Difference between revisions of "Cyber Security"
(→Botswana) |
(→References) |
||
| (27 intermediate revisions by the same user not shown) | |||
| Line 14: | Line 14: | ||
=== Other International Definitions === | === Other International Definitions === | ||
| + | ==== [[United Nations]] (Regulation No. 155)==== | ||
| + | {{definition|"Cyber security" means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components. <ref>[https://unece.org/sites/default/files/2023-02/R155e%20%282%29.pdf UN Regulation No. 155 addendum 154 - English]</ref><br/><br/>« Cybersécurité », la protection des véhicules routiers et de leurs fonctions contre les cyberattaques visant les composants électriques ou électroniques. <ref>[https://unece.org/sites/default/files/2023-02/R155f.pdf UN Regulation No. 155 addendum 154 - French]</ref><br/><br/>«Кибербезопасность» означает состояние, в котором транспортные средства и их функции защищены от киберугроз, которым могут подвергаться электрические или электронные компоненты. <ref>[https://unece.org/sites/default/files/2023-02/R155r.pdfUN Regulation No. 155 addendum 154 - Russian]</ref>}}<br/> | ||
| + | |||
==== [[World Bank]] ==== | ==== [[World Bank]] ==== | ||
{{definition|Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. <ref>[https://collaboration.worldbank.org/servlet/JiveServlet/downloadBody/18791-102-1-24249/Glossary%20of%20terms.docx Cyber Security Glossary, World Bank (2015)]</ref>}}In a computing context, the term security implies cybersecurity.<br/> | {{definition|Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. <ref>[https://collaboration.worldbank.org/servlet/JiveServlet/downloadBody/18791-102-1-24249/Glossary%20of%20terms.docx Cyber Security Glossary, World Bank (2015)]</ref>}}In a computing context, the term security implies cybersecurity.<br/> | ||
| Line 83: | Line 86: | ||
==== [[Colombia]] ==== | ==== [[Colombia]] ==== | ||
| + | {{definition| Ciberseguridad: Es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguarda de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberespacio. <ref>[https://www.mintic.gov.co/portal/715/articles-403023_recurso_2.pdf Estrategia de seguridad digital de Colombia 2025-2027 (2025)]</ref>}}<br/> | ||
{{definition|Ciberseguridad: Capacidad del Estado para minimizar el nivel de riesgo al que están expuestos sus ciudadanos, ante amenazas o incidentes de naturaleza cibernética. <ref>[http://www.mintic.gov.co/portal/604/articles-3510_documento.pdf Conpes 3510]</ref>}} | {{definition|Ciberseguridad: Capacidad del Estado para minimizar el nivel de riesgo al que están expuestos sus ciudadanos, ante amenazas o incidentes de naturaleza cibernética. <ref>[http://www.mintic.gov.co/portal/604/articles-3510_documento.pdf Conpes 3510]</ref>}} | ||
Cyber security is the ability of the state to minimise the level of [[risk]] their citizens from [[threat|threats]] or [[incident|incidents]] of cyber nature are exposed to.<br /> | Cyber security is the ability of the state to minimise the level of [[risk]] their citizens from [[threat|threats]] or [[incident|incidents]] of cyber nature are exposed to.<br /> | ||
{{definition|Ciberseguridad: es el conjunto de recursos, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión del riesgo, acciones, investigación y desarrollo, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse buscando la [[Availability|disponibilidad]], [[Integrity|integridad]], [[Authentication|autenticación]], [[Confidentiality|confidencialidad]] y no repudio, con el fin de proteger a los usuarios y los activos de la organización en el [[Cyberspace|Ciberespacio]]. <ref>[https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3854.pdf Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)]</ref>}}<br/><br/> | {{definition|Ciberseguridad: es el conjunto de recursos, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión del riesgo, acciones, investigación y desarrollo, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse buscando la [[Availability|disponibilidad]], [[Integrity|integridad]], [[Authentication|autenticación]], [[Confidentiality|confidencialidad]] y no repudio, con el fin de proteger a los usuarios y los activos de la organización en el [[Cyberspace|Ciberespacio]]. <ref>[https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3854.pdf Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)]</ref>}}<br/><br/> | ||
| + | |||
| + | ====[[Congo]]==== | ||
| + | {{definition|Cybersécurité : l’ensemble des mesures et des actions destinées à protéger le [[cyberspace|cyberespace]] des menaces associées à ses réseaux et à son infrastructure informatique ou susceptibles de leur porter atteinte. La cybersécurité vise à préserver la disponibilité et l'intégrité des réseaux et de l'infrastructure ainsi que la confidentialité des informations qui y sont contenues. Donnée numérique : toute représentation de faits, d’informations ou de concepts sous une forme qui se prête à un traitement informatique <ref>[https://www.presidence.cd/uploads/files/Strategie%20Nationale%20de%20Cybers%C3%A9curit%C3%A9.pdfStrategy Stratégie nationale de cybersécurité 2022 - 2025 de la République Démocratique de Congo]</ref>}}<br/><br/> | ||
| + | |||
==== [[Costa Rica]] ==== | ==== [[Costa Rica]] ==== | ||
{{definition|Ciberseguridad: Es la capacidad de proteger o defender el uso del ciberespacio de los ataques cibernéticos. <ref>[https://micitt.go.cr/sites/default/files/2023-11/NCS%20Costa%20Rica%20-%2010Nov2023%20SPA.pdf Estrategia Nacional de Ciberseguridad de Costa Rica (2023-2027) ]</ref>}}<br/> | {{definition|Ciberseguridad: Es la capacidad de proteger o defender el uso del ciberespacio de los ataques cibernéticos. <ref>[https://micitt.go.cr/sites/default/files/2023-11/NCS%20Costa%20Rica%20-%2010Nov2023%20SPA.pdf Estrategia Nacional de Ciberseguridad de Costa Rica (2023-2027) ]</ref>}}<br/> | ||
| Line 141: | Line 149: | ||
{{definition|Cyber-Sicherheit ist die IT-Sicherheit der im [[Cyberspace|Cyber-Raum]] auf Datenebene vernetzten bzw. vernetzbaren informationstechnischen Systeme. (2016) <ref>[http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cybersicherheitsstrategie-2016.pdf?__blob%3DpublicationFile Cyber-Sicherheitsstrategie für Deutschland 2016]</ref><br/><br/>(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. <ref>[http://www.kritis.bund.de/SubSites/Kritis/DE/Servicefunktionen/Glossar/Functions/glossar.html Protection of Critical Infrastructures, BMI.]</ref><br/><br/>(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. <ref>[http://www.kritis.bund.de/SharedDocs/Downloads/Kritis/EN/UP%20KRITIS.pdf?__blob%3DpublicationFile UP KRITIS, BSI, 2014]</ref>}}<br /> | {{definition|Cyber-Sicherheit ist die IT-Sicherheit der im [[Cyberspace|Cyber-Raum]] auf Datenebene vernetzten bzw. vernetzbaren informationstechnischen Systeme. (2016) <ref>[http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cybersicherheitsstrategie-2016.pdf?__blob%3DpublicationFile Cyber-Sicherheitsstrategie für Deutschland 2016]</ref><br/><br/>(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. <ref>[http://www.kritis.bund.de/SubSites/Kritis/DE/Servicefunktionen/Glossar/Functions/glossar.html Protection of Critical Infrastructures, BMI.]</ref><br/><br/>(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. <ref>[http://www.kritis.bund.de/SharedDocs/Downloads/Kritis/EN/UP%20KRITIS.pdf?__blob%3DpublicationFile UP KRITIS, BSI, 2014]</ref>}}<br /> | ||
{{definition|Cyber-Sicherheit befasst sich mit allen Aspekten der Sicherheit in der Informations- und Kommunikationstechnik. Das Aktionsfeld der Informationssicherheit wird dabei auf den gesamten Cyber-Raum ausgeweitet. Dieser umfasst sämtliche mit dem Internet und vergleichbaren Netzen verbundene Informationstechnik und schließt darauf basierende Kommunikation, Anwendungen, Prozesse und verarbeitete Informationen mit ein. <ref>[https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/Empfehlungen/cyberglossar/Functions/glossar.html BSI Glossar]</ref>}}Häufig wird bei der Betrachtung von Cyber-Sicherheit auch ein spezieller Fokus auf Angriffe aus dem Cyber-Raum gelegt. <br/><br/> | {{definition|Cyber-Sicherheit befasst sich mit allen Aspekten der Sicherheit in der Informations- und Kommunikationstechnik. Das Aktionsfeld der Informationssicherheit wird dabei auf den gesamten Cyber-Raum ausgeweitet. Dieser umfasst sämtliche mit dem Internet und vergleichbaren Netzen verbundene Informationstechnik und schließt darauf basierende Kommunikation, Anwendungen, Prozesse und verarbeitete Informationen mit ein. <ref>[https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/Empfehlungen/cyberglossar/Functions/glossar.html BSI Glossar]</ref>}}Häufig wird bei der Betrachtung von Cyber-Sicherheit auch ein spezieller Fokus auf Angriffe aus dem Cyber-Raum gelegt. <br/><br/> | ||
| + | ====[[Ghana]]==== | ||
| + | {{definition|Cybersecurity is the state in which a computer or computer system is protected from unauthorized access or attack for the purpose of ensuring that<br/>a. the computer or computer system continuses to be available and operational,<br/>b. the integrity of the computer or computer system is maintained, and<br/>c. the integrity and confidentiality of information stored in, prrocessed by or transmitted through the computer or computer system is maintained. <ref>[https://www.csa.gov.gh/resources/National%20Cybersecurity%20Policy%20and%20Strategy.pdf National Cyber Security Policy & Strategy (2024)]</ref>}} | ||
| + | <br/> | ||
==== [[Greece]] ==== | ==== [[Greece]] ==== | ||
| Line 146: | Line 157: | ||
==== [[Guatemala]] ==== | ==== [[Guatemala]] ==== | ||
| + | {{definition|Ciberseguridad: Es la capacidad para minimizar el nivel de riesgo al que está expuesta la información ante amenazas o incidentes de naturaleza cibernética, teniendo como objetivo la protección de la información digital. (Fuente: Adaptación de LISA Institute) <ref>[https://stcns.gob.gt/wp-content/uploads/2022/05/Plan-Estrategico-de-Seguridad-de-la-Nacion-2020-2024.pdf Plan Estrategia Nacional de Seguridad Cibernética (National Cyber Security Strategy) 2020-2024 (2020)]</ref>}} | ||
| + | <br/> | ||
{{definition|Seguridad Cibernética o Ciberseguridad: El conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de [[Risk|riesgos]], acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. Fuente: UIT-T X.1205. <ref>[http://mingob.gob.gt/wp-content/uploads/2018/06/version-digital.pdf La Estrategia Nacional de Seguridad Cibernética (June 2018)]</ref>}}Los activos de la organización y los usuarios son los dispositivos informáticos conectados, los usuarios, los servicios/aplicaciones, los sistemas de comunicaciones, las comunicaciones multimedios, y la totalidad de la información transmitida y/o almacenada en el ciberentorno. La ciberseguridad garantiza que se alcancen y mantengan las propiedades de seguridad de los activos de la organización y los usuarios contra los riesgos de seguridad correspondientes en el ciberentorno. Las propiedades de seguridad incluyen una o más de las siguientes: -[[Availability|disponibilidad]]; - [[Integrity|integridad]], que puede incluir la autenticidad y el no repudio; - [[Confidentiality|confidencialidad]]<br /><br/> | {{definition|Seguridad Cibernética o Ciberseguridad: El conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de [[Risk|riesgos]], acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. Fuente: UIT-T X.1205. <ref>[http://mingob.gob.gt/wp-content/uploads/2018/06/version-digital.pdf La Estrategia Nacional de Seguridad Cibernética (June 2018)]</ref>}}Los activos de la organización y los usuarios son los dispositivos informáticos conectados, los usuarios, los servicios/aplicaciones, los sistemas de comunicaciones, las comunicaciones multimedios, y la totalidad de la información transmitida y/o almacenada en el ciberentorno. La ciberseguridad garantiza que se alcancen y mantengan las propiedades de seguridad de los activos de la organización y los usuarios contra los riesgos de seguridad correspondientes en el ciberentorno. Las propiedades de seguridad incluyen una o más de las siguientes: -[[Availability|disponibilidad]]; - [[Integrity|integridad]], que puede incluir la autenticidad y el no repudio; - [[Confidentiality|confidencialidad]]<br /><br/> | ||
| Line 177: | Line 190: | ||
{{definition|Cyber-Security: Condizione in cui il cyber-space risulti protetto rispetto adeventi, di natura volontaria od accidentale, consistenti nell’acquisizione e nel trasferimento indebiti di dati, nella loro modifica o distruzione illegittime ovvero nel blocco dei sistemi informativi, grazie ad idonee misure di sicurezza fisica, logica e procedurale. <ref>[https://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2013/12/Glossario-intelligence-2013.pdf IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)]</ref>}}Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.<br/><br/> | {{definition|Cyber-Security: Condizione in cui il cyber-space risulti protetto rispetto adeventi, di natura volontaria od accidentale, consistenti nell’acquisizione e nel trasferimento indebiti di dati, nella loro modifica o distruzione illegittime ovvero nel blocco dei sistemi informativi, grazie ad idonee misure di sicurezza fisica, logica e procedurale. <ref>[https://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2013/12/Glossario-intelligence-2013.pdf IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)]</ref>}}Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.<br/><br/> | ||
| + | ====[[Ivory Coast]]==== | ||
| + | {{definition|Cybersécurité : l’ensemble des mesures et des actions destinées à protéger le cyberespace des menaces associées à ses réseaux et à son infrastructure informatique ou susceptibles de leur porter atteinte. La cybersécurité vise à préserver la disponibilité et l'intégrité des réseaux et de l'infrastructure ainsi que la confidentialité des informations qui y sont contenues ; on parle alors de la triade CID (confidentialité, intégrité et disponibilité), à laquelle l’on peut ajouter comme quatrième élément la traçabilité. <ref>[https://telecom.gouv.ci/new/uploads/publications/171137214933.pdf Stratégie Nationale de Cybersecurité 2021-2025]</ref>}} | ||
| + | <br /> | ||
==== [[Jamaica]] ==== | ==== [[Jamaica]] ==== | ||
| Line 185: | Line 201: | ||
{{definition|サイバーセキュリティ : 攻撃を防止、検知し、攻撃に対応することにより情報を保護するプロ セス。 <ref>[https://www.ipa.go.jp/files/000038957.pdf 重要インフラのサイバーセキュリティを 向上させるためのフレームワーク (2014)]</ref><br/><br/>Cyber Security is a process that protects information by preventing, detecting, and responding to [[Cyber Attack|attacks]].}}<br/><br/> | {{definition|サイバーセキュリティ : 攻撃を防止、検知し、攻撃に対応することにより情報を保護するプロ セス。 <ref>[https://www.ipa.go.jp/files/000038957.pdf 重要インフラのサイバーセキュリティを 向上させるためのフレームワーク (2014)]</ref><br/><br/>Cyber Security is a process that protects information by preventing, detecting, and responding to [[Cyber Attack|attacks]].}}<br/><br/> | ||
