Zone 22

Zone 22

Definition(s)


Zone 22

Area in which an explosive atmosphere in the form of a cloud of dust in air is not likely to occur in normal operation but, if it does occur, will persist for a short period only. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Zone 21

Zone 21

Definition(s)


Zone 21

Area in which an explosive atmosphere in the form of a cloud of dust in air is likely to occur, occasionally, in normal operation. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Zone 20

Zone 20

Definition(s)


Zone 20

Area in which an explosive atmosphere in the form of a cloud of dust in air is present continuously, or for long periods or frequently. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Zones

Zones

Definition(s)


Zones

Hazardous areas classified into zones based upon the frequency of the occurrence and duration of an explosive atmosphere. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Maximum Permissible Surface Temperature

Maximum Permissible Surface Temperature

Definition(s)


Maximum Permissible Surface Temperature

Highest temperature that a surface of electrical equipment is allowed to reach in practical service to avoid ignition. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Hybrid Mixture

Hybrid Mixture

Definition(s)


Hybrid Mixture

Mixture of a flammable gas or vapour with a combustible dust. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Group

Group

Definition(s)


Group

Group of electrical equipment for explosive atmospheres> classification of electrical equipment related to the explosive atmosphere for which it is to be used Note 1 to entry: Electrical equipment for use in explosive atmospheres is divided into three groups:
  • Group I: electrical equipment for mines susceptible to firedamp;
  • Group II (which can be divided into subgroups): electrical equipment for places with an explosive gas atmosphere, other than mines susceptible to firedamp;
  • Group III (which can be divided into subgroups): electrical equipment for places with an explosive dust atmosphere.
Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Electrical Equipment and Power Systems

Electrical Equipment and Power Systems

Definition(s)


Electrical Equipment and Power Systems

Electrical equipment and power systems include all plant and apparatus designed for the generation, conversion, storage, distribution, transformation or use of electricity. Source: International Association of Drilling Contractors, Appendix 2 to Health, Safety and Environment Case Guidelines for Offshore Drilling Contractors, Issue 3.3.2, February 2010. IADC. Guidelines
Verification Dossier

Verification Dossier

Definition(s)


Verification Dossier

Set of documents showing the compliance of electrical equipment and installations. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Competent Body

Competent Body

Definition(s)


Competent Body

Individual or organization which can demonstrate appropriate technical knowledge and relevant skills to make the necessary assessments of the safety aspect under consideration. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Zombie

Zombie

Definition(s)


Zombie

Computer containing hidden software that enables the machine to be controlled remotely, usually to perform an attack on another computer.
  • NOTE Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious activities under remote direction.
Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards

Zombie

A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator. Extended Definition: A member of a larger collection of compromised computers known as a botnet. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Worm

Worm

Definition(s)


Worm

A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. From: CNSSI 4009. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Worm

Computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively [11]. Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard
Work Factor

Work Factor

Definition(s)


Work Factor

An estimate of the effort or time needed by a potential adversary, with specified expertise and resources, to overcome a protective measure. Adapted from: CNSSI 4009. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
White Team

White Team

Definition(s)


White Team

A group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems. Adapted from: CNSSI 4009. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Weakness

Weakness

Definition(s)


Weakness

A shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities. Adapted from: ITU-T X.1520 CWE, FY 2013 CIO FISMA Reporting Metrics. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Vulnerability Assessment and Management

Vulnerability Assessment and Management

Definition(s)


Vulnerability Assessment and Management

In the NICE Workforce Framework, cybersecurity work where a person: Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. From: NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Virus

Virus

Definition(s)


Virus

A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer. Adapted from: CNSSI 4009. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Virus

Self-replicating or self-reproducing program that spreads by inserting copies of itself into other executable code or documents.

Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard
Trojan Horse

Trojan Horse

Definition(s)


Trojan Horse

Malware that appears to perform a desirable function. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards

Trojan Horse

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. From: CNSSI 4009. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards  

Trojan Horse

Computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program [11]. Source: ANSI/ISA–99.00.01–2007, Security for Industrial Automation and Control Systems, Part 1: Terminology, Concepts, and Models, 29 October 2007. National Standard
Traffic Light Protocol

Traffic Light Protocol

Definition(s)


Traffic Light Protocol

A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience. Adapted from: US-CERT. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Ticket

Ticket

Definition(s)


Ticket

In access control, data that authenticates the identity of a client or a service and, together with a temporary encryption key (a session key), forms a credential. Adapted from: IETF RFC 4120 Kerberos V5, July 2005; Conrad, E., Misenauer, S., & Feldman, J. (2010). CISSP® Study Guide. Burlington, MA: Syngress. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Threat Assessment

Threat Assessment

Definition(s)


Threat Assessment

A product or process of identifying or evaluating entities, actions, or occurrences that has or has indicated the potential to harm life, information, operations, or property. Source: API RP 781 Security Plan Methodology for the Oil and Natural Gas Industries.1st Ed. September 2016. Global Standards

Threat Assessment

The product or process of identifying or evaluating entities, actions, or occurrences, whether natural or manmade, that have or indicate the potential to harm life, information, operations, and/or property. From: DHS Risk Lexicon and adapted from: CNSSI 4009, NIST SP 800-53, Rev 4. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards

Threat Assessment

Product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that has or indicates the potential to harm life, information, operations, and/or property.

Source:API STANDARD 780, Security Risk Assessment Methodology for the Petroleum and Petrochemical Industries, First Edition, May 2013. Global Standards
Threat Analysis

Threat Analysis

Definition(s)


Threat Analysis

The detailed evaluation of the characteristics of individual threats. Extended Definition: In the NICE Workforce Framework, cybersecurity work where a person: Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities. Adapted from: DHS personnel; From NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Threat Agent

Threat Agent

Definition(s)


Threat Agent

Causative agent of a threat action. Source:  DNVGL-RP-G108, Cyber security in the oil and gas industry based on IEC 62443, DNV GL, September 2017. Global Standards

Threat Agent

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. Adapted from: DHS Risk Lexicon. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Threat Actor

Threat Actor

Definition(s)


Threat Actor

An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities. Adapted from: DHS Risk Lexicon. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Test and Evaluation

Test and Evaluation

Definition(s)


Test and Evaluation

In the NICE Workforce Framework, cybersecurity work where a person: Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating information technology. From: NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Technology Research and Development

Technology Research and Development

Definition(s)


Technology Research and Development

In the NICE Workforce Framework, cybersecurity work where a person: Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility. From: NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Targets

Targets

Definition(s)


Targets

In the NICE Workforce Framework, cybersecurity work where a person: Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies. From: NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards
Tailored Trustworthy Space

Tailored Trustworthy Space

Definition(s)


Tailored Trustworthy Space

A cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security based on the user's context and in the face of an evolving range of threats. Adapted from: National Science and Technology Council's Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards