IEC TS 62351-2 : 1.0

IEC TS 62351-2 : 1.0

POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 2: GLOSSARY OF TERMS

International Electrotechnical Committee

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$31.20

$78.00

(price reduced by 60 %)

Table of Contents

FOREWORD
1 Scope and object
2 Terms and definitions
  2.1 Glossary references and permissions
  2.2 Glossary of security and related communication terms
      2.2.1 Abstract Communication Service Interface (ACSI)
      2.2.2 Access
      2.2.3 Access Authority
      2.2.4 Access Control
      2.2.5 Access Control List (ACL)
      2.2.6 Accountability
      2.2.7 Adequate Security
      2.2.8 Advanced Encryption Standard (AES)
      2.2.9 Alarm
      2.2.10 Application Layer
      2.2.11 Association
      2.2.12 Assurance
      2.2.13 Asymmetric Cipher
      2.2.14 Asymmetric Cryptography
      2.2.15 Asymmetric Key Pair
      2.2.16 Attack
      2.2.17 Audit
      2.2.18 Audit Log
      2.2.19 Audit Record Field
      2.2.20 Audit Trail
      2.2.21 Authentic Signature
      2.2.22 Authentication
      2.2.23 Authorization
      2.2.24 Authorization Process
      2.2.25 Authorized User
      2.2.26 Availability
      2.2.27 Back Door
      2.2.28 Bandwidth
      2.2.29 Biometric
      2.2.30 Block Cipher
      2.2.31 Boundary Protection
      2.2.32 Buffer Overflow
      2.2.33 Bump-in-the-Stack
      2.2.34 Bump-in-the-Wire
      2.2.35 Call Back
      2.2.36 Certificate
      2.2.37 Certificate Management
      2.2.38 Certificate Revocation List (CRL)
      2.2.39 Certification
      2.2.40 Certification Authority (CA)
      2.2.41 Chain of Custody
      2.2.42 Challenge Handshake Authentication Protocol (CHAP)
      2.2.43 Challenge-Response, Challenge-Response Protocol
      2.2.44 Checksum
      2.2.45 Cipher
      2.2.46 Ciphertext
      2.2.47 Cleartext
      2.2.48 Client
      2.2.49 Compromise
      2.2.50 Computer Emergency Response Team (CERT)
      2.2.51 Computer Virus
      2.2.52 Confidentiality
      2.2.53 Conformance Test
      2.2.54 Control Network
      2.2.55 Control System
      2.2.56 Control System Operations
      2.2.57 Cookie
      2.2.58 Countermeasure
      2.2.59 Cracker
      2.2.60 Credential
      2.2.61 Critical System Resource
      2.2.62 Crypto-algorithm
      2.2.63 Cryptographic Hash
      2.2.64 Cryptographic Key
      2.2.65 Cryptography
      2.2.66 Cyber
      2.2.67 Cyber Attack
      2.2.68 Cyber Security
      2.2.69 Cyclic Redundancy Check (CRC)
      2.2.70 Data Authentication
      2.2.71 Data Corruption
      2.2.72 Data Encryption Standard (DES)
      2.2.73 Data Integrity
      2.2.74 Data Object (DO)
      2.2.75 Data Security
      2.2.76 Datagram
      2.2.77 Decode
      2.2.78 Decrypt
      2.2.79 Decryption
      2.2.80 De-Facto Standard
      2.2.81 Defence in Depth
      2.2.82 Denial of Service (DoS)
      2.2.83 Designated Approving Authority (DAA)
      2.2.84 Device
      2.2.85 Diffie-Hellman Key Exchange
      2.2.86 Digital Certificate
      2.2.87 Digital Data
      2.2.88 Digital Signature
      2.2.89 Digital Signature Standard (DSS)
      2.2.90 Distributed Control System (DCS)
      2.2.91 Dongle
      2.2.92 Eavesdropping
      2.2.93 Electronic Deception
      2.2.94 Elliptic Curve Cryptography
      2.2.95 Encrypt
      2.2.96 Encryption
      2.2.97 Firewall
      2.2.98 Flooding
      2.2.99 Flow Control
      2.2.100 Functions
      2.2.101 Gateway
      2.2.102 Generic Upper Layer Security (GULS)
      2.2.103 Hacker
      2.2.104 Hash Function
      2.2.105 Honey Pot
      2.2.106 Identification
      2.2.107 IEEE 802.11i
      2.2.108 Information Security
      2.2.109 Instrumentation, Systems, and Automation
              Society (ISA)
      2.2.110 Integrity
      2.2.111 Intelligent Electronic Device (IED)
      2.2.112 Intercept
      2.2.113 Interchangeability
      2.2.114 Interface
      2.2.115 Internet Protocol security (IPsec)
      2.2.116 Interoperability
      2.2.117 Intruder
      2.2.118 Intrusion Detection System (IDS)
      2.2.119 Key
      2.2.120 Key Distribution
      2.2.121 Key Logger
      2.2.122 Key Pair
      2.2.123 Key Update
      2.2.124 Latency
      2.2.125 Local Area Network (LAN)
      2.2.126 Malicious Code
      2.2.127 Malware
      2.2.128 Management Information Base (MIB)
      2.2.129 Man-in-the-Middle Attack
      2.2.130 Manufacturing Message Specification (MMS)
      2.2.131 Masquerade
      2.2.132 Mockingbird
      2.2.133 Multicast
      2.2.134 Network Layer Protocol
      2.2.135 Network Management
      2.2.136 Non-repudiation
      2.2.137 Object Identifier (OID)
      2.2.138 Open Protocol
      2.2.139 Open System
      2.2.140 Open Systems Architecture
      2.2.141 Open Systems Interconnection - Reference Model
              (OSI-RM)
      2.2.142 Password
      2.2.143 Personal Identification Number (PIN)
      2.2.144 Phishing
      2.2.145 Physical Layer Protocol
      2.2.146 Plaintext
      2.2.147 Point-to-Point Protocol (PPP)
      2.2.148 Port Scanning
      2.2.149 Pretty Good Privacy (PGP)
      2.2.150 Private Key
      2.2.151 Protection Profile
      2.2.152 Proxy, Proxy Server
      2.2.153 Pseudorandom Number Generator (PRNG)
      2.2.154 Public Key
      2.2.155 Public Key Asymmetric Cryptographic Algorithm
      2.2.156 Public Key Certificate
      2.2.157 Public Key Cryptography
      2.2.158 Public Key Infrastructure (PKI)
      2.2.159 Replay Attack
      2.2.160 Repudiation
      2.2.161 Risk
      2.2.162 Risk Assessment
      2.2.163 Risk Management
      2.2.164 Rivest, Shamir and Adleman (RSA)
      2.2.165 Role Based Access Control (RBAC)
      2.2.166 Secret Key
      2.2.167 Secret Key Encryption
      2.2.168 Secret Key Symmetric Cryptographic Algorithm
      2.2.169 Secure Hash Algorithm (SHA)
      2.2.170 Secure Shell (SSH)
      2.2.171 Secure Sockets Layer (SSL)
      2.2.172 Secure/Multipurpose Internet Mail Extensions
              (S/MIME)
      2.2.173 Security
      2.2.174 Security Domain
      2.2.175 Security Guidelines
      2.2.176 Security Management
      2.2.177 Security Performance
      2.2.178 Security Perimeter
      2.2.179 Security Policy
      2.2.180 Security Risk Assessment
      2.2.181 Security Services
      2.2.182 Server
      2.2.183 Session Key
      2.2.184 Shoulder Surfing
      2.2.185 Signature Certificate
      2.2.186 Simple Network Management Protocol (SNMP)
      2.2.187 Smart Card
      2.2.188 Smurf
      2.2.189 Sniffing
      2.2.190 Social Engineering
      2.2.191 Spoof
      2.2.192 Spyware
      2.2.193 Strong Authentication
      2.2.194 Strong Secret
      2.2.195 Supervisory Control and Data Acquisition (SCADA)
      2.2.196 Symmetric Cryptography
      2.2.197 Symmetric Key
      2.2.198 Symmetric Key Algorithm
      2.2.199 SYN Flood
      2.2.200 Tamper Detection
      2.2.201 Tampering
      2.2.202 TASE.2
      2.2.203 Threat
      2.2.204 Throughput
      2.2.205 Traffic Analysis
      2.2.206 Transport Level Security (TLS)
      2.2.207 Trap Door
      2.2.208 Triple DES
      2.2.209 Trojan Horse
      2.2.210 Trust
      2.2.211 Tunnel
      2.2.212 Unforgeable
      2.2.213 Update Key
      2.2.214 Virtual Private Network (VPN)
      2.2.215 Virus
      2.2.216 Vulnerability
      2.2.217 Vulnerability Assessment
      2.2.218 Wide Area Network (WAN)
      2.2.219 WiFi
      2.2.220 Wired Equivalent Privacy (WEP)
      2.2.221 Wireless Application Protocol (WAP)
      2.2.222 Wireless LAN (WLAN)
      2.2.223 Worm
      2.2.224 X.509
3 Abbreviations
      3.1.1 3DES
      3.1.2 ACL
      3.1.3 ACSI
      3.1.4 AES
      3.1.5 AGA
      3.1.6 ANSI
      3.1.7 BIS
      3.1.8 BSI
      3.1.9 BTW
      3.1.10 CA
      3.1.11 CERT
      3.1.12 CHAP
      3.1.13 CIP
      3.1.14 CRC
      3.1.15 CRL
      3.1.16 DAA
      3.1.17 DCS
      3.1.18 DES
      3.1.19 DO
      3.1.20 DoS
      3.1.21 DSS
      3.1.22 ECC
      3.1.23 EM/RF
      3.1.24 EMS
      3.1.25 FIPS
      3.1.26 GULS
      3.1.27 ICCP
      3.1.28 IDS
      3.1.29 IED
      3.1.30 IEEE
      3.1.31 IETF
      3.1.32 IPS
      3.1.33 IPsec
      3.1.34 ISA
      3.1.35 ISO
      3.1.36 IT
      3.1.37 LAN
      3.1.38 MIB
      3.1.39 MMS
      3.1.40 NERC
      3.1.41 NIST
      3.1.42 OID
      3.1.43 OSI-RM
      3.1.44 PGP
      3.1.45 PICS
      3.1.46 PIN
      3.1.47 PIXIT
      3.1.48 PKI
      3.1.49 PLC
      3.1.50 PLC
      3.1.51 PPP
      3.1.52 PRNG
      3.1.53 RA
      3.1.54 RBAC
      3.1.55 RSA
      3.1.56 RTU
      3.1.57 SCADA
      3.1.58 SHA
      3.1.59 SNMP
      3.1.60 SSH
      3.1.61 SSL
      3.1.62 TASE.2
      3.1.63 TDEA
      3.1.64 TDES
      3.1.65 TLS
      3.1.66 VPN
      3.1.67 WAN
      3.1.68 WEP
      3.1.69 WiFi
      3.1.70 WLAN
      3.1.71 WPA
BIBLIOGRAPHY

Abstract

Describes the key terms used in the IEC 62351 series, and is not meant to be a definitive list.

General Product Information

Document Type Standard
Status Current
Publisher International Electrotechnical Committee
Committee TC 57

Contact us