==== [[Jordan]] ==== | ==== [[Jordan]] ==== | ||
| − | {{definition|The protection of connected systems (to include hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse. <ref> [ | + | {{definition|The protection of connected systems (to include hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse.<br/><br/>األِٓ اٌغُجشأٍ --- كٔخ٣ش ر٤جش حُلؼخء حُغ٤زشح٢ٗ )حُظ٢ طظٌٕٞ ٖٓ حألؿٜضس ٝحُزشٓـ٤خص ٝحُز٠٘ حُظلظ٤ش حُٔشطزطش رٜخ( ًٝخكش حُز٤خٗخص حُٞٔؿٞدس كٜ٤خ ٝحُخذٓخص حُظ٢ طوذٜٓخ ٖٓ حُٞطٍٞ اٜ٤ُخ رشٌَ ؿ٤ش هخ،٢ٗٞٗ أٝ ٖٓ عٞء حالعظخذحّ أٝ حُؼشس، عٞحء ُؼشس حُٔظؼٔذ حُز١ ٣غززٚ ٓشـَ حُ٘ظخ،ّ أٝ حُؼشس حُلخطَ رطش٣ن حُخطؤ ٗظ٤ـش ػذّ حطزخع حإلؿشحءحص حأل٤٘ٓش أٝ ر٘ظ٤ـش حُظؼشع ُِخذحع روظذ حُظغزذ رخُؼشس حُٔزًٞس <ref>[https://modee.gov.jo/ebv4.0/root_storage/en/eb_list_page/national_cyber_security_strategy_2018_2023.pdf National Cyber Security Strategy (2018-2023) - 2023-2018 حُغ٤زشح٢ٗ -ظشحط٤ـ٤ش حُٞؽ٤٘ش ُألٖٓ ح]</ref>}}This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so. <br/><br/> |
==== [[Kenya]] ==== | ==== [[Kenya]] ==== | ||
| − | {{definition|Cyber Security is defined as the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. <ref>[http://www.icta.go.ke/wp-content/uploads/2014/03/GOK-national-cybersecurity-strategy.pdf Kenya's National Cyber Security Strategy]</ref> <ref>[https://www.centralbank.go.ke/wp-content/uploads/2018/08/DRAFT-CYBER-SECURITY-GUIDELINES-FOR-PSP-AUGUST-2018.pdf GUIDELINES ON CYBERSECURITY FOR PAYMENT SERVICE PROVIDERS, AUGUST 2018, Kenya]</ref>}}<br/> | + | {{definition|Cyber Security is defined as the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. <ref>[http://www.icta.go.ke/wp-content/uploads/2014/03/GOK-national-cybersecurity-strategy.pdf Kenya's National Cyber Security Strategy]</ref> <ref>[https://www.centralbank.go.ke/wp-content/uploads/2018/08/DRAFT-CYBER-SECURITY-GUIDELINES-FOR-PSP-AUGUST-2018.pdf GUIDELINES ON CYBERSECURITY FOR PAYMENT SERVICE PROVIDERS, AUGUST 2018, Kenya]</ref>}}<br/> |
| + | |||
====[[Kingdom of Saudi Arabia]]==== | ====[[Kingdom of Saudi Arabia]]==== | ||
{{definition|Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7]</ref>}} | {{definition|Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7]</ref>}} | ||
| Line 195: | Line 212: | ||
==== [[Kosovo]] ==== | ==== [[Kosovo]] ==== | ||
| + | {{definition|Cyber Security: Means necessary activities to protect network and information systems, users of such systems and other persons affected by a cyber-incident. <ref>[https://mpb.rks-gov.net/Uploads/Documents/Pdf/EN/2692/Strategjia%20p%C3%ABr%20Siguri%20Kibernetike%20-%20ENG..pdf National Cyber Security Strategy and Action Plan 2023 – 2026 (2023)]</ref>}}<br/> | ||
{{definition|Siguria kibernetike përgjithësisht iu referohet masave mbrojtëse dhe veprimeve që mund të ndërmerren për të mbrojtur domenin kibernetik, edhe në fushën civile edhe atë ushtarake, nga ato kërcënime që ndërlidhen me to apo që mund të dëmtojnë rrjetet dhe infrastrukturën komunikuese të ndërvarura. Siguria kibernetike përpiqet të ruajë disponueshmërinë dhe integritetin e rrjeteve dhe infrastrukturës,si dhe fshehtësinë e informatave që mbahen në to." [derived from EU definition] <ref>[http://stikk.org/fileadmin/user_upload/Strategjia_Shteterore_per_Sigurine_Kibernetike_dhe_Plani_i_Veprimit_2016-2019.pdf Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019]</ref>}}<br /><br/> | {{definition|Siguria kibernetike përgjithësisht iu referohet masave mbrojtëse dhe veprimeve që mund të ndërmerren për të mbrojtur domenin kibernetik, edhe në fushën civile edhe atë ushtarake, nga ato kërcënime që ndërlidhen me to apo që mund të dëmtojnë rrjetet dhe infrastrukturën komunikuese të ndërvarura. Siguria kibernetike përpiqet të ruajë disponueshmërinë dhe integritetin e rrjeteve dhe infrastrukturës,si dhe fshehtësinë e informatave që mbahen në to." [derived from EU definition] <ref>[http://stikk.org/fileadmin/user_upload/Strategjia_Shteterore_per_Sigurine_Kibernetike_dhe_Plani_i_Veprimit_2016-2019.pdf Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019]</ref>}}<br /><br/> | ||
| + | |||
====[[Kuwait]]==== | ====[[Kuwait]]==== | ||
{{definition|Arab definition - see doc <ref>[https://citra.gov.kw/sites/ar/LegalReferences/Cyber%20Security.pdf الاستراتيجية الوطنية للأمن السيبراني لدولة الكويت (2017-2020)]</ref><br/><br/>Cyber security: is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://citra.gov.kw/sites/en/LegalReferences/English%20Cyber%20Security%20Strategy.pdf National Cyber Security Strategy 2017-2020]</ref>}} | {{definition|Arab definition - see doc <ref>[https://citra.gov.kw/sites/ar/LegalReferences/Cyber%20Security.pdf الاستراتيجية الوطنية للأمن السيبراني لدولة الكويت (2017-2020)]</ref><br/><br/>Cyber security: is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://citra.gov.kw/sites/en/LegalReferences/English%20Cyber%20Security%20Strategy.pdf National Cyber Security Strategy 2017-2020]</ref>}} | ||
| Line 227: | Line 246: | ||
general security objectives comprise the following: [[availability]];[[integrity]], which may include authenticity and non-repudiation; and [[confidentiality]].<br /> | general security objectives comprise the following: [[availability]];[[integrity]], which may include authenticity and non-repudiation; and [[confidentiality]].<br /> | ||
| − | ==== [[Malta]] ==== | + | ====[[Lybia]]==== |
| + | {{definition|إتلافها أو ابتزاز المال من المستخدمين أو مقاطعة العمليات التجارية الأمن السيبراني هو ممارسة حماية الأنظمة والشبكات والبرامج من الهجمات الرقمية. التي تهدف عادةً إلى الوصول إلى المعلومات الحساسة أو تغييرها أو الأمن السيبراني <ref>[https://lcss.gov.ly/articles/blog/post-42/ Cybersecurity definitions]</ref>}}<br/> | ||
| + | ====[[Malta]]==== | ||
| + | {{definition|Cyber Security: All activities necessary to protect cyber space and its users from cyber threats. <ref>[https://economy.gov.mt/wp-content/uploads/2023/05/National-Cyber-security-2023-2026.pdf Malta Cyber Security Strategy 2023-2026]</ref>}}<br/> | ||
{{definition|“ċibersigurtà” tfisser l-attivitajiet meħtieġa biex jiġu mħarsa n-netwerks u s-sistemi tal-informazzjoni, l-utenti ta’ tali sistemi, u persuni oħra milquta minn theddid ċibernetiku. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | {{definition|“ċibersigurtà” tfisser l-attivitajiet meħtieġa biex jiġu mħarsa n-netwerks u s-sistemi tal-informazzjoni, l-utenti ta’ tali sistemi, u persuni oħra milquta minn theddid ċibernetiku. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
{{definition|Cyber security is the safeguards and actions that can be used to protect cyber domain from those [[threat|threats]] that are associated with or that may harm its interdependent networks and information infrastructure. <ref>[http://mita.gov.mt/en/maltacybersecuritystrategy/Documents/Mita%20_Malta%20Cyber%20Security%20Strategy%20-%20Book.pdf Malta Cyber Security Strategy 2016]</ref>}}Cyber security strives to preserve the [[availability]] and [[integrity]] of the networks and infrastructure and the [[confidentiality]] of the information contained therein.<br/><br/> | {{definition|Cyber security is the safeguards and actions that can be used to protect cyber domain from those [[threat|threats]] that are associated with or that may harm its interdependent networks and information infrastructure. <ref>[http://mita.gov.mt/en/maltacybersecuritystrategy/Documents/Mita%20_Malta%20Cyber%20Security%20Strategy%20-%20Book.pdf Malta Cyber Security Strategy 2016]</ref>}}Cyber security strives to preserve the [[availability]] and [[integrity]] of the networks and infrastructure and the [[confidentiality]] of the information contained therein.<br/><br/> | ||
