Cyber Attack

From CIPedia
Jump to navigation Jump to search


Definitions

European/EU Definitions

DORA

‘Cyber-attack’ means a malicious ICT-related incident caused by means of an attempt perpetrated by any threat actor to destroy, expose, alter, disable, steal or gain unauthorised access to, or make unauthorised use of, an asset. [1]


CIPS / ISEC

Attacks against information systems carried out by using malicious software, including botnets. [2]


ECA

Cyberattack: An attempt to undermine or destroy the confidentiality, integrity and availability of data or a computer system through cyberspace. [3]

[BG] Киберотбрана: Подкатегория на киберсигурността, насочена към защита на киберпространството с военни и други подходящи средства с цел постигане на стратегически военни цели.

[CS] Kybernetický útok: Pokus narušit nebo zničit důvěrnou povahu, integritu a dostupnost údajů nebo počítačový systém prostřednictvím kyberprostoru.

[DE] Cyberangriff: Versuch, die Vertraulichkeit, Integrität und Verfügbarkeit von Daten oder eines Computersystems zu untergraben oder zu zerstören.

[DK] Cyberangreb: Et forsøg på at underminere eller ødelægge fortroligheden, integriteten og tilgængeligheden af data eller et omputersystem via cyberspace.

[ES] Ciberataque: Intento de socavar o destruir la confidencialidad, la integridad y la disponibilidad de datos o de un sistema informático a través del ciberespacio.

[NE] Cyberaanval: Een poging om de vertrouwelijkheid, integriteit en beschikbaarheid van gegevens of een computersysteem via de cyberspace te ondermijnen of ze te vernietigen.



Other International Definitions

ITU-T

(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [4]

By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed

when they bypass the mechanism, or when they make the system use the mechanism incorrectly.

Attaque: Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. [5]


Ataque: Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. [6]


攻击: 为绕过一个系统的安全机制或利用其漏洞而采取的行动. [7]


NATO

CCD-CoE (Tallinn manual)
Cyber attack is a cyber operation, whether offensive of defensive, that is reasonable expected to cause injury or death to persons or damage or destruction to objects. [8]


National Definitions

Albania

Sulm kibernetik – konsiderohet çdo përpjekje e drejtuar/qëllimshme për të marrë akses, manipuluar, ndërhyrë ose dëmtuar integritetin, konfidencialitetin, sigurinë dhe/ose disponibilitetin e të dhënave, të një aplikimi ose të të dhënave të sistemit kompjuterik, pa patur autoritet ligjor për ta bërë këtë. [9]


Australia

Cyber attack as a deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity. [10]


Cyber attack: A malicious attempt to damage, destroy or disrupt data and computer systems or networks. [11]

Note that while these attacks occur using ‘cyber’ or online means, they can have physical or real world consequences.

Austria

„Cyberangriff“ einen böswilligen IKT-bezogenen Vorfall, der auf den Versuch eines Angreifers zurückgeht, einen Vermögenswert zu zerstören, freizulegen, zu verändern, zu deaktivieren, zu entwenden oder auf unberechtigte Weise auf diesen Vermögenswert zuzugreifen oder ihn auf unberechtigte Weise zu nutzen. [12]


Cyber attack refers to an attack carried out in cyberspace through tools, services, or applications in cyberspace, which is directed against one or several IT system(s). Its aim is to undermine the objectives of ICT security protection (confidentiality, integrity and availability) partly or totally. [13]

Ein Cyber Angriff ist ein Angriff mit Mitteln der IT im Cyber Raum, der sich gegen einen oder mehrere andere IT-Systeme richtet und zum Ziel hat, die Schutzziele der IKT Sicherheit als Teil oder Ganzes zu verletzen. [14]



Belize

Cyber Attack: Is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. [15]



Belgium

“Cyberaanval”: een kwaadwillig ICT-gerelateerd incident dat het gevolg is van een door een dreigingsactor gepleegde poging om een actief te vernietigen, bloot te stellen, te veranderen, buiten werking te stellen, te stelen of er ongeoorloofde toegang toe te verkrijgen of er ongeoorloofd gebruik van te maken. [16]

«Cyberattaque»: un incident lié aux TIC malveillant causé par une tentative de destruction, d’exposition, de modification, de désactivation, de vol, d’utilisation non autorisée d’un actif ou d’accès non autorisé à celui-ci, perpétrée par un acteur de la menace. [17]

„Cyberangriff“ einen böswilligen IKT-bezogenen Vorfall, der auf den Versuch eines Angreifers zurückgeht, einen Vermögenswert zu zerstören, freizulegen, zu verändern, zu deaktivieren, zu entwenden oder auf unberechtigte Weise auf diesen Vermögenswert zuzugreifen oder ihn auf unberechtigte Weise zu nutzen. [12]


