IEC TS 62351-2 pdf download – Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms

admin
IEC TS 62351-2 pdf download – Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms

IEC TS 62351-2 pdf download – Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms
2.2Glossary of security and related communication terms
2.2.1Abstract
Avirtualinterface toan lEDprovidingabstract
communication
communication services,e.g. connection,variable access,
Service Interface
unsolicited data transfer,device control and file transfer
(ACSl)
services, independent of the actual communication stack andprofiles used. [IEC 61850 series]
The ability and means to communicate with or otherwiseinteract with a system in order to use system resources toeither handle information orgain knowledge of theinformation the system contains.[RFC 2828]
2.2.3Access Authority
An entity responsible for monitoring and granting accessprivileges for other authorized entities.[RFC 2828]
2.2.4Access Control
1. Prevention of unauthorized use of a resource,including
the prevention of use of a resource in an unauthorizedmanner. [ISOIEC 18028-2:2006]
2. Protection of resources against unauthorized access; aprocess by which use of resources is regulated accordingto a security policy and is permitted by only authorizedsystem entities according to that policy. [RFC2828]
3. Rules and deployment mechanisms which control access
to information systems, and physical access to premises.The entire subject of Information Security is based uponAccess Control,without which lnformation Securitycannot, by definition, exist.[ISO/IEC 27002:2005]
2.2.5Access Control
A mechanism that implements access control for a system
List (ACL)
resource by enumerating the identities of the system entitiesthat are permitted to access the resources.[RFC 2828]
2.2.6Accountability
1. The property that ensures that the actions of an entitymay be traced uniquely to the entity. [lSO/IEC 7498-2]2. The property of a system (including all of its systemresources) that ensures that the actions of a systementity may be traced uniquely to that entity, which can beheld responsible for its actions.[RFC 2828]
2.2.7Adequate Security
Security commensurate with the risk and the magnitude ofharm resulting from the loss,misuse, or unauthorized accessto or modification of information. This includes assuring thatinformation systems and applications used by theorganization operate effectively and provide appropriateconfidentiality,integrity,and availability,through the use ofcost-effective management,operational, and technicalcontrols.[NIST SP 800-53]
2.2.8 Advanced Encryption Standard (AES)
1 . A symmetric encryption mechanism providing variable key length and allowing an efficient implementation specified as Federal Information Processing Standard (FIPS) 1 97. [ISO/IEC 1 8028-4:2005]
2. The Advanced Encryption Standard specifies a U.S. Government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. [NIST SP 800-46] 3. This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 1 28 bits, using cipher keys with lengths of 1 28, 1 92, and 256 bits. [FIPS 1 ] 2.2.9 Alarm A device or function that signals the existence of an abnormal condition by making an audible or visible discrete change, or both, so as to attract attention to that condition. [ANSI/ISA 5.1 :1 979] 2.2.1 0 Application Layer See Open Systems Interconnection—Reference Model Layer 7
2.2.1 1 Association A cooperative relationship between system entities, usually for the purpose of transferring information between them. [RFC 2828]
2.2.1 2 Assurance In the context of security: Grounds for confidence that a deliverable meets its security objectives. [ISO/IEC 1 5408-1 ] NOTE This definition is generally accepted within the security community; within ISO the more generally used definition is: Activity resulting in a statement giving confidence that a product, process or service fulfils specified requirements. [ISO/IEC Guide 2]
2.2.1 3 Asymmetric Cipher Cipher based on asymmetric cryptographic techniques whose public transformation is used for encryption and whose private transformation is used for decryption. [ISO/IEC 1 8033-1 ].
2.2.1 4 Asymmetric Cryptography A modern branch of cryptography (popularly known as “public- key cryptography”) in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. [RFC 2828] 2.2.1 5 Asymmetric Key Pair A pair of related keys where the private key defines the private transformation and the public key defines the public transformation. [ISO/IEC 9798-1 :1 997] 2.2.1 6 Attack 1 . An assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. [RFC 2828] 2. [An] intentional act of attempting to bypass one or more of the following security controls of an information system (IS): non-repudiation, authentication, integrity, availability, or confidentiality. [ATIS]