| + | ====[[Marocco]]==== | ||
| + | {{definition|« Cybersécurité » : l’ensemble de mesures, procédures, concepts de sécurité, méthodes de gestion des risques, actions, formations, bonnes pratiques, et technologies permettant à un système d’information de résister à des évènements issus du cyberespace, susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises et des services connexes que ce système offre ou qu’il rend accessibles <ref>[https://www.dgssi.gov.ma/sites/default/files/legislative/brochure/2023-03/loi%2005-20.pdf Loi n° 05-20 relative à la cybersécurité]</ref>}}<br/> | ||
| + | |||
| + | ====[[Mauritania]]/[[Mauritanie]]==== | ||
| + | {{definition|Cybersécurité : l’ensemble des mesures et des actions destinées à protéger les moyens numériques et à prévenir les dommages face aux cyber menaces. La cybersécurité vise à préserver la disponibilité et l'intégrité des réseaux et de l'infrastructure ainsi que la confidentialité des informations qui y sont contenues. <ref>[https://mtnima.gov.mr/wp-content/uploads/2024/05/Strategie_nationale_securite_numerique.pdf Strategie nationale de cybersecurite 2022-2025 (2022)]</ref>}}<br /> | ||
==== [[Mexico]] ==== | ==== [[Mexico]] ==== | ||
| Line 284: | Line 311: | ||
{{definition|Cyber Security - Preservation of confidentiality, integrity, and availability of information in Cyberspace. <ref>[https://moitt.gov.pk/SiteImage/Misc/files/National%20Cyber%20Security%20Policy%202021%20Final.pdf National Cyber Security Policy 2021]</ref>}}<br/><br/> | {{definition|Cyber Security - Preservation of confidentiality, integrity, and availability of information in Cyberspace. <ref>[https://moitt.gov.pk/SiteImage/Misc/files/National%20Cyber%20Security%20Policy%202021%20Final.pdf National Cyber Security Policy 2021]</ref>}}<br/><br/> | ||
| − | ==== [[Papua New Guinea]] ==== | + | ====[[Papua New Guinea]]==== |
| + | {{definition|Cybersecurity: The prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. Cybersecurity is the process of protecting information by preventing, detecting, and responding to attacks. It takes into account the continuous and planned activities at the political, legal, economic, educational, awareness raising and technical levels to manage risks in cyberspace to ensure the ensure the confidentiality, integrity and availability of digital assets. <ref>[http://ict.gov.pg/wp-content/uploads/2020/docs/cybersecuritypolicy2020.pdf National Cyber Security Policy (2024 - 2030)]</ref>}}<br/> | ||
{{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://www.unodc.org/res/cld/lessons-learned/png/papua_new_guinea_cybercrime_policy_html/PNG_Cybercrime_Policy.pdf Papua New Guinea Cybercrime Policy]</ref> <ref>[http://ict.gov.pg/wp-content/uploads/2020/docs/cybersecuritypolicy2020.pdf National Cyber Security Strategy (2020)]</ref>}}<br/><br/> | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://www.unodc.org/res/cld/lessons-learned/png/papua_new_guinea_cybercrime_policy_html/PNG_Cybercrime_Policy.pdf Papua New Guinea Cybercrime Policy]</ref> <ref>[http://ict.gov.pg/wp-content/uploads/2020/docs/cybersecuritypolicy2020.pdf National Cyber Security Strategy (2020)]</ref>}}<br/><br/> | ||
| Line 338: | Line 366: | ||
==== [[Senegal]] ==== | ==== [[Senegal]] ==== | ||
{{definition|Cybersécurité: l'ensemble des lois, politiques, outils, dispositifs, concepts et mécanismes de sécurité, méthodes de gestion des risques, actions, formations, bonnes pratiques et technologies qui peuvent être utilisés pour protéger les personnes et les actifs informatiques connectés directement ou indirectement à un réseau des états et des organisations (avec un objectif de disponibilité, intégrité & authenticité, confidentialité, preuve & non-répudiation). <ref>[http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)]</ref>}}<br/> | {{definition|Cybersécurité: l'ensemble des lois, politiques, outils, dispositifs, concepts et mécanismes de sécurité, méthodes de gestion des risques, actions, formations, bonnes pratiques et technologies qui peuvent être utilisés pour protéger les personnes et les actifs informatiques connectés directement ou indirectement à un réseau des états et des organisations (avec un objectif de disponibilité, intégrité & authenticité, confidentialité, preuve & non-répudiation). <ref>[http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)]</ref>}}<br/> | ||
| + | ====[[Sierra Leone]]==== | ||
| + | {{definition|Cybersecurity – The Protection of information systems forming cyberspace from attacks, assuring confidentiality, integrity and availability of information/data processed in this environment, detection of attacks and cyber incidents, activation of counter-response mechanisms and recovering systems to conditions before the cybersecurity incident. <ref>[https://moic.gov.sl/wp-content/uploads/2023/08/FINAL-CYBERSECURITY-STRATEGY.pdf National Cyber Security Strategy 2021 - 2025 (2023)]</ref>}}<br/> | ||
| + | |||
==== [[Singapore]] ==== | ==== [[Singapore]] ==== | ||
{{definition|“cybersecurity” means the security of a computer or computer system against unauthorised access or attack, to preserve the [[availability]] and [[integrity]] of the computer or computer system, or the [[confidentiality]] of information stored or processed therein. <ref>[https://www.csa.gov.sg/~/media/csa/cybersecurity_bill/draft_cybersecurity_bill_2017.ashx (draft) Cybersecurity Bill 2017]</ref>}}<br /> | {{definition|“cybersecurity” means the security of a computer or computer system against unauthorised access or attack, to preserve the [[availability]] and [[integrity]] of the computer or computer system, or the [[confidentiality]] of information stored or processed therein. <ref>[https://www.csa.gov.sg/~/media/csa/cybersecurity_bill/draft_cybersecurity_bill_2017.ashx (draft) Cybersecurity Bill 2017]</ref>}}<br /> | ||
| Line 370: | Line 401: | ||
====[[Togo]]==== | ====[[Togo]]==== | ||
{{definition|Cybersécurité: capacité des réseaux de communications électroniques et des systèmes d'information à résister, à un niveau de confiance donné, à des actions qui compromettent la disponibilité, l'authenticité, l'intégrité ou la confidentialité de données stockées, transmises ou traitées, et des services connexes que lesdits réseaux ou systèmes d'information offrent ou rendent accessibles. La cybersécurité est assurée par la mise en œuvre d'un ensemble de mesures de prévention, de protection et de dissuasion d'ordre technique, organisationnel, juridique, financier, humain, procédural et autres actions. <ref>[https://assemblee-nationale.tg/wp-content/uploads/2022/06/8CYBER-SEC-CRIME-LOI-AN.pdf Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)]</ref>}}<br/> | {{definition|Cybersécurité: capacité des réseaux de communications électroniques et des systèmes d'information à résister, à un niveau de confiance donné, à des actions qui compromettent la disponibilité, l'authenticité, l'intégrité ou la confidentialité de données stockées, transmises ou traitées, et des services connexes que lesdits réseaux ou systèmes d'information offrent ou rendent accessibles. La cybersécurité est assurée par la mise en œuvre d'un ensemble de mesures de prévention, de protection et de dissuasion d'ordre technique, organisationnel, juridique, financier, humain, procédural et autres actions. <ref>[https://assemblee-nationale.tg/wp-content/uploads/2022/06/8CYBER-SEC-CRIME-LOI-AN.pdf Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)]</ref>}}<br/> | ||