Botswana

Cyber attack is an attempt by hackers or malicious actors to damage or disrupt the normal functioning of a computer network/ system/ application. [18]



Bulgaria

„кибератака“ означава инцидент с ИКТ в резултат на злонамерен акт, причинен от опит на източник на заплаха с цел унищожаване, разкриване, промяна, деактивиране, открадване или получаване на непозволен достъп или непозволено използване на актив. [19]


Кибер атака: злонамерена дейност, която цели да разруши, да осигури контрол над компютърна среда/инфраструктура, да наруши интегритет на данни или открадне контролирана информация. [20]

(НАТО) Действия, предприети за нарушаване, отхвърляне, влошаване или разрушаване на информация, намираща се в компютър и/или компютърна мрежа или на компютъра и/или компютърната мрежа. [21]


Burkina-Faso

Attaque est in action de malveillance consistant à tenter de contourner les fonctions de sécurité d’un Système Informatique. Il existe deux types d’attaques, les attaques passives et les attaques actives. Une attaque passive ne modifie pas le fonctionnement normal des communications et du réseau : elle se base sur l’Observation et l’Analyse du trafic. Une attaque active modifie l’état de la communication et du réseau et prend trois formes possibles: Altération des messages, Refus de Service et Connexion frauduleuse. [22]



Canada

Cyber Attack: An attack that involves the unauthorized use, manipulation, interruption or destruction of, or access to, via electronic means, electronic information or the electronic devices or computer systems and networks used to process, transmit or store that information. [23]

Cyberattaque: Attaque qui suppose l'accès non autorisé à des renseignements électroniques ou à des appareils électroniques, à des systèmes informatiques et à des réseaux utilisés pour traiter, transmettre ou stocker cette information, ou encore leur utilisation, manipulation, interruption ou destruction (par voie électronique). [24]


Cyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means) of electronic information and/or the electronic and physical infrastructure used to process, communicate and/or store that information. [25]

Les cyberattaques comprennent l’accès involontaire ou non autorisé à des renseignements électroniques et/ou des infrastructures électroniques ou matérielles utilisés pour traiter, communiquer ou entreposer cette information, ainsi que leur utilisation, leur manipulation, leur interruption ou leur destruction (par voie électronique). [26]


Chile

Ciberataque: es una expresión del ciberconflicto consistente en acciones hostiles desarrolladas en el ciberespacio con el objetivo de irrumpir, explotar, denegar, degradar o destruir la infraestructura tecnológica, componente lógico o interacciones de éste y pueden tener distintos niveles según su duración, frecuencia y daño generado. [27]



Colombia

Ataque cibernético: Acción organizada y/o premeditada de una o más personas para causar daño o problemas a un sistema informático a través del ciberespacio. [28]

Cyberattack: organised and / or premeditated misconduct or one or more individuals to cause damage to a computer system problems through cyberspace.

Ataque cibernético: acción organizada o premeditada de una o más agentes para causar daño o problemas a un sistema a través del Ciberespacio. [29]



Costa Rica

Ataque cibernético / ciberataque: Acción que tiene por propósito interrumpir, desactivar, destruir o controlar malintencionadamente un entorno/infraestructura informática; o destruir la integridad de los datos o el robo de información controlada. [30]

Sinónimo de ciberataque.

Croatia

„Kibernapad” znači zlonamjeran IKT incident uzrokovan pokušajem bilo kojeg aktera prijetnje da uništi, izloži, izmijeni, onemogući, ukrade ili neovlašteno koristi imovinu ili joj neovlašteno pristupi;. [31]


Cuba

Ataque cibernético: Acción intencionada en el ciberespacio con el objetivo de deshabilitar, destruir o controlar de forma maliciosa una infraestructura o sistema de información, destruir la integridad de los datos o robar información controlada. [32]


Ciberataques: Acto en el que se cometen agravios, daños o perjuicios a equipos y sistemas de computación que se encuentran operando en la red a nivel mundial. Puede ser orientado hacia la información, datos, protocolos, servicios, personas o grupos de ellas, entidades o instituciones usando medios de computadoras conectadas o no a Internet. [32]



Cyprus

«κυβερνοεπίθεση»: κακόβουλο συμβάν που σχετίζεται με τις ΤΠΕ και προκαλείται μέσω απόπειρας καταστροφής, έκθεσης, μεταβολής, απενεργοποίησης, υποκλοπής ή απόκτησης μη εξουσιοδοτημένης πρόσβασης ή μη εξουσιοδοτημένης χρήσης πόρου, η οποία τελείται από οποιονδήποτε παράγοντα απειλής. [33]


Czech Republic

„Kybernetickým útokem“ zlovolný incident související s IKT způsobený jakýmkoli aktérem hrozby s cílem zničit, odhalit, pozměnit, deaktivovat či odcizit aktivum nebo k němu získat neoprávněný přístup či ho neoprávněně využívat. [34]


Kybernetický útok: Útok na IT infrastrukturu za účelem způsobit poškození a získat citlivé či strategicky důležité informace. Používá se nejčastěji v kontextu politicky či vojensky motivovaných útoků. [35]

Cyber attack: Attack on IT infrastructure having the objective of causing damage and obtaining sensitive or strategically important information. It is used most often in the context of either politically or militarily motivated attacks. [35]



Denmark

»Cyberangreb«: en ondsindet IKT-relateret hændelse, som er forårsaget af en trusselsaktørs forsøg på ødelæggelse, eksponering, ændring, deaktivering, tyveri af eller opnåelse af uautoriseret adgang til eller uautoriseret brug af et aktiv. [36]


Estonia

„Küberrünne“ – IKTga seotud pahatahtlik intsident, mille on põhjustanud ohusubjekti katse hävitada, paljastada, muuta, desaktiveerida või varastada vara, saada varale loata juurdepääs või kasutada vara ilma loata. [37]


Eswatini

Cyber-attack: Deliberate action to exploit computer systems and networks to cause harm.[38]


Finland

’Kyberhyökkäyksellä’ minkä tahansa uhkatoimijan tahallisesti aiheuttamaa vihamielistä TVT: hen liittyvää poikkeamaa, jonka tarkoituksena on tuhota, paljastaa, muuttaa, tehdä toimintakyvyttömäksi tai varastaa jokin omaisuuserä tai hankkia siihen luvaton pääsy tai käyttää sitä ilman lupaa. [39]


France

«Cyberattaque»: un incident lié aux TIC malveillant causé par une tentative de destruction, d’exposition, de modification, de désactivation, de vol, d’utilisation non autorisée d’un actif ou d’accès non autorisé à celui-ci, perpétrée par un acteur de la menace. [17]


Gambia

Cyber-attack: An attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of any digital data, software, computer or ICT services that has value to the organization [40]


Germany

EU DORA
„Cyberangriff“ einen böswilligen IKT-bezogenen Vorfall, der auf den Versuch eines Angreifers zurückgeht, einen Vermögenswert zu zerstören, freizulegen, zu verändern, zu deaktivieren, zu entwenden oder auf unberechtigte Weise auf diesen Vermögenswert zuzugreifen oder ihn auf unberechtigte Weise zu nutzen. [12]


National Cyber Security Strategy 2016 & Draft 2021
Ein Cyber-Angriff ist eine Einwirkung auf ein oder mehrere andere informationstechnische Systeme im oder durch den Cyber-Raum, die zum Ziel hat, deren IT-Sicherheit durch informationstechnische Mittel ganz oder teilweise zu beeinträchtigen. [41] [42]

Ein besonders schwerer und bedeutender Cyberangriff liegt vor, wenn deren potenzielle Auswirkungen geeignet sind, überregionalen oder in seiner Konsequenz weitreichenden Schaden oder eine Störung des staatlichen Handelns zu verursachen. Indikatoren hierfür können die Betroffenheit von KRITIS- oder anderen systemrelevanten Einrichtungen, die Einbettung in hybride Einflussnahm.

National Cyber Security Strategy 2011
A cyber attack is an IT attack in cyberspace directed against one or several other IT systems and aimed at damaging IT security. [43]

Ein Cyber-Angriff ist ein IT-Angriff im Cyber-Raum, der sich gegen einen oder mehrere andere IT-Systeme richtet und zum Ziel hat, die IT-Sicherheit zu brechen. [44]
BSI
Cyber attacks are attacks carried out in cyberspace through tools, services, or applications in cyberspace; in the process, cyberspace can be origin, target or the environment of the attack. [45]



Ein Cyber-Angriff ist eine Einwirkung auf ein oder mehrere andere informationstechnische Systeme im oder durch den Cyber-Raum, die zum Ziel hat, deren IT-Sicherheit durch informationstechnische Mittel ganz oder teilweise zu beeinträchtigen. [46]



