Search results

Jump to navigation Jump to search
  • {{#ask: [[Category:Main]][[defined by::Turkey||Türkiye||Türkiye Cumhuriyeti]] | format=category | limit=1000 }}
    308 bytes (46 words) - 01:07, 8 April 2023
  • {{#ask: [[Category:Main]][[defined by::Türkiye||Turkey||Türkiye Cumhuriyeti]] | format=category | limit=1000 }}
    309 bytes (47 words) - 01:20, 8 April 2023
  • {{definition|Accessibility: Ability to access information and services by minimizing barriers of distance and cost. <ref>[http://www.lta.gov.lr/doc/I ...horized entity. <ref>[http://www.udhb.gov.tr/doc/siberg/UlusalSibereng.pdf Turkey's National Cyber Security Strategy 2016-2019 (2016)]</ref>}}<br/><br/>
    6 KB (770 words) - 01:12, 8 April 2023
  • ...le and high speed compared to the long-distance communication systems used by [[SCADA]] systems. In fact, [[SCADA]] systems are specifically designed to posed by the various communication media used. DCS and PLC systems usually employ gr
    17 KB (1,935 words) - 01:17, 8 April 2023
  • ...users for approved purposes the confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official ...ntiality: The ability to protect sensitive information from being accessed by unauthorized people. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - C
    26 KB (3,452 words) - 00:43, 15 November 2023
  • ...: the assurance that information has been created, amended or deleted only by the intended authorised means – integrity relates to information and comm {{definition|Integrity: Information systems and information can be changed by authorized persons or systems only. <ref>[http://nic.af/Content/files/Natio
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ...er | sistema de información | sistem informational | informatiesysteem) is defined in the following ways:<br/><br/> ...data, as well as computer data stored, processed, retrieved or transmitted by that device or group of devices for the purposes of its or their operation,
    30 KB (3,850 words) - 11:23, 1 April 2024
  • ...lth, a [[threat]] is defined as a substance, condition or [[event]], which by its presence has the potential to rapidly [[harm]] an exposed population, s ...ely cause of harm to people, damage to property or harm to the environment by an individual or individuals with the motivation, intention and capability
    37 KB (5,231 words) - 01:19, 8 April 2023
  • {{definition|[https://un.mfa.gov.by/docs/doctrine_of_information_security_of_the_republic_of_belarus.pdf DOCTRI ...r/>[https://www.uab.gov.tr/uploads/pages/siber-guvenlik/ulusalsibereng.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan (2013)]<br/>[h
    101 KB (12,017 words) - 11:35, 1 April 2024
  • ...environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, an ...able of creating, processing and processing exchange information generated by systems, information society services, as well and electronic communication
    58 KB (7,073 words) - 11:22, 1 April 2024
  • ...ion infrastructure (CII) - OBSOLETE TERM per December 2019; to be replaced by 'Digital Security of Critical Activities'. <ref>[https://legalinstruments. ...virtual [[Information Infrastructure|information infrastructure]] declared by the government which is capable of controlling, processing, circulating or
    53 KB (6,315 words) - 13:33, 14 December 2023
  • ...licious [[ICT]]-related incident caused by means of an attempt perpetrated by any threat actor to destroy, expose, alter, disable, steal or gain unauthor {{definition|Attacks against information systems carried out by using malicious software, including botnets. <ref>[https://ec.europa.eu/eus
    62 KB (7,731 words) - 11:20, 1 April 2024
  • ...Parliament and of the Council, which carry out the function of ‘supply’ as defined in Article 2, point (12), of that Directive |Distribution system operators as defined in Article 2, point (29), of <ref name="EU2019944">[http://data.europa.eu/e
    63 KB (7,982 words) - 14:01, 19 October 2023
  • ...]], and the likelihood that a specific [[vulnerability]] will be exploited by a particular [[threat]]. <ref>[http://eur-lex.europa.eu/LexUriServ/site/en/ {{definition|The probability of adverse effects caused by a hazardous phenomenon or substance in an organism, a population, or an eco
    70 KB (9,704 words) - 01:02, 15 November 2023
  • ...information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/ ...nd [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtection
    121 KB (15,215 words) - 11:21, 1 April 2024
  • ...ktura: Fyzické zdroje, služby a zařízení, jejichž nefunkčnost nebo zničení by mělo vážný dopad na fungování hospodářství a společnosti.<br/><br ...also referred to as nationally significant infrastructure, can be broadly defined as the systems, assets, facilities and networks that provide essential serv
    128 KB (16,717 words) - 11:19, 1 April 2024