Term
Advanced Persistent Threat |
|
Definition
A class of threat designed to infiltrate a network, remain through evasion and propagaion techniques. Typically used to esablish and maintain an external command and control channel through which the attacker can continuously exfiltrate data. |
|
|
Term
|
Definition
Any device used within an industrial network |
|
|
Term
|
Definition
The collectively exposed portions of that system or asset. A large ___ means that there are many exposed areas that an attack could target, while a small ____ means that the target is relatively small. |
|
|
Term
|
Definition
Communications channel that is hidden to avoid detection. also used in reference to hidden or covert communications occuring back towards the orginating sender, that is, malware hidden in the return traffic of a bidirectional communication. |
|
|
Term
|
Definition
Chimical Facility Anti-Terrorism Standard.
Established by homeland security to protect the manufacture, storage and distribution of potentially hasardous chemicals. |
|
|
Term
|
Definition
typically used within regulatory standards or guidelines to indicate when an alternative method that those typically addressed but the standard or guideline |
|
|
Term
|
Definition
Operations center, typically consist of SCADA and HMI systems that provide interaction with industrial/automated processes. |
|
|
Term
|
Definition
A larger pattern match consisting of two or more regular logs or events, as detected by an event correlation system. |
|
|
Term
|
Definition
an asset that is itself responsible for performing a critical function, or directly impacts an asset that performs a critical function. Heavily used within NERC reliability standards for Critical Infrastructure Protection |
|
|
Term
|
Definition
A digitally connected asset that is itelf responsible for performing a critical function, or directly impacts an asset that performs a critical function. Heavily used within MRC regulations and guideance documents. |
|
|
Term
|
Definition
Any infrastructure whose disruption could have server impact on a nation or societ.
In the US, it is defined by the Homeland Security Presidential Directive Seven as: Aggriculture and Food, Banking and Finacne, Chemical, COmmercial Facilities, Critical Manufacturing, Dams, Defense Industrial Base, Drinking Water and Water Treatment Systems, Emergency Services, Energy, Government Facilities, Infomration Technology, National Monuments and Icons, Nuclear Reactors Materials and waste, Postal and Shipping, Public Health and Healthcare, Telecommunications, and TransportationSystems. |
|
|
Term
|
Definition
An asset that is connected to a routable network, that is, a Host. |
|
|
Term
|
Definition
a "one way" data communication device, often consisiting of a physical-layer unidirectional limitation. Using only one half of a fiber optic "transmit/receive" pair would enforce unidirectional communication at the physical layer while proper configuration of a network firewall oculd logically enforce unidirectional communication at the network layer. |
|
|
Term
Database Activety Monitor (DAM) |
|
Definition
Includes SQL, DML, and others. It May be network or host based. network-based transaction by decoding and interpreting network traffic, while host-based provide system-level auditing directly from the server.
Can be used for indications of malicious intent (SQL Injections), Fraud (eg the manipulation of stored data) and/or as a means of logging data access for systems that do not or cannot produce auditable logs. |
|
|
Term
Deep Packet Inspection (DPI) |
|
Definition
inspecting all the way down to application layer (layer 7) of the OSI model. That is, past datalink, network or session headers to inspect all the way into the payload of the packet. This is used by most IDS/IPS, newer firewalls, and other security devices. |
|
|
Term
Distributed Control System |
|
Definition
An Industrial Control System deployed and controlled in a distributed manner, such that various distributed control systems or processes are controllled individually. |
|
|
Term
Electronic Security Perimeter |
|
Definition
Refers to the demarcation point between a secured enclave, such as a control system, and a less trusted network, such as a business network. It typically includes the devices, such as firewalls, IDS, IPS, Industrial Protocal Filters, Application Monitors, and similar devices that secure the demarcation points. |
|
|
Term
|
Definition
A logical grouping of assets, systems and/or services that defines and contains one or more funcitonal gorups. They represent network "zones" that can be used to isolate certain funciont in order to more effectively secure them. |
|
|
Term
|
Definition
The process of identifying valid identities of devices and users in a network; typically as an intial step in a network attack process. It allows an attacker to identify valid systems and/or accounts that can then be targetd for exploitsation or compromise. |
|
|
Term
|
Definition
A command that is a network tool that provides detailedn information about a user |
|
|
Term
|
Definition
Various numeric identifiers used within industrial network protocols for command and control purposes. |
|
|
Term
|
Definition
Host Intrusion Detection System |
|
|
Term
|
Definition
Host Intrusion Prevention System |
|
|
Term
Homeland Security Presidential Directive Seven
(HSPD-7) |
|
Definition
Homeland Security defines 18 critical infrastructures within the US. |