Greece

«κυβερνοεπίθεση»: κακόβουλο συμβάν που σχετίζεται με τις ΤΠΕ και προκαλείται μέσω απόπειρας καταστροφής, έκθεσης, μεταβολής, απενεργοποίησης, υποκλοπής ή απόκτησης μη εξουσιοδοτημένης πρόσβασης ή μη εξουσιοδοτημένης χρήσης πόρου, η οποία τελείται από οποιονδήποτε παράγοντα απειλής. [33]


Guatemala

Ataque informático y cibernético: Un intento de obtener acceso no autorizado a los servicios del sistema, recursos, información, o un intento de comprometer la integridad del mismo. Fuente: SP 800-32 [47]


Hungary

„Kibertámadás”: rosszindulatú IKT-vonatkozású esemény, amelynek során valamely fenyegető szereplő valamely eszköz megsemmisítésére, felfedésére, módosítására, használhatatlanná tételére, eltulajdonítására, az eszközhöz való illetéktelen hozzáférésre, vagy annak illetéktelen felhasználására tesz kísérletet. [48]


Ireland

Ciallaíonn ‘cibirionsaí’ teagmhas mailíseach a bhaineann le TFC a tharlaíonn mar thoradh ar iarracht arna déanamh ag gníomhaí bagartha ar bith sócmhainn a scriosadh, a nochtadh, a athrú, a dhíchumasú, a ghoid, nó rochtain gan údarú a fháil uirthi nó úsáid neamhúdaraithe a bhaint aisti. [49]


Israel

תקיפה במרחב הסייבר שמסכנת נכסי סייבר או מערכות ותשתיות הנתמכות על ידם [50]


{{definition|הביטוי "תקיפת סייבר" נועד לבטא את טווח המעשים של ניצול לרעה של מחשב או מידע ממוחשב באמצעות מחשב. [51]

Italy

«Attacco informatico»: un incidente doloso connesso alle TIC provocato dal tentativo, da parte dell’autore della minaccia, di distruggere, rivelare, alterare, disabilitare, rubare o utilizzare senza autorizzazione un’attività o ancora accedervi senza autorizzazione;. [52]


Japan

攻撃: インテリジェントな脅威、すなわちセキュリティサービスを回避し、システムのセキュリティポリシーを侵害する故意の試み(特に、方式あるいは技法という意味において)としてのインテリジェントな動作によってもたらされるセキュリティシステムへの攻撃.

(Cyber) attack is an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. [53]


Jordan

Cyber attack: deliberate exploitation of computer systems, digitally- dependent enterprises and networks to cause harm. [54]



Kyrgyztan

компьютерная атака - целенаправленное воздействие программными либо программно-аппаратными средствами на информационные системы, информационно-телекоммуникационные сети, средства связи и автоматизированные системы управления технологическим процессом, осуществляемое в целях нарушения их функционирования и (или) нарушения безопасности обрабатываемой ими информации. [55]



Latvia

“Kiberuzbrukums” ir ļaunprātīgs ar IKT saistīts incidents, kas ir izraisīts, mēģinot iznīcināt, pakļaut, mainīt, atspējot, nozagt aktīvu vai iegūt neatļautu piekļuvi aktīvam, vai neatļauti izmantot aktīvu, un ko veic jebkurš apdraudējuma dalībnieks. [56]


Lebanon

Cyber attack: An attempt by hackers to damage or destroy a computer network or system. [57]


Lithuania

Kibernetinis išpuolis – su IRT susijęs piktavališkas incidentas, kuris yra sukeliamas, kai priešiškas subjektas bando sunaikinti, atskleisti, pakeisti, išjungti, pavogti ar įgyti neteisėtą prieigą prie bet kokio turto arba neteisėtai juo naudotis. [58]


Luxembourg

«Cyberattaque»: un incident lié aux TIC malveillant causé par une tentative de destruction, d’exposition, de modification, de désactivation, de vol, d’utilisation non autorisée d’un actif ou d’accès non autorisé à celui-ci, perpétrée par un acteur de la menace. [17]


Malta

“Attakk ċibernetiku” tfisser inċident malizzjuż relatat mal-ICT ikkawżat minn tentattiv imwettaq minn kwalunkwe attur ta’ theddid biex jeqred, jesponi, ibiddel, jiddiżattiva, jisraq jew jikseb aċċess mhux awtorizzat għal assi, jew jagħmel użu mhux awtorizzat minnu. [59]


Mexico

Ciberataque: ​Acción realizada a través de las redes de telecomunicaciones con el objetivo de dañar las Infraestructuras Críticas de Información, las Infraestructuras de Información Esenciales,​ ​así​ ​como​ ​la​ ​seguridad​ ​de​ ​las​ ​personas. [60]



Morocco

Cyberattaques: Actes malveillants envers un dispositive informatique, généralement via in réseau de télécommunications. [61]

Cyberattacks: Malicious acts against a computer device, usually via a telecommunications network.