| + | ====[[Tunisia]]==== | ||
| + | {{definition|Cybersécurité: La cybersécurité signifie l’apport des ressources requises à la protection du [[Cyberspace||cyberespace]] contre les menaces qui pourraient affecter la [[Confidentiality|confidentialité]], la sécurité et la [[Availability|disponibilité]] des données et des services. <ref>[https://www.ancs.tn/sites/default/files/ncss24/downloads/FR%20-%20Natl%20Cyberspace%20Strategy%202020-2025.pdf République tunisienne Stratégie nationale en matière de cybersécurité 2020-2025]</ref>}}<br /> | ||
==== [[Türkiye]] ==== | ==== [[Türkiye]] ==== | ||
| Line 410: | Line 443: | ||
{{definition|Cybersecurity means the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. <ref>[https://www.zicta.zm/storage/sites/attachments/TVV4W9VO7MgqBMtdHT4h09NNq8XSXyS3VVYU44PF.pdf National Cyber Security Policy]</ref>}}<br/> | {{definition|Cybersecurity means the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. <ref>[https://www.zicta.zm/storage/sites/attachments/TVV4W9VO7MgqBMtdHT4h09NNq8XSXyS3VVYU44PF.pdf National Cyber Security Policy]</ref>}}<br/> | ||
| − | === | + | ===Other Definitions=== |
| − | |||
| − | |||
| − | |||
===International organisations === | ===International organisations === | ||
| Line 435: | Line 465: | ||
{{definition|Cyber Security: The vulnerability of any computing system, software program, or critical infrastructure, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | {{definition|Cyber Security: The vulnerability of any computing system, software program, or critical infrastructure, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | ||
| − | === | + | ===Regional Definitions=== |
| + | ====[[Isle of Man]]==== | ||
| + | {{definition|Cyber security - Protecting people and their computers, networks, programs and data from unauthorised access, exploitation, or modification. <ref>[https://csc.gov.im/media/qd2p4o2z/approved-national-cyber-security-strategy-1.pdf Isle of Man National Cyber Security Strategy (2022-2027)]</ref>}}<br/> | ||
| + | |||
====[[Scotland]]==== | ====[[Scotland]]==== | ||
{{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s [[Asset|assets]]. <ref>[http://www.gov.scot/Resource/0048/00489206.pdf Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland]</ref>}}<br /> | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s [[Asset|assets]]. <ref>[http://www.gov.scot/Resource/0048/00489206.pdf Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland]</ref>}}<br /> | ||
| Line 451: | Line 484: | ||
<!--===Standard Definition=== | <!--===Standard Definition=== | ||
--> | --> | ||
| + | |||
=== [[Dictionary]]=== | === [[Dictionary]]=== | ||
{{definition|Cybersecurity Alle beveiligingsmaatregelen die men neemt om schade te voorkomen door een storing, uitval of misbruik van een informatiesysteem of computer. Ook worden maatregelen genomen om schade te beperken en/of herstellen als die toch is ontstaan. Voorbeelden van schade zijn dat men niet meer in een computersysteem kan komen wanneer men dat wil. Of dat de opgeslagen informatie bij anderen terecht komt of niet meer klopt. De maatregelen hebben te maken met processen in de organisatie, technologie en gedrag van mensen. <ref>[https://www.cybersecurityalliantie.nl/ecp_images/2021/12/Cybersecurity-Woordenboek-2021_ZonderSpreads.pdf Cybersecurity Woordenboek 2021]</ref>}}<br/><br/> | {{definition|Cybersecurity Alle beveiligingsmaatregelen die men neemt om schade te voorkomen door een storing, uitval of misbruik van een informatiesysteem of computer. Ook worden maatregelen genomen om schade te beperken en/of herstellen als die toch is ontstaan. Voorbeelden van schade zijn dat men niet meer in een computersysteem kan komen wanneer men dat wil. Of dat de opgeslagen informatie bij anderen terecht komt of niet meer klopt. De maatregelen hebben te maken met processen in de organisatie, technologie en gedrag van mensen. <ref>[https://www.cybersecurityalliantie.nl/ecp_images/2021/12/Cybersecurity-Woordenboek-2021_ZonderSpreads.pdf Cybersecurity Woordenboek 2021]</ref>}}<br/><br/> | ||
| Line 467: | Line 501: | ||
<references /> | <references /> | ||
[[Category:Security]][[Category:Information]][[Category:Resilience]] | [[Category:Security]][[Category:Information]][[Category:Resilience]] | ||
| − | {{#set:defined by=ECA|defined by=Albania|defined by=Australia|defined by=Austria|defined by=Barbados|defined by=Belgium|defined by=Belize|defined by=Benin|defined by=Bermuda|defined by=Botswana|defined by=Brazil|defined by=Bulgaria|defined by=Burkina-Faso|defined by=Cameroon|defined by=Canada|defined by=Chile|defined by=Colombia|defined by=Costa Rica|defined by=Cuba|defined by=Cyprus|defined by=Croatia|defined by=Czech Republic|defined by=Denmark|defined by=Egypt|defined by=El Salvador|defined by=Estonia|defined by=Eswatini|defined by=Finland|defined by=France|defined by=Germany|defined by=Greece|defined by=Guatemala|defined by=Hungary|defined by=Iceland|defined by=India|defined by=Indonesia|defined by=Islamic Republic of Afghanistan|defined by=Ireland|defined by=Israel|defined by=Italy|defined by=Jamaica|defined by=Japan|defined by=Jordan|defined by=Kenya|defined by=Kingdom of Saudi Arabia|defined by=Kosovo|defined by=Kuwait|defined by=Kyrgyztan|defined by=Latvia|defined by=Lebanon|defined by=Liberia|defined by=Lithuania|defined by=Luxembourg|defined by=North Macedonia|defined by=Malta|defined by=Mexico|defined by=Moldova|defined by=Montenegro|defined by=Morocco|defined by=Mozambique|defined by=Netherlands|defined by=New Zealand|defined by=Nicaragua|defined by=Nigeria|defined by=Norway|defined by=Pakistan|defined by=Papua New Guinea|defined by=Paraguay|defined by=Philippines|defined by=Poland|defined by=Portugal|defined by=Qatar|defined by=Republic of Trinidad & Tobago|defined by=Romania|defined by=Russian Federation|defined by=Rwanda|defined by=Samoa|defined by=Senegal|defined by=Singapore|defined by=Slovenia|defined by=South Africa|defined by=Spain|defined by=Sri Lanka|defined by=Sweden|defined by=Switzerland|defined by=Thailand|defined by=Togo|defined by=Turkey|defined by=Ukraine|defined by=United States|defined by=Uzbekistan|defined by=Vanuatu|defined by=United Kingdom|defined by=ITU-T|defined by=WEF|defined by=ISO|defined by=NIST|defined by=United States|defined by=DHS|defined by=Scotland|defined by=Victoria|defined by=Isle of Man|defined by=Russian Federation|defined by=ISO|defined by=World Bank|defined by=New South Wales|defined by=Zambia|defined by=Financial Stability Board|defined by=Wales|defined by=Cymru}} | + | {{#set:defined by=ECA|defined by=Albania|defined by=Australia|defined by=Austria|defined by=Barbados|defined by=Belgium|defined by=Belize|defined by=Benin|defined by=Bermuda|defined by=Botswana|defined by=Brazil|defined by=Bulgaria|defined by=Burkina-Faso|defined by=Cameroon|defined by=Canada|defined by=Chile|defined by=Colombia|defined by=Congo|defined by=Costa Rica|defined by=Cuba|defined by=Cyprus|defined by=Croatia|defined by=Czech Republic|defined by=Denmark|defined by=Egypt|defined by=El Salvador|defined by=Estonia|defined by=Eswatini|defined by=Finland|defined by=France|defined by=Germany|defined by=Ghana|defined by=Greece|defined by=Guatemala|defined by=Hungary|defined by=Iceland|defined by=India|defined by=Indonesia|defined by=Islamic Republic of Afghanistan|defined by=Ireland|defined by=Israel|defined by=Italy|defined by=Ivory Coast|defined by=Jamaica|defined by=Japan|defined by=Jordan|defined by=Kenya|defined by=Kingdom of Saudi Arabia|defined by=Kosovo|defined by=Kuwait|defined by=Kyrgyztan|defined by=Latvia|defined by=Lebanon|defined by=Liberia|defined by=Lithuania|defined by=Luxembourg|defined by=North Macedonia|defined by=Malta|defined by=Lybia|defined by=Marocco|defined by=Mauritania|defined by=Mauritanie|defined by=Mexico|defined by=Moldova|defined by=Montenegro|defined by=Morocco|defined by=Mozambique|defined by=Netherlands|defined by=New Zealand|defined by=Nicaragua|defined by=Nigeria|defined by=Norway|defined by=Pakistan|defined by=Papua New Guinea|defined by=Paraguay|defined by=Philippines|defined by=Poland|defined by=Portugal|defined by=Qatar|defined by=Republic of Trinidad & Tobago|defined by=Romania|defined by=Russian Federation|defined by=Rwanda|defined by=Samoa|defined by=Senegal|defined by=Sierra Leone|defined by=Singapore|defined by=Slovenia|defined by=South Africa|defined by=Spain|defined by=Sri Lanka|defined by=Sweden|defined by=Switzerland|defined by=Thailand|defined by=Togo|defined by=Tunisia|defined by=Turkey|defined by=Ukraine|defined by=United States|defined by=Uzbekistan|defined by=Vanuatu|defined by=United Kingdom|defined by=ITU-T|defined by=WEF|defined by=ISO|defined by=United Nations|defined by=NIST|defined by=United States|defined by=DHS|defined by=Scotland|defined by=Victoria|defined by=Isle of Man|defined by=Russian Federation|defined by=ISO|defined by=World Bank|defined by=New South Wales|defined by=Zambia|defined by=Financial Stability Board|defined by=Wales|defined by=Cymru}} |
[[Category:RESIN-Glossary]] | [[Category:RESIN-Glossary]] | ||
{{#set:defined by=EU}} | {{#set:defined by=EU}} | ||
{{#set: Showmainpage=Yes}} | {{#set: Showmainpage=Yes}} | ||
Latest revision as of 11:37, 10 October 2025
Contents
- 1 Definitions Cyber Security
- 1.1 European Definitions
- 1.2 Other International Definitions
- 1.3 National Definitions
- 1.3.1 Albania
- 1.3.2 Australia
- 1.3.3 Austria
- 1.3.4 Barbados
- 1.3.5 Belgium
- 1.3.6 Belize
- 1.3.7 Benin
- 1.3.8 Bermuda
- 1.3.9 Botswana
- 1.3.10 Brazil
- 1.3.11 Bulgaria
- 1.3.12 Burkina-Faso
- 1.3.13 Cameroon (Cameroun)
- 1.3.14 Canada
- 1.3.15 Chile
- 1.3.16 Colombia
- 1.3.17 Congo
- 1.3.18 Costa Rica
- 1.3.19 Croatia
- 1.3.20 Cuba
- 1.3.21 Cyprus
- 1.3.22 Czech Republic
- 1.3.23 Denmark
- 1.3.24 Egypt
- 1.3.25 El Salvador
- 1.3.26 Estonia
- 1.3.27 Eswatini
- 1.3.28 Finland
- 1.3.29 France
- 1.3.30 Germany
- 1.3.31 Ghana
- 1.3.32 Greece
- 1.3.33 Guatemala
- 1.3.34 Hungary
- 1.3.35 Iceland
- 1.3.36 India
- 1.3.37 Islamic Republic of Afghanistan
- 1.3.38 Indonesia
- 1.3.39 Ireland
- 1.3.40 Israel
- 1.3.41 Italy
- 1.3.42 Ivory Coast
- 1.3.43 Jamaica
- 1.3.44 Japan
- 1.3.45 Jordan
- 1.3.46 Kenya
- 1.3.47 Kingdom of Saudi Arabia
- 1.3.48 Kosovo
- 1.3.49 Kuwait
- 1.3.50 Kyrgyztan
- 1.3.51 Latvia
- 1.3.52 Lebanon
- 1.3.53 Liberia
- 1.3.54 Lithuania
- 1.3.55 Luxembourg
- 1.3.56 Lybia
- 1.3.57 Malta
- 1.3.58 Marocco
- 1.3.59 Mauritania/Mauritanie
- 1.3.60 Mexico
- 1.3.61 Moldova
- 1.3.62 Montenegro
- 1.3.63 Morocco
- 1.3.64 Mozambique
- 1.3.65 Netherlands
- 1.3.66 New Zealand/AOTEAROA
- 1.3.67 Nicaragua
- 1.3.68 Nigeria
- 1.3.69 North Macedonia
- 1.3.70 Norway
- 1.3.71 Pakistan
- 1.3.72 Papua New Guinea
- 1.3.73 Paraguay
- 1.3.74 Philippines
- 1.3.75 Poland
- 1.3.76 Portugal
- 1.3.77 Qatar
- 1.3.78 Republic of Trinidad & Tobago
- 1.3.79 Romania
- 1.3.80 Russian Federation
- 1.3.81 Rwanda
- 1.3.82 Samoa
- 1.3.83 Saudi Arabia
- 1.3.84 Senegal
- 1.3.85 Sierra Leone
- 1.3.86 Singapore
- 1.3.87 Slovenia
- 1.3.88 South Africa
- 1.3.89 Spain
- 1.3.90 Sri Lanka
- 1.3.91 Sweden
- 1.3.92 Switzerland
- 1.3.93 Thailand
- 1.3.94 Togo
- 1.3.95 Tunisia
- 1.3.96 Türkiye
- 1.3.97 Ukraine
- 1.3.98 United Kingdom (UK)
- 1.3.99 United States
- 1.3.100 Uzbekistan
- 1.3.101 Vanuatu
- 1.3.102 Zambia
- 1.4 Other Definitions
- 1.5 International organisations
- 1.6 International standards
- 1.7 Regional Definitions
- 1.8 Dictionary
- 2 Definitions Science of Cyber Security
- 3 See also
- 4 Notes
- 5 References
Definitions Cyber Security
European Definitions
EU
ECA
[BG] Киберсигурност: Всички приети предпазни мерки за защита на ИТ системите и техните данни от неразрешен достъп, атаки и вреди, за да се гарантира тяхната достъпност, поверителност и цялост.
[CS] Kybernetická bezpečnost: Veškerá ochranná a bezpečnostní opatření přijatá na obranu informačních systémů a jejich údajů před neoprávněným přístupem, útokem a poškozením za účelem zajištění jejich dostupnosti, důvěrné povahy a integrity.
[DE] Cybersicherheit: Alle Vorkehrungen und Maßnahmen zum Schutz von IT-Systemen und ihren Daten vor unbefugten Zugriffen, vor Angriffen und vor Schaden, um ihre Verfügbarkeit, Vertraulichkeit und Integrität zu gewährleisten.
[DK] Cybersikkerhed: Alle desikkerhedsforanstaltninger, der er truffet for at beskytte IT systemer og deres data mod uautoriseret adgang, angreb og skader for at sikre deres tilgængelighed, fortrolighed og integritet.
[ES] Ciberseguridad: Conjunto de salvaguardias y medidas adoptadas para defender los sistemas informáticos y sus datos frente a accesos no autorizados, ataques y daños para garantizar su disponibilidad, confidencialidad e integridad.
[NE] Cyberbeveiliging: Alle waarborgen en maatregelen die worden ingevoerd om IT-systemen en hun gegevens te beschermen tegen onbevoegde toegang, aanvallen en schade, teneinde hun beschikbaarheid, vertrouwelijkheid en integriteit te garanderen.
Other International Definitions
United Nations (Regulation No. 155)
« Cybersécurité », la protection des véhicules routiers et de leurs fonctions contre les cyberattaques visant les composants électriques ou électroniques. [8]
«Кибербезопасность» означает состояние, в котором транспортные средства и их функции защищены от киберугроз, которым могут подвергаться электрические или электронные компоненты. [9]
World Bank
In a computing context, the term security implies cybersecurity.
National Definitions
Albania
Australia
Cyber security strategies include identity management, risk management and incident management.
New South Wales
Austria
Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. [17]
Barbados
Belgium
Cybersécurité, les actions nécessaires pour protéger les réseaux et les systèmes d’information, les utilisateurs de ces systèmes et les autres personnes exposées aux cybermenaces. [4]
Cybersicherheit“ bezeichnet alle Tätigkeiten, die notwendig sind, um Netz- und Informationssysteme, die Nutzer solcher Systeme und andere von Cyberbedrohungen betroffene Personen zu schützen. [4]
Cybersécurité est la situation où la protection du cyberespace est proportionelle à la cybermenace et aux conséquences possibles de cyberattaques. [20]
Cybersécurité nucléaire: la sécurité des réseaux et systèmes d’information des installations nucléaires et des établissements où des substances radioactives sont produites, fabriquées, détenues ou utilisées, ou où se trouvent des appareils ou installations émettant des rayonnements ionisants ne provenant pas de substances radioactives [22].