|
|
Term
Identity Access Management |
|
Definition
The process of magain user identities and user accounts, as well as related user access and authentication activities within a network; and a category of products designed to centralize and automate those funcions. |
|
|
Term
IED - Intelligent Electronic Device |
|
Definition
An elctronic component - such as a regulator, circuit control, etc... that has a microprocessor and is able to communicate, typically digitally using fielbus, rel-time etherent or other industrial protocols |
|
|
Term
Industrial Control System (ICS) |
|
Definition
Devices, network, and controls used to operate and/or automate an industrial process |
|
|
Term
Inter Control Center Protocl (ICCP) |
|
Definition
Real-time industrial network protocol designed for wide area intercommunication between two or more control centers. It is an internationally recognized standard published by the Internation Elctrotechnical Commineion (IEC) |
|
|
Term
Internation Elctrotechnical Commision (IEC) |
|
Definition
Internation standards orginization that develops standards for the purposes of consensus and conformity among international technology developers, vendors and users. |
|
|
Term
Internation Standards Orginization |
|
Definition
A network of standards orginization from over 160 countries, which develops and publishes atandards covering a wide range of topics. |
|
|
Term
Lightweight Directory Access Protocol (LDAP) |
|
Definition
standard which defines a standard process for accessing and utilized network-based directories. It is used by a variety of directories and Identity Access Management (IAM) systems. |
|
|
Term
|
Definition
Controlling asset or host involoved in an industrial protocol communication session. It is typically responsible for timing synchronization, and command and control aspects of an industrial network protocol. |
|
|
Term
|
Definition
A Protocol used for intercommunication between industrial control assets. Modbus is a flexible Master/Slave command and control protocol available in several variants. |
|
|
Term
NEI - The Nuclear Energy Institue |
|
Definition
an Orginization that is dedicated to and governed by the US Nuclear Utlity companies |
|
|
Term
Network Access Control (NAC) |
|
Definition
provides measures of controlling access to the network, using technologies such as 802.1x (port network access control) to require authentication for a network port to be enabled, or orther access control methods. |
|
|
Term
North American Electric Reliability Corporation |
|
Definition
An orginization that develops and evforces reliability standards for and monitors the activities of the bulk electric power grid in North America |
|
|
Term
Nuclear Regulatory COmmision |
|
Definition
a five member presidentially appointed commisision responsible for the save use of radioactive materials. |
|
|
Term
|
Definition
Open Source Security Information Management |
|
|
Term
|
Definition
The DNP3 slave or remote device. The term is also used more generically as a remote SCADA system, typically interconected with central SCADA systems by a WAN |
|
|
Term
|
Definition
An industrial field bus protocol |
|
|
Term
|
Definition
An implementation of Profibus designed to operate in relatime over ethernet |
|
|
Term
|
Definition
A research project that demonstrated how a cyber attack could result in the explosion of a generator. |
|
|
Term
Risk Based Performance Standards - RBPS |
|
Definition
reccomendations for meeting the security controls required by the Chemical Facility Anti-Terrorism Standard (CFATS) |
|
|
Term
|
Definition
Refers to a trusted network. When discussing unidirection communication in critical networks, traffic is typically only allowed outward. |
|
|
Term
Remote Terminal Unit (RTU) |
|
Definition
A device combining remote communication capabilities with programmable loginc for the control of processes in remote locations |
|
|
Term
|
Definition
latest version of Serial Real-time COmmunications System |
|
|
Term
|
Definition
defined values signifying a target metric against which programmable logic can operate. |
|
|
Term
|
Definition
A state of awareness within a network in order to identify and respond to network-based attacks. |
|
|
Term
|
Definition
A term referring to the use of both black listing and white listing with a centralized intelligence system such as a SIEM |
|
|
Term
|
Definition
AN advanced cyber attack against an industrial control system, consisting of multiple zero-day exploits used for the delivery of malware that then targeted and infected specific industrial controls for the purposes of sabotaging an automated process. Widely regarded as the first cyber attack to specfically target an ICS |
|
|
Term
Supervisory Control and Data Acquisition |
|
Definition
Revers to the systems and networks that communicate with industrial control systems to provide data to operators for supervisory purposes, as well as control capabiliteis for process management. |
|
|
Term
Technical Feasibility/Technical Feasibility Exception (TFE) |
|
Definition
used to indicate where a requried control can be reasonably implemented. Where the implementation of a required control is not technically feasibl. |
|
|
Term
|
Definition
A Logical boundary or enclave containing assets of like function and/or criticality, for the purposes of facilitating the security of common systems and services |
|
|