Mozambique

Ataque cibernético: tentativa de hackers ou actores mal-intencionados de danificar ou interromper o funcionamento normal de uma rede, sistema ou aplicativo de computador. [62]



Netherlands

“Cyberaanval”: een kwaadwillig ICT-gerelateerd incident dat het gevolg is van een door een dreigingsactor gepleegde poging om een actief te vernietigen, bloot te stellen, te veranderen, buiten werking te stellen, te stelen of er ongeoorloofde toegang toe te verkrijgen of er ongeoorloofd gebruik van te maken. [16]


Cyberaanval: Moedwillige activiteit van een cyberactor die is gericht op het met digitale middelen aantasten van de beschikbaarheid, integriteit of vertrouwelijkheid van informatie- en procesbesturingssystemen, daardoor verwerkte en opgeslagen informatie en daarvan afhankelijke diensten en processen. [63]


Cyberaanval: Een digitale aanval is een opzettelijke inbreuk op cybersecurity. [64]



New Zealand

Cyber attack: Deliberate exploitation of information systems to cause harm. [65]



Cyber attack is an attempt to undermine or compromise the function of a computer-based system, access information, or attempt to track the online movements of individuals without their permission. [66]


Nigeria

Cyber attack (usually) involves the use of malicious codes to alter digital codes, logic or data, resulting in disruptive consequences that can compromise the confidentiality, integrity, and availability of data and lead to manipulation of information systems and internetwork infrastructure. [67]



North Macedonia

Сајбер напад - операции кои лицата и / или информат Сајбер напад ичките системи намерно ги вршат на кое било место во сајбер просторот со цел да се загрозат доверливоста, интегритетот или достапноста на информативните системи во националниот сајбер простор. [68] [69]


Philippines

Cyber attack:
(a) Is an attack via cyberspace, targeting an enterprise‘s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure;

(b) destroying the integrity of the data or stealing controlled information; A hostile act using computer or related networks or systems, and intended to disrupt and/ or destroy an adversary's critical cyber systems, assets, or functions. [70]



Poland

„Cyberatak” oznacza złośliwy incydent związany z ICT wywołany przez próbę zniszczenia, ujawnienia, zmiany, dezaktywacji, kradzieży lub uzyskania nieuprawnionego dostępu do składnika aktywów lub jego nieuprawnionego wykorzystania przez jakiegokolwiek agresora. [71]


Cyberatak – celowe zakłócenie prawidłowego funkcjonowania cyberprzestrzeni.

Cyber attack - deliberate disruption of the proper functioning of cyberspace. [72]



Portugal

«Ciberataque», um incidente doloso relacionado com as TIC provocado por uma tentativa perpetrada pelo autor de ameaças de destruir, revelar, alterar, incapacitar, furtar, obter acesso não autorizado ou utilizar sem autorização um ativo. [73]


[Definição] Ciberataque: Ataque realizado através das tecnologias de informação no ciberespaço dirigido contra um ou vários sistemas, com o objetivo de prejudicar a segurança das tecnologias de informação e da comunicação (confidencialidade, integridade e disponibilidade), em parte ou totalmente. [74]



Romania

„Atac cibernetic” înseamnă un incident rău-intenționat legat de TIC, cauzat prin intermediul unei tentative comise de un factor perturbator care generează amenințări de a distruge, a expune, a modifica, a dezactiva, a fura sau a obține acces neautorizat la un activ ori a utiliza în mod neautorizat un activ. [75]


Atac cybernetic: acţiune ostilă desfăşurată în spaţiul cibernetic de natură să afecteze securitatea cibernetică.

Cyber attack: hostile action to affect the cyberspace and Cyber Security. [76]


Atac informaţional: Acţiune de luptă ofensivă, realizată prin utilizarea unor ştiri şi comunicate, în urma cărora inamicul este „intoxicat” cu informaţii false; atac împotriva informaţiilor confidenţiale ale unor instituţii; acces neautorizat la informaţii; lansare de zvonuri, în scopul calomnierii cuiva. [77]



Senegal

Cyberattaque: un acte malveillant envers un dispositif informatique via un réseau cybernétique. [78]



Slovakia

„Kybernetický útok“ je zlomyseľný incident súvisiaci s IKT spôsobený prostredníctvom pokusu, ktorého sa dopustil akýkoľvek aktér hrozby, o zničenie, odhalenie, zmenu, znefunkčnenie, krádež alebo získanie neoprávneného prístupu k aktívu, alebo o neoprávnené použitie aktíva. [79]


