IRO

IRO

Definition(s)


IRO

Information Receiving Organization. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
IPS

IPS

Definition(s)


IPS

Intrusion Prevention System. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
IPO

IPO

Definition(s)


IPO

Information Providing Organization. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
IDS

IDS

Definition(s)


IDS

Intrusion Detection System. Source:  DNVGL-RP-G108, Cyber security in the oil and gas industry based on IEC 62443, DNV GL, September 2017. Global Standards Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
ICT

ICT

Definition(s)


ICT

Information and Communications Technology. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
ICMP

ICMP

Definition(s)


ICMP

Internet Control Message Protocol. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
IAP

IAP

Definition(s)


IAP

Independent Application Provider. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
HIDS

HIDS

Definition(s)


HIDS

Host-based Intrusion Detection System. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
DDoS

DDoS

Definition(s)


DDoS

Distributed Denial-of-Service. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard
DoS

DoS

Definition(s)


DoS

Denial-of-Service Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard
CIIP

CIIP

Definition(s)


CIIP

Critical Information Infrastructure Protection. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
CSIRT

CSIRT

Definition(s)


CSIRT

Computer Security Incident Response Team. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
CIRT

CIRT

Definition(s)


CIRT

Computer Incident Response Team. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
CERT

CERT

Definition(s)


CERT

Corporate Emergency Response Team.

Source: API RP 781 Security Plan Methodology for the Oil and Natural Gas Industries.1st Ed. September 2016. Global Standards

CERT

Computer Emergency Response Team. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Zombie Computer

Zombie Computer

Definition(s)


Zombie Computer

Computer containing hidden software that enables the machine to be controlled remotely, usually to perform an attack on another computer.
  • NOTE Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious activities under remote direction.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Virtual World

Virtual World

Definition(s)


Virtual World

Simulated environment accessed by multiple users through an online interface.
  • NOTE 1 The simulated environments are often interactive.
  • NOTE 2 The physical world in which people live, and the related characteristics, will be referred to as the “real world” to differentiate it from a virtual world.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Virtual Currency

Virtual Currency

Definition(s)


Virtual Currency

Monetary virtual assets. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Virtual Asset

Virtual Asset

Definition(s)


Virtual Asset

Representation of an asset in the Cyberspace.
  • NOTE In this context, currency can be defined as either a medium of exchange or a property that has value in a specific environment, such as a video game or a financial trading simulation exercise.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Unsolicited Email

Unsolicited Email

Definition(s)


Unsolicited Email

Email that is not welcome, or was not requested, or invited. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Trojan

Trojan

Definition(s)


Trojan

Malware that appears to perform a desirable function. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Scam

Scam

Definition(s)


Scam

Fraud or confidence trick. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Robot

Robot

Definition(s)


Robot

Automated software program used to carry out specific tasks.
  • NOTE 1 The word is often used to describe programs, usually run on a server, that automate tasks such as forwarding or sorting e-mail.
  • NOTE 2 A bot is also described as a program that operates as an agent for a user or another program or simulates a human activity. On the Internet, the most ubiquitous bots are the programs, also called spiders or crawlers, which access websites and gather their content for search engine indexes.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Potentially Unwanted Software

Potentially Unwanted Software

Definition(s)


Potentially Unwanted Software

Deceptive software, including malicious and non-malicious software, that exhibits the characteristics of deceptive software. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Physical Asset

Physical Asset

Definition(s)


Physical Asset

Asset that has a tangible or material existence.
  • NOTE Physical assets usually refer to cash, equipment, inventory and properties owned by the individual or organization. Software is considered an intangible asset, or a non-physical asset.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Malicious Contents

Malicious Contents

Definition(s)


Malicious Contents

Applications, documents, files, data or other resources that have malicious features or capabilities embedded, disguised or hidden in them. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Malicious Software

Malicious Software

Definition(s)


Malicious Software

Software designed with malicious intent containing features or capabilities that can potentially cause harm directly or indirectly to the user and/or the user’s computer system EXAMPLES Viruses, worms, trojans. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Internet Service Provider

Internet Service Provider

Definition(s)


Internet Service Provider

Organization that provides Internet services to a user and enables its customers access to the Internet.
  • NOTE Also sometimes referred to as an Internet access provider.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Internet Services

Internet Services

Definition(s)


Internet Services

Services delivered to a user to enable access to the Internet via an assigned IP address, which typically include authentication, authorization and domain name services. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Internet Safety

Internet Safety

Definition(s)


Internet Safety

Condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event in the Internet which could be considered non-desirable. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Internet Crime

Internet Crime

Definition(s)


Internet Crime

Criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards