Difference between revisions of "Security"
(→NIST) |
(→Notes) |
||
(16 intermediate revisions by the same user not shown) | |||
Line 12: | Line 12: | ||
=== Other International Definitions === | === Other International Definitions === | ||
+ | ==== [[Critical5]] ==== | ||
+ | {{definition|The end goal of security is to use physical, personnel and/or cyber defense measures to reduce both the risk to critical infrastructure and the risk of loss due to a disruption in essential services by minimizing the vulnerability of critical infrastructure assets, systems and networks. <ref>https://www.cisa.gov/sites/default/files/publications/critical-five-shared-narrative-critical-infrastructure-2014-508.pdf Forging a Common Understanding for Critical Infrastructure (2014)</ref>}}<br/><br/> | ||
==== [[IAEA]] ==== | ==== [[IAEA]] ==== | ||
{{definition|Security: The prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. <ref>[http://www-pub.iaea.org/mtcd/publications/pdf/pub1495_web.pdf IAEA Nuclear Energy Series No. NP-T-3.12]</ref>}}<br/> | {{definition|Security: The prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. <ref>[http://www-pub.iaea.org/mtcd/publications/pdf/pub1495_web.pdf IAEA Nuclear Energy Series No. NP-T-3.12]</ref>}}<br/> | ||
Line 22: | Line 24: | ||
====[[NATO]]==== | ====[[NATO]]==== | ||
{{definition|The measures necessary to achieve [[protection]] against espionage, sabotage, subversion and terrorism, as well as against loss or unauthorized disclosure. <ref>[http://nso.nato.int/nso/zPublic/ap/aap6/AAP-6.pdf NATO Glossary AAP-06(2014)</ref>}} <br /> | {{definition|The measures necessary to achieve [[protection]] against espionage, sabotage, subversion and terrorism, as well as against loss or unauthorized disclosure. <ref>[http://nso.nato.int/nso/zPublic/ap/aap6/AAP-6.pdf NATO Glossary AAP-06(2014)</ref>}} <br /> | ||
+ | |||
=== National Definitions === | === National Definitions === | ||
==== [[Cameroon]] (Cameroun) ==== | ==== [[Cameroon]] (Cameroun) ==== | ||
Line 27: | Line 30: | ||
==== [[Czech Republic]] ==== | ==== [[Czech Republic]] ==== | ||
− | {{definition|Vlastnost prvku (např. informační systém), který je na určité úrovni chráněn proti ztrátám, nebo také stav ochrany (na určité úrovni) proti ztrátám. <ref> http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)</ref> <br/><br/>Property of an element (e.g. an information system) which is at a certain level protected against losses, or also a state of protection (at a certain level) against losses. <ref> http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)</ref>}}Bezpečnost IT zahrnuje ochranu důvěrnosti, integrity a dosažitelnosti při zpracování, úschově, distribuci a prezentaci informací (IT security covers protection of [[confidentiality]], [[integrity]] and [[availability]] during processing, storage, distribution and presentation of information).<br/><br/> | + | {{definition|Bezpečnost: Vlastnost prvku (např. informační systém), který je na určité úrovni chráněn proti ztrátám, nebo také stav ochrany (na určité úrovni) proti ztrátám. <ref> http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)</ref> <br/><br/>Security: Property of an element (e.g. an information system) which is at a certain level protected against losses, or also a state of protection (at a certain level) against losses. <ref> http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)</ref>}}Bezpečnost IT zahrnuje ochranu důvěrnosti, integrity a dosažitelnosti při zpracování, úschově, distribuci a prezentaci informací (IT security covers protection of [[confidentiality]], [[integrity]] and [[availability]] during processing, storage, distribution and presentation of information).<br/><br/> |
+ | |||
====[[Egypt]] ==== | ====[[Egypt]] ==== | ||
{{definition|Security: A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. <ref name=Egypt>[http://old.tra.gov.eg/glossary/s.pdf Glossary of the National Telecom Authority (NTA), Egypt]</ref>}}<br /> | {{definition|Security: A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. <ref name=Egypt>[http://old.tra.gov.eg/glossary/s.pdf Glossary of the National Telecom Authority (NTA), Egypt]</ref>}}<br /> | ||