Belize
Benin
Bermuda
Botswana
Brazil
Cybersecurity is the art to ensure the existence and continuity of the information society of a nation, ensuring and protecting in Cyberspace, their information assets and their critical infrastructure.
Bulgaria
Burkina-Faso
Cameroon (Cameroun)
Canada
Cybersécurité: Protection de données numériques et préservation de l'intégrité de l'infrastructure servant à stocker et à transmettre des données numériques. Plus particulièrement, la cybersécurité englobe l'ensemble des technologies, des processus, des pratiques, des mesures d'intervention et d'atténuation dont la raison d'être est d'empêcher que les réseaux, ordinateurs, programmes et données soient attaqués ou endommagés, ou qu'on y accède sans autorisation, afin d'en assurer la confidentialité, l'intégrité et la disponibilité. [33]
Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. [35]
Chile
Within this set, the main feature to be protected is information confidentiality, integrity and availability which, in turn, create a robust and resilient cyberspace.
Colombia
Cyber security is the ability of the state to minimise the level of risk their citizens from threats or incidents of cyber nature are exposed to.
Congo
Costa Rica
Seguridad cibernética: Conservación, a través de políticas, tecnología y educación, de la disponibilidad, confidencialidad e integridad de la información y su infraestructura subyacente a fin de preservar la seguridad de las personas tanto en línea como fuera de línea. [44]
Croatia
Cyber security includes activities and measures to achieve confidentiality, integrity and availability of data and systems in cyberspace. [45]
Cuba
Cyprus
Cybersecurity is the broader security of networked systems that operate in cyberspace. [48]
I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users.
Czech Republic
Cyber security: Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. [50]
Denmark
Egypt
El Salvador
Estonia
Eswatini
Finland
Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -unofficial translation- [57]
France
Cybersecurity: A desired condition for an information system, allowing it to withstand events of malicious origin that are likely to compromise the availability, integrity or confidentiality of data stored, processed or transferred or the services provided by the system. [59]
Cybersécurité: état recherché pour un système d’information lui permettant de résister à des événements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises et des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. [61]
Germany
(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. [64]
(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. [65]
Häufig wird bei der Betrachtung von Cyber-Sicherheit auch ein spezieller Fokus auf Angriffe aus dem Cyber-Raum gelegt.
Ghana
a. the computer or computer system continuses to be available and operational,
b. the integrity of the computer or computer system is maintained, and
c. the integrity and confidentiality of information stored in, prrocessed by or transmitted through the computer or computer system is maintained. [67]
Greece
Guatemala
Los activos de la organización y los usuarios son los dispositivos informáticos conectados, los usuarios, los servicios/aplicaciones, los sistemas de comunicaciones, las comunicaciones multimedios, y la totalidad de la información transmitida y/o almacenada en el ciberentorno. La ciberseguridad garantiza que se alcancen y mantengan las propiedades de seguridad de los activos de la organización y los usuarios contra los riesgos de seguridad correspondientes en el ciberentorno. Las propiedades de seguridad incluyen una o más de las siguientes: -disponibilidad; - integridad, que puede incluir la autenticidad y el no repudio; - confidencialidad
Hungary
Iceland
India
Islamic Republic of Afghanistan
Indonesia
Cyber Security means an adaptive and innovative effort in order to protect all layers of cyberspace, including the information assets contained therein, from both technical and social cyber threats and attacks. [75]
Ireland
Israel
Italy
Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.
Ivory Coast
Jamaica
Japan
Cyber Security is a process that protects information by preventing, detecting, and responding to attacks.
Jordan
األِٓ اٌغُجشأٍ --- كٔخ٣ش ر٤جش حُلؼخء حُغ٤زشح٢ٗ )حُظ٢ طظٌٕٞ ٖٓ حألؿٜضس ٝحُزشٓـ٤خص ٝحُز٠٘ حُظلظ٤ش حُٔشطزطش رٜخ( ًٝخكش حُز٤خٗخص حُٞٔؿٞدس كٜ٤خ ٝحُخذٓخص حُظ٢ طوذٜٓخ ٖٓ حُٞطٍٞ اٜ٤ُخ رشٌَ ؿ٤ش هخ،٢ٗٞٗ أٝ ٖٓ عٞء حالعظخذحّ أٝ حُؼشس، عٞحء ُؼشس حُٔظؼٔذ حُز١ ٣غززٚ ٓشـَ حُ٘ظخ،ّ أٝ حُؼشس حُلخطَ رطش٣ن حُخطؤ ٗظ٤ـش ػذّ حطزخع حإلؿشحءحص حأل٤٘ٓش أٝ ر٘ظ٤ـش حُظؼشع ُِخذحع روظذ حُظغزذ رخُؼشس حُٔزًٞس [82]
This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so.
Kenya
Kingdom of Saudi Arabia
Kosovo
Kuwait
Cyber security: is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [90]
Kyrgyztan
Latvia
Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.
Lebanon
Liberia
Lithuania
Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. [96]
Luxembourg
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. [98]
Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité.
Organisation and user assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organisation and user assets against relevant security risks in the cyber environment. The
general security objectives comprise the following: availability;integrity, which may include authenticity and non-repudiation; and confidentiality.
Lybia
Malta
Cyber security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.
Marocco
Mauritania/Mauritanie
Mexico
Moldova
Montenegro
Morocco
Cybersecurity: Desired situation for an information system enabling it to withstand events arising from cyberspace that may compromise the availability, integrity or confidentiality of the data stored, processed or transmitted.
Mozambique
Netherlands
Cybersecurity: the full spectrum of measures designed to reduce relevant cyber risks to an acceptable level. This also includes dealing with risks of damage to or failure of digital systems and the availability, integrity and confidentiality of data. Measures may focus on the prevention of cyber incidents and – if a cyber incident does occur – on detection, damage limitation and recovery. What constitutes an acceptable level of risk will be determined in a risk assessment. [112]
Cyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. [118]
Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of
the confidentiality and/or integrity of information stored in the ICT systems.
New Zealand/AOTEAROA
Nicaragua
Nigeria
North Macedonia
Norway
Digital sikkerhet handler om beskyttelse av «alt» som er sårbart fordi det er koblet til eller på annen måte avhengig av informasjons- og kommunikasjonsteknologi. Brukes synonymt med begrepene IKT-sikkerhet og cybersikkerhet. [129]
Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. [131]
Pakistan
Papua New Guinea
Paraguay
Philippines
Poland
Cyber RP (RP security in cyberspace) is the process of ensuring the safe operation of in cyberspace state as a whole, its structure, individuals and legal persons, including companies and other entities without legal personality, as well as at their disposal ICT systems and information resources in the global cyberspace. [146]
Portugal
Qatar
مجموعة ا أ لدوات والسياسات والمفاهيم وا إ لجراءات ا أ لمنية والمبادئ التوجيهية ومنهجيات إدارة المخاطر وا إ لجراءات والتدريب وأفضل الممارسات وسبل التأمي ن والتقنيات ال ت ي يمكن استخدامها لحماية بيئة الفضاء ا إ للك ترو ني وأصول[150]
Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: confidentiality, integrity (which may include authenticity and non-repudiation), and availability.
Republic of Trinidad & Tobago
La ciberseguridad es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. [151]
Romania
Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. [152]
Russian Federation
Cyber security (RAW TRANDLATION): a set of conditions in which all the components are protected from maximum possible number of cyber threats and impacts of unwanted consequences.
информационная инфраструктура: совокупность технических средств и систем формирования, преобразования, передачи, использования и хранения информации. [154]
Rwanda
Cyber security: protection of computer systems from theft of, damage to their hardware, software or information as well as from disruption or misdirection of the services they provide.