Slovenia

„Kibernetski napad“ pomeni zlonamerni incident, povezan z IKT, ki ga povzroči akter grožnje, ko poskuša uničiti, razkriti, spremeniti, onemogočiti ali ukrasti sredstvo, pridobiti nepooblaščen dostop do njega ali ga nedovoljeno uporabiti. [80]


Spain

«Ciberataque»: un incidente malintencionado relacionado con las TIC provocado mediante una tentativa, perpetrada por cualquier agente de riesgo, de destruir, revelar, alterar, desactivar o robar un activo, de obtener acceso no autorizado a ese activo o de hacer uso no autorizado de él. [81]


Ciberataque: Forma de ciberguerra / ciberterrorismo donde combinado con un ataque físico o no se intenta impedir el empleo de los sistemas de información del adversario o el acceso la misma. [82]



Sweden

Cyberangrepp: en skadlig IKT-relaterad incident orsakad av ett försök av en fientlig aktör att förstöra, exponera, ändra, deaktivera, stjäla eller få obehörig åtkomst till eller obehörigt utnyttja en tillgång. [83]


Switzerland

Cyber attack: Intentional, unauthorised act of a person or group in cyberspace to compromise the integrity, confidentiality or availability of information and data; depending on the type of attack, this may also have physical effects. [84]

Cyber-Angriff: Beabsichtigte unerlaubte Handlung einer Person oder einer Gruppierung im Cyber-Raum, um die Integrität, Vertraulichkeit oder Verfügbarkeit von Informationen und Daten zu beeinträchtigen; dies kann je nach Art des Angriffs auch zu physischen Auswirkungen führen. [85]

Cyberattaque: Acte illicite commis intentionnellement par une personne ou un groupe de personnes dans le cyberespace dans le but de nuire à l’intégrité, la confidentialité ou la disponibilité d’informations ou de données; selon la nature de l’attaque, celle-ci peut avoir des conséquences sur le plan physique. [86]

Cyber attacco Atto illecito intenzionale compiuto da una persona o da un gruppo di persone nel cyberspazio per compromettere l’integrità, la confidenzialità o l’accessibilità di informazioni e dati. A seconda del tipo di attacco, può anche avere ripercussioni fisiche. [87]


Cyber attacks are carried out on computers, networks and data. They are aimed at disrupting the integrity of the data or the functioning of the infrastructure and restricting or interrupting their availability. They also seek to compromise the confidentiality or authenticity of information by means of unauthorised reading, deletion or modification of data, connections or server services are overloaded, information channels spied upon or surveillance and processing systems are manipulated in a targeted manner. [88]



Tanzania

Cyber attack - is a term for any illegal activity that uses a computer as its primary means of commission. [89]



Turkey

Siber saldırı: Ulusal siber uzayda bulunan bilişim sistemlerinin gizlilik, bütünlük veya erişilebilirliğini ortadan kaldırmak amacıyla, siber uzayın her hangi bir yerindeki kişi ve/veya bilişim sistemleri tarafından kasıtlı olarak yapılan işlemleri. [90]

Cyber attack: Operations carried out deliberately by a person and/or information systems at any place in cyber space for the purpose of compromising the confidentiality, integrity or availability of information systems in national cyber space. [91]


Ukraine

кібератака - спрямовані (навмисні) дії в кіберпросторі, які здійснюються за допомогою засобів електронних комунікацій (включаючи інформаційно-комунікаційні технології, програмні, програмно-апаратні засоби, інші технічні та технологічні засоби і обладнання) та спрямовані на досягнення однієї або сукупності таких цілей: порушення конфіденційності, цілісності, доступності електронних інформаційних ресурсів, що обробляються (передаються, зберігаються) в комунікаційних та/або технологічних системах, отримання несанкціонованого доступу до таких ресурсів; порушення безпеки, сталого, надійного та штатного режиму функціонування комунікаційних та/або технологічних систем; використання комунікаційної системи, її ресурсів та засобів електронних комунікацій для здійснення кібератак на інші об’єкти кіберзахисту.

