Bot Herder

Bot Herder

Definition(s)


Bot Herder

The controller of a botnet that, from a remote location, provides direction to the compromised computers in the botnet. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Bot

Bot

Definition(s)


Bot

Automated software program used to carry out specific tasks.
  • NOTE 1 The word is often used to describe programs, usually run on a server, that automate tasks such as forwarding or sorting e-mail.
  • NOTE 2 A bot is also described as a program that operates as an agent for a user or another program or simulates a human activity. On the Internet, the most ubiquitous bots are the programs, also called spiders or crawlers, which access websites and gather their content for search engine indexes.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards

Bot

A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator. Extended Definition: A member of a larger collection of compromised computers known as a botnet. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Blue Team

Blue Team

Definition(s)


Blue Team

A group that defends an enterprise's information systems when mock attackers (i.e., the Red Team) attack, typically as part of an operational exercise conducted according to rules established and monitored by a neutral group (i.e., the White Team). Also, a group that conducts operational vulnerability evaluations and recommends mitigation techniques to customers ho need an independent technical review of their cybersecurity posture. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Blacklist

Blacklist

Definition(s)


Blacklist

A list of entities that are blocked or denied privileges or access. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Behavioral Monitoring

Behavioral Monitoring

Definition(s)


Behavioral Monitoring

Observing activities of users, information systems, and processes and measuring the activities against organizational policies and rule, baselines of normal activity, thresholds, and trends. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Behavior Monitoring

Behavior Monitoring

Definition(s)


Behavior Monitoring

Observing activities of users, information systems, and processes and measuring the activities against organizational policies and rule, baselines of normal activity, thresholds, and trends. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Authenticity

Authenticity

Definition(s)


Authenticity

A property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or a message, or sender of information or a message. Adapted from: CNSSI 4009, NIST SP 800-53 Rev 4 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Authentication

Authentication

Definition(s)


Authentication

The process of verifying the identity or other attributes of an entity (user, process, or device). Extended Definition: Also the process of verifying the source and integrity of data. Adapted from: CNSSI 4009, NIST SP 800-21, NISTIR 7298 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Authentication

Property that an entity is what it is claims to be. Source: ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary, Third Edition, January 2014. Global Standards  

Authentication

Process of validating identity. Source:  DNVGL-RP-G108, Cyber security in the oil and gas industry based on IEC 62443, DNV GL, September 2017. Global Standards

Authentication

Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information [9]. Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard

Attacker

Attacker

Definition(s)


Attacker

An individual, group, organization, or government that executes an attack. Extended Definition: A party acting with malicious intent to compromise an information system. Adapted from: Barnum & Sethi (2006), NIST SP 800-63 Rev 1 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Surface

Attack Surface

Definition(s)


Attack Surface

The set of ways in which an adversary can enter a system and potentially cause damage. Extended Definition: An information system's characteristics that permit an adversary to probe, attack, or maintain presence in the information system. Adapted from: Manadhata, P.K., & Wing, J.M. in Attack Surface Measurement, retrieved from http://www.cs.cmu.edu/~pratyus/as.html#introduction Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Signature

Attack Signature

Definition(s)


Attack Signature

A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks. Extended Definition: An automated set of rules for identifying a potential threat (such as an exploit or the presence of an attacker tool) and possible responses to that threat. Adapted from: NCSD Glossary, CNSSI 4009, ISSG V1.2 Database Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Pattern

Attack Pattern

Definition(s)


Attack Pattern

Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation. Extended Definition: For software, descriptions of common methods for exploiting software systems. Adapted from: Oak Ridge National Laboratory Visualization Techniques for Computer Network Defense, MITRE's CAPEC web site Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Path

Attack Path

Definition(s)


Attack Path

Steps that a threat takes or may take to plan, prepare for, and execute an attack.

Source:API STANDARD 780, Security Risk Assessment Methodology for the Petroleum and Petrochemical Industries, First Edition, May 2013. Global Standards

Attack Path

Steps that an adversary takes or may take to plan, prepare for, and execute an attack. Sample Usage: Part of the attack path for the car bombing involved dozens of individuals moving money, arms and operatives from the terrorist safe haven to the target area. Annotation: An attack path may include recruitment, radicalization, and training of operatives, selection and surveillance of the target, construction or procurement of weapons, funding, deployment of operatives to the target, execution of the attack, and related post-attack activities. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance

Attack Path

The steps that an adversary takes or may take to plan, prepare for, and execute an attack. Adapted from: DHS Risk Lexicon, NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Mode

Attack Mode

Definition(s)


Attack Mode

The steps that an adversary takes or may take to plan, prepare for, and execute an attack. Adapted from: DHS Risk Lexicon, NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack Method

Attack Method

Definition(s)


Attack Method

Manner and means, including the weapon and delivery method, a threat may use to cause harm on a target.