Line 38: | Line 42: | ||
{{definition|Gefahrenabwehr: Unter Gefahrenabwehr versteht man die Gesamtheit der Maßnahmen zur Vermeidung eines Schadens an einem Schutzgut, sowie zur Minimierung eines eingetretenen Schadens. <ref>[http://www.bbk.bund.de/DE/Servicefunktionen/Glossar/_function/glossar.html?lv2=4968156&lv3=6222934 Glossar, Das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK)]</ref>}}<br/><br/> | {{definition|Gefahrenabwehr: Unter Gefahrenabwehr versteht man die Gesamtheit der Maßnahmen zur Vermeidung eines Schadens an einem Schutzgut, sowie zur Minimierung eines eingetretenen Schadens. <ref>[http://www.bbk.bund.de/DE/Servicefunktionen/Glossar/_function/glossar.html?lv2=4968156&lv3=6222934 Glossar, Das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK)]</ref>}}<br/><br/> | ||
====[[Haiti]]==== | ====[[Haiti]]==== | ||
− | {{definition|Sécurité: condition dans laquelle, par l’action de l'État, les habitants d'un pays reçoivent la garantie de base de la stabilité et du bien-être nécessaire au développement pacifique et harmonieux de la société. <ref>[http:// | + | {{definition|Sécurité: condition dans laquelle, par l’action de l'État, les habitants d'un pays reçoivent la garantie de base de la stabilité et du bien-être nécessaire au développement pacifique et harmonieux de la société. <ref>[http://www.md.gouv.ht/Livre_Blanc.pdf LIVRE BLANC SUR LA SÉCURITÉ ET LA DÉFENSE NATIONALE POUR LE DÉVELOPPEMENT ÉCONOMIQUE ET SOCIAL DURABLE D’HAÏTI, Juin 2015]</ref>}}Dans le monde d'aujourd'hui, cela implique une approche multidimensionnelle et doit envisager des questions d’ordre politique, économique, social, culturel et environnemental, entre autres. <br/><br/> |
+ | |||
====[[India]]==== | ====[[India]]==== | ||
{{definition|Security is the quality or state of being protected from unauthorised access or uncontrolled losses or effects. <ref>[http://www.dgqadefence.gov.in/documents/pdf/cyber-security-policy-dgqa-2015.pdf India's DGQA Cyber Security Policy (2015)] </ref>}}Absolute security is impossible to achieve in practice and the quality of a given security system is relative. Within a state-model security system, security is a specific “state" to be preserved under various operations. <br /><br/> | {{definition|Security is the quality or state of being protected from unauthorised access or uncontrolled losses or effects. <ref>[http://www.dgqadefence.gov.in/documents/pdf/cyber-security-policy-dgqa-2015.pdf India's DGQA Cyber Security Policy (2015)] </ref>}}Absolute security is impossible to achieve in practice and the quality of a given security system is relative. Within a state-model security system, security is a specific “state" to be preserved under various operations. <br /><br/> | ||
Line 45: | Line 50: | ||
==== [[Mexico]] ==== | ==== [[Mexico]] ==== | ||
{{definition|Seguridad: Al compartir información por medios digitales, las dependencias y entidades deberán mantener como mínimo, el mismo nivel de garantías y seguridad que se tiene para el intercambio por medios físicos, así como adoptar procesos de ciberseguridad, en términos de lo que establezcan conforme a las disposiciones aplicables las autoridades competentes. <ref>[https://www.gob.mx/guiasinteroperabilidad/contenido_gral/glosario_gral/glosario.pdf Glosario - El portal único del gobierno. | gob.mx, Mexico] </ref>}}<br/><br/> | {{definition|Seguridad: Al compartir información por medios digitales, las dependencias y entidades deberán mantener como mínimo, el mismo nivel de garantías y seguridad que se tiene para el intercambio por medios físicos, así como adoptar procesos de ciberseguridad, en términos de lo que establezcan conforme a las disposiciones aplicables las autoridades competentes. <ref>[https://www.gob.mx/guiasinteroperabilidad/contenido_gral/glosario_gral/glosario.pdf Glosario - El portal único del gobierno. | gob.mx, Mexico] </ref>}}<br/><br/> | ||
+ | ==== [[Netherlands]] ==== | ||