{machine translation} cyberattack - directed (deliberate) actions in cyberspace, which are carried out with the help of electronic communications (including information and communication technologies, software, software and hardware, other technical and technological means and equipment) and aimed at achieving one or a combination of such purposes: violation of the confidentiality, integrity, availability of electronic information resources that are processed (transmitted, stored) in communication and / or technology systems, access to unauthorized access to such resources; violation of safety, stable, reliable and regular mode of operation of communication and / or technological systems; use of the communication system, its resources and means of electronic communications for the implementation of cyber attacks on other objects of cyber defense. [92]



United Kingdom (UK)

Cyber attack is the deliberate exploitation of computer systems, digitally-dependent enterprises and networks to cause harm. [93]



Cyber attack can refer to anything from small-scale email scams through to sophisticated largescale attacks with diverse political and economic motives. Large-scale attacks may have a number of interrelated aims such as: gaining unauthorised access to sensitive information; causing disruption to IT infrastructure; or causing physical disruption (e.g. to industrial systems). [94]


United States

NIST
Cyber attack is an attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. [95]


An attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality. [96]


Uzbekistan

Muhim axborot infratuzilmasi obyektiga kiberhujum — kibermakonda muhim axborot infratuzilmasi obyektlariga apparat, apparat-dasturiy va dasturiy vositalardan foydalangan holda qasddan amalga oshiriladigan, kiberxavfsizlikka tahdid soladigan harakat.

кибератака на объект критической информационной инфраструктуры — умышленное действие, представляющее угрозу кибербезопасности путем использования в киберпространстве аппаратных, аппаратно-программных и программных средств на объектах критической информационной инфраструктуры.

(A cyber attack on a critical information infrastructure facility is a deliberate action that poses a threat to cybersecurity through the use of hardware, hardware, software and software in cyberspace at critical information infrastructure facilities) [97]


Vanuatu

Cyber-attack: is a deliberate exploitation of computer systems and networks launched by cybercriminals via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. [98]


Regional Definitions

Cymru/Wales

Ymosodiad seiber: Camddefnydd bwriadol o systemau cyfrifiadurol, mentrau a rhwydweithiau sy’n dibynnu ar dechnoleg ddigidol er mwyn gwneud niwed. [99]


Isle of Man
Cyber-attack: An attack that involves the unauthorized use, manipulation, interruption or destruction of, or access to, via electronic means, electronic information or the electronic devices or computer systems and networks used to process, transmit or store that information. [100]


Other Definitions

East-West Institute (Russia-US)

Cyber Attack is an offensive use of a cyber weapon intended to harm a designated target.

наступательное, использование [кибероружия], с целью нанесения вреда определенной цели . [101]


Dictionary

Cyberaanval: Een gerichte aanval in of via cyberspace. [102]

Doelwitten kunnen zijn: personen, groepen, bedrijven en organisaties, overheden, andere landen.