Source:API STANDARD 780, Security Risk Assessment Methodology for the Petroleum and Petrochemical Industries, First Edition, May 2013. Global Standards

Attack Method

Manner and means, including the weapon and delivery method, an adversary may use to cause harm on a target. Sample Usage: Analysts have identified weaponization of an aircraft as an attack method that terrorists may use. Annotation: Attack method and attack mode are synonymous. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance

Attack Method

The manner or technique and means an adversary may use in an assault on information or an information system. Adapted from: DHS Risk Lexicon, NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Attack Method

The steps that an adversary takes or may take to plan, prepare for, and execute an attack. Adapted from: DHS Risk Lexicon, NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Attack

Attack

Definition(s)


Attack

Assault on a system that derives from an intelligent threat — i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system [11].
  • NOTE: There are different commonly recognized classes of attack:
    • An "active attack" attempts to alter system resources or affect their operation. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources.
    • An "inside attack" is an attack initiated by an entity inside the security perimeter (an "insider") – i.e., an entity that is authorized to access system resources but uses them in a way not approved by those who granted the authorization. An "outside attack" is initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (including an insider attacking from outside the security perimeter). Potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments.
Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard

Attack

Attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Source: ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary, Third Edition, January 2014. Global Standards  

Attack

Attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. [ISO/IEC 27000:2009]. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards

Attack

An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. Extended Definition: The intentional act of attempting to bypass one or more security services or controls of an information system. From: NCSD Glossary. NTSSI 4009 (2000), CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Asymmetric Cryptography

Asymmetric Cryptography

Definition(s)


Asymmetric Cryptography

A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair). Adapted from: CNSSI 4009, FIPS 140-2, InCommon Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Antivirus Software

Antivirus Software

Definition(s)


Antivirus Software

A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code. Adapted from: NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Antispyware Software

Antispyware Software

Definition(s)


Antispyware Software

A program that specializes in detecting and blocking or removing forms of spyware. Adapted from: NCSD Glossary Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Analyze

Analyze

Definition(s)


Analyze

A NICE Workforce Framework category consisting of specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. From: NICE Workforce Framework Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
All Source Intelligence

All Source Intelligence

Definition(s)


All Source Intelligence

In the NICE Workforce Framework, cybersecurity work where a person: Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications. From: NICE Workforce Framework Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Adversary

Adversary

Definition(s)


Adversary

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. From: DHS Risk Lexicon Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards

Adversary

Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities Sample Usage: Al-Qaeda is an adversary of the United States. Annotation:
  1. An adversary can be hypothetical for the purposes of training, exercises, red teaming, and other activities.
  2. An adversary differs from a threat in that an adversary may have the intent, but not the capability, to conduct detrimental activities, while a threat possesses both intent and capability.
Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance  

Canadian Standards Association

Any individual, group, organization, or government that conducts activities detrimental to an operator’s assets or has the intention and capability to conduct such activities. Note: An adversary can include political and terrorist groups, criminals, disgruntled employees, and private interests; an adversary can also include site insiders, site outsiders, or the two acting in collusion. (Source: Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries). Source: Canadian Standards Association, Z246.1-09, Security management for petroleum and natural gas industry systems, August 2009, Regional Standards

Advanced Persistent Threat

Advanced Persistent Threat

Definition(s)


Advanced Persistent Threat

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). From: NIST SP 800-53 Rev 4 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Active Content

Active Content

Definition(s)


Active Content

Software that is able to automatically carry out or trigger actions without the explicit intervention of a user. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Active Attack

Active Attack

Definition(s)


Active Attack

An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations. Adapted from: IETF RFC 4949, NIST SP 800-63 Rev 1 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Access Control Mechanism

Access Control Mechanism

Definition(s)


Access Control Mechanism

Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Access Control

Access Control

Definition(s)


 Access Control

A process by which entry into and internal movement within a facility is managed. Source: API RP 781 Security Plan Methodology for the Oil and Natural Gas Industries.1st Ed. September 2016. Global Standards

Access Control

The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Access Control

Means to ensure that access to assets is authorized and restricted based on business and security requirements. Source: ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary, Third Edition, January 2014. Global Standards  

Access Control

Protection of system resources against unauthorized access; a process by which use of system resources is regulated according to a security policy and is permitted by only authorized entities (users, programs, processes, or other systems) according to that policy [11]. Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard  

Canadian Standards Association

The control of persons, vehicles, and materials through entrances and exits of a restricted area.
  • Note: Access control is an aspect of security that often utilizes a combination of electronic and hardware systems and specialized procedures to control and monitor movement into, out of, and within a restricted area. Access to various areas might be limited to place or time or a combination of both.
(Source: www.asisonline.org, 2006) Source: Canadian Standards Association, Z246.1-09, Security management for petroleum and natural gas industry systems, August 2009, Regional Standards

Identity and Access Management

Identity and Access Management

Definition(s)


Identity and Access Management

The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Identity and Access Management

The methods and processes used to manage subjects and their authentication and authorizations to access specific objects. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Access and Identity Management

Access and Identity Management

Definition(s)


Access and Identity Management

The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities. Adapted from: CNSSI 4009 Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Worker

Worker

Definition(s)


Worker

person performing one or more activities to achieve a goal within a work system (2.2) [SOURCE: ISO 26800:2011, 2.11, modified — synonym “operator” omitted]. Source: IOGP Report No. 510, Operating Management System Framework for controlling risk and delivering high performance in the oil and gas industry, International Association of Oil & Gas Producers, June 2014. Global Standards  

Worker

person performing one or more activities to achieve a goal within a work system (2.2) [SOURCE: ISO 26800:2011, 2.11, modified — synonym “operator” omitted]. Source: ISO 6385:2016, Ergonomics principles in the design of work systems, Third Edition, September 2016. Global Standards