+ | {{definition|Beveiligen: Onttrekken aan geweld, bedreiging, gevaar of schade door het treffen van maatregelen. <ref>[https://kennisopenbaarbestuur.nl/media/53867/handreiking-cybercrime.pdf Handreiking Cybercrime (2012)]</ref>}}<br/><br/> | ||
==== [[Philippines]] ==== | ==== [[Philippines]] ==== | ||
− | {{definition|Security – A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. <ref>[http://www.dnd.gov.ph/miss/PDF/downloadables/Cybersecurity%20Glossary%20(Edited).pdf DND GLOSSARY OF CYBER SECURITY TERMS (v.4)]</ref>}}<br/><br/> | + | {{definition|Security – A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. <ref>[http://www.dnd.gov.ph/miss/PDF/downloadables/Cybersecurity%20Glossary%20(Edited).pdf DND GLOSSARY OF CYBER SECURITY TERMS (v.4)]</ref>}}<br/> |
+ | |||
+ | {{definition|Security: The protection of information (digital and hardcopy), assets (physical and intangible) and personnel against internal and external, malicious and accidental threats. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}This protection includes detection, prevention and response to threats through the use of security policies, procedures, tools and services.<br/><br/> | ||
+ | |||
==== [[Poland]] ==== | ==== [[Poland]] ==== | ||
{{definition|Ochrona osób – działania mające na celu zapewnienie bezpieczeństwa życia, zdrowia i nietykalności osobistej <ref>[http://rcb.gov.pl/wp-content/uploads/ustawa_ochrona_osob_i_mienia.pdf Dz.U. 1997 Nr 114 poz. 740 USTAWA z dnia 22 sierpnia 1997 r. o ochronie osób i mienia, Poland] </ref><br/><br/>Security - measures to ensure the safety of life, health and physical integrity.}}<br /> | {{definition|Ochrona osób – działania mające na celu zapewnienie bezpieczeństwa życia, zdrowia i nietykalności osobistej <ref>[http://rcb.gov.pl/wp-content/uploads/ustawa_ochrona_osob_i_mienia.pdf Dz.U. 1997 Nr 114 poz. 740 USTAWA z dnia 22 sierpnia 1997 r. o ochronie osób i mienia, Poland] </ref><br/><br/>Security - measures to ensure the safety of life, health and physical integrity.}}<br /> | ||
Line 54: | Line 64: | ||
==== [[Slovakia]] ==== | ==== [[Slovakia]] ==== | ||
{{definition|Bezpečnosť: Stav spoločenského, prírodného, technického, technologického systému alebo iného systému, ktorý v konkrétnych vnútorných a vonkajších podmienkach umožňuje plnenie určených funkcií a ich rozvoj v záujme človeka a spoločnosti. <ref>[http://archiv.vlada.gov.sk/old.uv/data/files/2365.doc BEZPEČNOSTNÁ RADA SLOVENSKEJ REPUBLIKY]</ref>}}<br/><br/> | {{definition|Bezpečnosť: Stav spoločenského, prírodného, technického, technologického systému alebo iného systému, ktorý v konkrétnych vnútorných a vonkajších podmienkach umožňuje plnenie určených funkcií a ich rozvoj v záujme človeka a spoločnosti. <ref>[http://archiv.vlada.gov.sk/old.uv/data/files/2365.doc BEZPEČNOSTNÁ RADA SLOVENSKEJ REPUBLIKY]</ref>}}<br/><br/> | ||
+ | ==== [[South Africa]] ==== | ||
+ | {{definition|‘‘ukhuseleko’’ luquka— (a) ukukhuseleka kweziseko ezibalulekileyo ezingundoqo ngokwazo; (b) ukukhuseleka kwabasebenzi abasebenza kwiziseko ezibalulekileyo ezingundoqo; (c) amacebo okuxhobel’ into engekehli asebenza kwiziseko ezibalulekileyo ezingundoqo; (d) namanyathelo anjongo yawo ikukukhusela iziseko ezibalulekileyo ezingundoqo.<br/><br/>‘‘security’’ includes, but is not limited to— (a) physical security of critical infrastructure; (b) personnel security at critical infrastructure; (c) contingency plans applicable to critical infrastructure; and (d) measures aimed at protecting critical infrastructure. <ref>[https://www.gov.za/sites/default/files/gcis_document/201911/4286628-11act8of2019criticalinfraprotectact.pdf Act No. 8 of 2019: Critical Infrastructure Protection Act, 2019]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Sri Lanka]]==== | ||
+ | {{definition|Security: The protection of valuable assets stored on computer systems or transmitted via computer networks. <ref>[http://www.slcert.gov.lk/Downloads/Policies/19.doc National Centre for Cyber Security, Information Security Policy Domains #19: Glossary]</ref>}}<br/><br/> | ||
+ | ====[[Togo]]==== | ||
+ | {{definition|Sécurité: situation dans laquelle quelqu'un, quelque chose n'est exposé à aucun danger. Mécanisme destiné à prévenir un événement dommageable ou à en limiter les effets. <ref>[https://assemblee-nationale.tg/wp-content/uploads/2022/06/8CYBER-SEC-CRIME-LOI-AN.pdf Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)]</ref>}}<br/> | ||
+ | |||
==== [[United States]]==== | ==== [[United States]]==== | ||
=====[[NIST]]===== | =====[[NIST]]===== | ||
Line 71: | Line 89: | ||
{{definition|(1) A system condition that results from the establishment and maintenance of measures to protect the system.<br/>(2) A system condition in which system resources are free from unauthorized access and from unauthorized or accidental change, [[destruction]], or loss.<br/>(3) Measures taken to protect a system. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | {{definition|(1) A system condition that results from the establishment and maintenance of measures to protect the system.<br/>(2) A system condition in which system resources are free from unauthorized access and from unauthorized or accidental change, [[destruction]], or loss.<br/>(3) Measures taken to protect a system. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | ||
+ | === [[Dictionary]]=== | ||
+ | {{definition|Beveiliging: Alle maatregelen die nodig zijn om een digitaal systeem te beschermen tegen schadelijke invloeden. <ref>[https://www.cybersecurityalliantie.nl/ecp_images/2021/12/Cybersecurity-Woordenboek-2021_ZonderSpreads.pdf Cybersecurity Woordenboek 2021]</ref>}}<br/><br/> | ||
+ | {{#set:defined by=Dictionary}} | ||
== Discussion == | == Discussion == | ||
Line 82: | Line 103: | ||
[[Category:Security]] | [[Category:Security]] | ||
[[Category:Infrastructure]][[Category:Policy]] | [[Category:Infrastructure]][[Category:Policy]] | ||
− | {{#set:defined by=EU|defined by=ENISA|defined by=IAEA|defined by=ITU-T|defined by=NATO|defined by=Cameroon|defined by=Czech Republic|defined by=Egypt|defined by=Finland|defined by=Germany|defined by=Haiti|defined by=India|defined by=Japan|defined by=Mexico|defined by=Philippines|defined by=Poland|defined by=Slovakia|defined by=United States|defined by=Venezueladefined by=IETF|defined by=NIST|defined by=ENTSOG}} | + | {{#set:defined by=EU|defined by=ENISA|defined by=IAEA|defined by=ITU-T|defined by=NATO|defined by=Cameroon|defined by=Czech Republic|defined by=Egypt|defined by=Finland|defined by=Germany|defined by=Haiti|defined by=India|defined by=Japan|defined by=Mexico|defined by=Netherlands|defined by=Philippines|defined by=Poland|defined by=Slovakia|defined by=South Africa|defined by=Sri Lanka|defined by=Togo|defined by=United States|defined by=Venezueladefined by=IETF|defined by=NIST|defined by=ENTSOG}} |
+ | {{#set: Showmainpage=Yes}} |
Latest revision as of 00:35, 18 June 2024
In some languages the terms "Security" and "Safety" are the same.
Contents
- 1 Definitions
- 1.1 European Definitions
- 1.2 Other International Definitions
- 1.3 National Definitions
- 1.4 Standard Definition
- 1.5 Dictionary
- 2 Discussion
- 3 See also
- 4 Notes
Definitions
European Definitions
2009/72/EC
ENISA
ENTSOG
Other International Definitions
Critical5
IAEA
ITU-T
NATO
National Definitions
Cameroon (Cameroun)
Czech Republic
Security: Property of an element (e.g. an information system) which is at a certain level protected against losses, or also a state of protection (at a certain level) against losses. [12]
Bezpečnost IT zahrnuje ochranu důvěrnosti, integrity a dosažitelnosti při zpracování, úschově, distribuci a prezentaci informací (IT security covers protection of confidentiality, integrity and availability during processing, storage, distribution and presentation of information).
Egypt
Finland
Security is a condition in which the threats and risks are controllable. -unofficial translation- [14]
Germany
Haiti
Dans le monde d'aujourd'hui, cela implique une approche multidimensionnelle et doit envisager des questions d’ordre politique, économique, social, culturel et environnemental, entre autres.
