ISO 9498:1993 Fluorspar Experimental methods for checking the bias of sampling and sample preparation
ISO/IEC 18014-2:2009 Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
ISO/IEC 18028-2:2006 Information technology Security techniques IT network security Part 2: Network security architecture
IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO 9506-1:2003 Industrial automation systems Manufacturing Message Specification Part 1: Service definition
IEC 60870-5-101:2003+AMD1:2015 CSV Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks
IEC 61850-7-1:2011 Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models
ISO/IEC 21827:2008 Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
IEC 61850-8-1:2011 Communication networks and systems for power utility automation - Part 8-1: Specific communication service mapping (SCSM) - Mappings to MMS (ISO 9506-1 and ISO 9506-2) and to ISO/IEC 8802-3
ISO/IEC TR 15443-3:2007 Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods
IEC 61850-9-2:2011 Communication networks and systems for power utility automation - Part 9-2: Specific communication service mapping (SCSM) - Sampled values over ISO/IEC 8802-3
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
IEC 61850-7-420:2009 Communication networks and systems for power utility automation - Part 7-420: Basic communication structure - Distributed energy resources logical nodes
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
IEC 61850-7-4:2010 Communication networks and systems for power utility automation - Part 7-4: Basic communication structure - Compatible logical node classes and data object classes
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
IEC 61850-7-3:2010 Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC Guide 2:2004 Standardization and related activities — General vocabulary
IEC 61850-10:2012 Communication networks and systems for power utility automation - Part 10: Conformance testing
ISA 99 CD : 2010 SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
FIPS PUB 180 : 2002 SECURE HASH STANDARD
ISA 5.1 : 1984 INSTRUMENTATION SYMBOLS AND IDENTIFICATION
IEC TR 60870-1-3:1997 Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.