See also

Notes

References

  1. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [EN]
  2. CIPS and Programme Prevention of and Fight against Crime (ISEC)
  3. European Court of Auditors, Challenges to effective EU cybersecurity policy, Briefing Paper, March 2019
  4. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  5. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  6. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.
  7. 关于电信安全的若干议题综述 及相关ITU-T建议书应用简介, ITU-T, Geneva (2012) - ITU-T H.235.
  8. Tallinn Manual on the International Law Applicable to Cyber Warfare (2013)
  9. Dokumenti i Politikave për Sigurinë Kibernetike 2015 - 2017
  10. Australia's International Cyber Engagement Strategy (2017)
  11. on-line glossary Stay Safe On-line
  12. 12.0 12.1 12.2 https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [DE]
  13. Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
  14. Österreichische Strategie für Cyber Sicherheit (2013)
  15. National Cybersecurity Strategy - Towards A Secure Cyberspace 2020-2023 (2020)
  16. 16.0 16.1 https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [NL]
  17. 17.0 17.1 17.2 https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [FR]
  18. National Cybersecurity Strategy (2021)
  19. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [BG]
  20. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  21. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  22. CIRT-BF Glossary
  23. Canada’s Cyber Security Strategy: Canada's Vision for Security and prosperity in the digital age (2018)
  24. Stratégie nationale de cybersécurité: Vision du canada pour la sécurité et la prospérité dans l'ère numérique (2018)
  25. Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
  26. Stratégie de cybersécurité du Canada: renforcer le Canada et accroître sa prospérité. (2010)
  27. BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile
  28. Lineamientos de política para ciberseguridad y ciberdefensa (2011)
  29. Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)
  30. Estrategia Nacional de Ciberseguridad de Costa Rica (2017)
  31. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [HR]
  32. 32.0 32.1 Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio
  33. 33.0 33.1 https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [EL]
  34. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [CS]
  35. 35.0 35.1 [1]
  36. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [DA]
  37. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [ET]
  38. ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
  39. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [FI]
  40. THE GAMBIA NATIONAL CYBERSECURITY STRATEGY (2019)
  41. Cyber-Sicherheitsstrategie für Deutschland 2021
  42. Cyber-Sicherheitsstrategie für Deutschland 2016
  43. Cyber Security Strategy for Germany (2011)
  44. Cyber-Sicherheitstrategie für Deutschland (2011)
  45. Unpublished working glossary of UP KRITIS and BSI, 2014
  46. BSI Glossar
  47. La Estrategia Nacional de Seguridad Cibernética (June 2018)
  48. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [HU]
  49. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [GA}
  50. CERT.IL Glossary
  51. (Hebrew) draft Cyber Security and National Cyber Directorate Bill of 20 June 2018
  52. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [IT]
  53. RFC2828 (Japanese translation)
  54. National Cyber Security Strategy (2018-2023)
  55. СТРАТЕГИЯ кибербезопасности Кыргызской Республики на 2019-2023 годы
  56. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [LV]
  57. Lebanon Cyber Security Strategy v2
  58. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [LT]
  59. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [MT]
  60. Estragia Nacional de Ciberseguridad (November 2017)
  61. STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011
  62. Estratégia Nacional de Segurança Cibernética de Moçambique (2021-2024)
  63. Cyber Security Beeld Nederland 2020
  64. Cyber Security Beeld Nederland 2018
  65. New Zealand’s Cyber Security Strategy (2019)
  66. New Zealand’s Cyber Security Strategy (2011)
  67. National Cybersecurity Policy and Strategy (2014)
  68. НАЦИОНАЛНА СТРАТЕГИЈА ЗА САЈБЕР БЕЗБЕДНОСТ НА РЕПУБЛИКА МАКЕДОНИЈА 2018 -2022
  69. National Cyber Security Strategy of the Republic of Macedonia (2018)
  70. DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
  71. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [PL]
  72. 2013 Narodowy Program Ochrony Infrastruktury Krytycznej
  73. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [PT]
  74. Glossário Centro National de Cibersegurança Portugal
  75. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [RO]
  76. Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
  77. GLOSAR de termeni din domeniul ordinii şi siguranţei publice, MINISTERUL ADMINISTRAŢIEI ŞI INTERNELOR DIRECŢIA GENERALĂ ORGANIZARE, PLANIFICARE MISIUNI ŞI RESURSE
  78. STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
  79. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [SK]
  80. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [SL]
  81. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [ES]
  82. CIBERSEGURIDAD. RETOS Y AMENAZAS A LA SEGURIDAD NACIONAL EN EL CIBERESPACIO, MINISTERIO DE DEFENSA (2010)
  83. https://eur-lex.europa.eu/eli/dir/2022/2554/oj REGULATION (EU) 2022/2554 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 14 DECEMBER 2022 ON DIGITAL OPERATIONAL RESILIENCE FOR THE FINANCIAL SECTOR AND AMENDING REGULATIONS (EC) NO 1060/2009, (EU) NO 648/2012, (EU) NO 600/2014, (EU) NO 909/2014 AND (EU) 2016/1011 [SV]
  84. SN002 - National strategy for Switzerland’s protection against cyber risks (NCS) 2018-2022 (2018)
  85. SN002 - Nationale Strategie zum Schutz der Schweiz vor Cyber-Risiken (NCS) 2018-2022 (2018)
  86. SN002 - Stratégie nationale de protection de la Suisse contre les cyberrisques (SNPC) 2018-2022 (2018)
  87. SN002 - Strategia nazionale per la protezione della Svizzera contro i cyber-rischi (SNPC) 2018-2022 (2018)
  88. National strategy for the protection of Switzerland against cyber risks (2012)
  89. THE UNITED REPUBLIC OF TANZANIA/MINISTRY OF FINANCE -ICT SECURITY GUIDELINES (2012)
  90. 2016-2019 ULUSAL SİBER GÜVENLİK STRATEJİSİ
  91. Turkey's National Cyber Security Strategy 2016-2019 (2016)
  92. ЗАКОН УКРАЇНИ - Про основні засади забезпечення кібербезпеки України / THE LAW OF UKRAINE: About the basic principles of providing cyber security of Ukraine 2163-19
  93. National Cyber Security Strategy 2016, HM Government
  94. Cyber Security in the UK, Postnote Number 389, September 2011
  95. NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
  96. NIST Special Publication 800-82 Rev 2: Guide to Industrial Control Systems (ICS) Security (May 2015)
  97. Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”
  98. National Cybersecurity Strategy 2030
  99. Strategaeth Seiberddiogelwch Llywodraeth: Adeiladu sector cyhoeddus seibergadarn 2022-2030
  100. Isle of Man National Cyber Security Strategy (2018-2022)
  101. RUSSIA-­‐U.S. BILATERAL ON CYBERSECURITY: CRITICAL TERMINOLOGY FOUNDATIONS
  102. Cybersecurity Woordenboek 2021