India
Absolute security is impossible to achieve in practice and the quality of a given security system is relative. Within a state-model security system, security is a specific “state" to be preserved under various operations.
Japan
(1.) システムを防護するためにとる手段。
(2.) システムを防護するための手段を確立・維持管理に起因するシステムの条件。
(3.) 認可されていないアクセスや認可されていないアクセス、もしくは、偶発的な変更/破壊/損失が無いシステム資源の状態。
(Cyber) security is:
(1.) Measures taken to protect a system.
(2.) The condition of a system that results from the establishment and maintenance of measures to protect the system.
(3.) The condition of system resources being free from unauthorized access and from unauthorized or accidental change, destruction, or loss. [18]
Mexico
Netherlands
Philippines
This protection includes detection, prevention and response to threats through the use of security policies, procedures, tools and services.
Poland
Security - measures to ensure the safety of life, health and physical integrity.
Slovakia
South Africa
‘‘security’’ includes, but is not limited to— (a) physical security of critical infrastructure; (b) personnel security at critical infrastructure; (c) contingency plans applicable to critical infrastructure; and (d) measures aimed at protecting critical infrastructure. [26]
Sri Lanka
Togo
United States
NIST
Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s Risk Management approach.
Security is much more than a set of functions and mechanisms. IT security is a system characteristic as well as a set of mechanisms that span the system both logically and physically.
Security is much more than a set of functions and mechanisms. IT security is a system characteristic as well as a set of mechanisms that span the system both logically and physically.
DoD
1. Measures taken by a military unit, activity, or installation to protect itself against all acts designed to, or which may, impair its effectiveness. (JP 3-10)
2. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. (JP 3-10)
3. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security. [31]
Venezuela
Standard Definition
IETF
(2) A system condition in which system resources are free from unauthorized access and from unauthorized or accidental change, destruction, or loss.
(3) Measures taken to protect a system. [33]
Dictionary
Discussion
See also
Notes
- Jump up ↑ ENTSO-E Glossary of Terms
- Jump up ↑ ENISA Risk Glossary
- Jump up ↑ ENTSOG Glossary of Terms
- Jump up ↑ https://www.cisa.gov/sites/default/files/publications/critical-five-shared-narrative-critical-infrastructure-2014-508.pdf Forging a Common Understanding for Critical Infrastructure (2014)
- Jump up ↑ IAEA Nuclear Energy Series No. NP-T-3.12
- Jump up ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X-800.
- Jump up ↑ Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T X.800.
- Jump up ↑ Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T X.800.
- Jump up ↑ [http://nso.nato.int/nso/zPublic/ap/aap6/AAP-6.pdf NATO Glossary AAP-06(2014)
- Jump up ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- Jump up ↑ http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
- Jump up ↑ http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
- ↑ Jump up to: 13.0 13.1 13.2 Glossary of the National Telecom Authority (NTA), Egypt
- Jump up ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- Jump up ↑ Glossar, Das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK)
- Jump up ↑ LIVRE BLANC SUR LA SÉCURITÉ ET LA DÉFENSE NATIONALE POUR LE DÉVELOPPEMENT ÉCONOMIQUE ET SOCIAL DURABLE D’HAÏTI, Juin 2015
- Jump up ↑ India's DGQA Cyber Security Policy (2015)
- Jump up ↑ http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
- Jump up ↑ Glosario - El portal único del gobierno. | gob.mx, Mexico
- Jump up ↑ Handreiking Cybercrime (2012)
- Jump up ↑ DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
- Jump up ↑ NHS Cyber security glossary
- Jump up ↑ Dz.U. 1997 Nr 114 poz. 740 USTAWA z dnia 22 sierpnia 1997 r. o ochronie osób i mienia, Poland
- Jump up ↑ AAP-6 SŁOWNIK TERMINÓW I DEFINICJI NATO
- Jump up ↑ BEZPEČNOSTNÁ RADA SLOVENSKEJ REPUBLIKY
- Jump up ↑ Act No. 8 of 2019: Critical Infrastructure Protection Act, 2019
- Jump up ↑ National Centre for Cyber Security, Information Security Policy Domains #19: Glossary
- Jump up ↑ Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)
- Jump up ↑ NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013
- ↑ Jump up to: 30.0 30.1 NIST Glossary
- Jump up ↑ Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
- Jump up ↑ Glosario Informática Forense Venezuela
- Jump up ↑ IETF RFC449 Internet Security Glossary 2
- Jump up ↑ Cybersecurity Woordenboek 2021