Cyber sécurité: protection des systèmes informatiques contre le vol de leurs matériel, logiciels ou informations ou dommages à leur encontre ainsi que contre la perturbation ou la mauvaise orientation des services qu’ils fournissent. [155]
Samoa
Saudi Arabia
Senegal
Sierra Leone
Singapore
Slovenia
South Africa
Spain
Sri Lanka
Sweden
Switzerland
Cyber-Sicherheit: Anzustrebender Zustand innerhalb des Cyber-Raums, bei dem die Kommunikation und der Datenaustausch zwischen Informations- und Kommunikationsinfrastrukturen wie ursprünglich beabsichtigt funktionieren. Dieser Zustand wird mit Massnahmen der Informationssicherheit und der Cyber-Defence erreicht. [168]
Cybersécurité: Situation visée au sein du cyberespace dans laquelle la communication et l’échange de données entre les infrastructures d’information et de communication fonctionnent comme prévu. Cette situation est atteinte grâce aux mesures en matière de sécurité de l’information et à la cyberdéfense. [169]
Cyber sicurezza: Stato auspicabile nel cyberspazio in cui le comunicazioni e lo scambio di dati tra le infrastrutture TIC funzionano come previsto originariamente. Questo stato si consegue adottando misure di sicurezza delle informazioni e di cyber difesa. [170]
Thailand
Togo
Tunisia
Türkiye
Cyber security: Protection of information systems forming cyber space from attacks, assuring confidentiality, integrity and availability of information/data processed in this environment, detection of attacks and cyber security incidents, activation of counter-response mechanisms and recovering systems to conditions prior the cyber security incident. [175]
Ukraine
{machine translation} cybersecurity - the protection of the vital interests of man and citizen, the society and the state during the use of cyberspace, which ensures the sustainable development of the information society and the digital communicative environment, timely detection, prevention and neutralisation of real and potential threats to the national security of Ukraine in cyberspace. [177]
United Kingdom (UK)
United States
DHS
Financial Stability Board
NIA
NIPP
NIST
Synonymous with security controls and safeguards.
DoD
Uzbekistan
кибербезопасность (объектов) критической информационной инфраструктуры — состояние защищенности, обеспечивающее устойчивое функционирование объекта критической информационной инфраструктуры и защиту от нарушения, которое может привести к возникновению инцидента кибербезопасности на объекте критической информационной инфраструктуры.
(Cybersecurity (objects) of critical information infrastructure is a state of security that ensures the stable operation of a critical information infrastructure facility and protection against a breach that may lead to a cybersecurity incident at a critical information infrastructure facility) [185]
киберҳимоя — киберхавфсизлик ҳодисаларининг олдини олишга, киберҳужумларни аниқлашга ва улардан ҳимоя қилишга, киберҳужумларнинг оқибатларини бартараф этишга, телекоммуникация тармоқлари, ахборот тизимлари ҳамда ресурслари фаолиятининг барқарорлигини ва ишончлилигини тиклашга қаратилган ҳуқуқий, ташкилий, молиявий-иқтисодий, муҳандислик-техник чора-тадбирлар, шунингдек, маълумотларни криптографик ва техник жиҳатдан ҳимоя қилиш чора-тадбирлари мажмуи.
(Cyber protection - a set of legal, organizational, financial, economic, engineering and technical measures, as well as measures of cryptographic and technical data protection aimed at preventing cybersecurity incidents, detecting cyber attacks and protecting against them, eliminating the consequences of cyber attacks, restoring stability and reliability of telecommunication networks, information systems and resources) [186]
Vanuatu
Zambia
Other Definitions
International organisations
World Economic Forum
International standards
ISO/IEC
ITU-T
Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.
IETF
Regional Definitions
Isle of Man
Scotland
Cymru/Wales
Victoria (Australia)
East-West Institute (Russia-US)
Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. [197]
Academic
Dictionary
Definitions Science of Cyber Security
Academic
See also
Notes
References
- ↑ law and publications EUR-Lex EUR-Lex - COM:2017:477:FIN - EN
- ↑ law and publications EUR-Lex EUR-Lex - 2017/0225 (COD) LEX 1899 - EN
- ↑ Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 07/02/2013
- ↑ 4.00 4.01 4.02 4.03 4.04 4.05 4.06 4.07 4.08 4.09 4.10 4.11 4.12 4.13 4.14 4.15 4.16 4.17 4.18 4.19 4.20 4.21 4.22 4.23 4.24 4.25 4.26 4.27 4.28 REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)
- ↑ Directive 2022/2555 Measures for a high common level of security of network and information systems across the Union, repealing Directive (EU) 2016/1148
- ↑ European Court of Auditors, Challenges to effective EU cybersecurity policy, Briefing Paper, March 2019
- ↑ UN Regulation No. 155 addendum 154 - English
- ↑ UN Regulation No. 155 addendum 154 - French
- ↑ Regulation No. 155 addendum 154 - Russian
- ↑ Cyber Security Glossary, World Bank (2015)
- ↑ PROJEKT LIGJ PËR SIGURINË KIBERNETIKE
- ↑ ENERGY REGULATOR AUTHORITY REGULATION ON CYBER SECURITY OF CRITICAL INFRASTRUCTURES IN THE POWER SECTOR
- ↑ Rights and Protections on Cyber Security, Australian Attorney-General’s Department
- ↑ Annual Reports AG
- ↑ NSW Government Cyber Security Strategy
- ↑ Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
- ↑ Österreichische Strategie für Cyber Sicherheit (2013)
- ↑ Emergency Procedures: From Plan to Practice
- ↑ Cyber Security Strategy.be (Nederlands) (2012)
- ↑ Cyber Security Strategy.be (Francais) (2012)
- ↑ 5APRIL2019.—Wethoudendewijzigingvandewetvan15april1994 betreffende de bescherming van de bevolking en van het leefmilieu tegen de uit ioniserende stralingen voortspruitende gevaren en betreffende het Federaal Agentschap voor Nucleaire Controle betreffende de nucleaire cyberbeveiliging (2019)
- ↑ 5 AVRIL 2019. — Loi portant modification de la loi du 15 avril 1994 relative à la protection de la population et de l’environnement contre les dangers resultant des rayonnements ionisants et relative à l’Agence fédérale de Controle nucleaire concernant la cybersecurité nucleaire (2019)
- ↑ National Cybersecurity Strategy - Towards A Secure Cyberspace 2020-2023 (2020)
- ↑ DÉCRET N° 2023 - 060 DU 22 FEVRIER 2023 portant approbation des règles de politique de protection des infrastructures d’information critiques en République du Bénin
- ↑ Bermuda Cybersecurity Strategy 2018-2022
- ↑ National Cybersecurity Strategy (2021)
- ↑ GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Portaria Nº 45, de 8 de setembro de 2009.
- ↑ „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
- ↑ Plan National de Cybersécurité (2010)
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ Canada’s Cyber Security Strategy: Canada's Vision for Security and prosperity in the digital age (2018)
- ↑ Stratégie nationale de cybersécurité: Vision du canada pour la sécurité et la prospérité dans l'ère numérique (2018)
- ↑ Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
- ↑ Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
- ↑ BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile
- ↑ Chile Política Nacional de Ciberseguridad (2017)
- ↑ Chilean National Cybersecurity Policy (2017)
- ↑ Estrategia de seguridad digital de Colombia 2025-2027 (2025)
- ↑ Conpes 3510
- ↑ Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)
- ↑ Stratégie nationale de cybersécurité 2022 - 2025 de la République Démocratique de Congo
- ↑ Estrategia Nacional de Ciberseguridad de Costa Rica (2023-2027)
- ↑ 44.0 44.1 Estrategia Nacional de Ciberseguridad de Costa Rica (2017)
- ↑ National Cyber Security Strategy draft (2015)
- ↑ Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio
- ↑ Στρατηγική Κυβερνοασφάλειας της Κυπριακής Δημοκρατίας (23 April 2012)
- ↑ Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)
- ↑ Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)
- ↑ Výkladový slovník kybernetické bezpečnosti (2013)
- ↑ Danish Cyber Security Strategy, 2014
- ↑ Ministry of Communications and Information Technology (MCIT) - Cyber Security
- ↑ (Draft) Ley de ciberseguridad
- ↑ Cyber Security Strategy, Estonian Ministry of Defence, 2008.
- ↑ ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
- ↑ Finlands' Cyber Security Strategy
- ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- ↑ Méthode de classification et mesures principales, ANSSI (2014)
- ↑ Classification Method and Key Measures, ANSSI (2014)
- ↑ Information systems defence and security: France's Strategy
- ↑ La Stratégie de la France en matière de défense et de sécurité des systèmes d’information (2011)
- ↑ DRAFT Cyber-Sicherheitsstrategie für Deutschland 2021
- ↑ Cyber-Sicherheitsstrategie für Deutschland 2016
- ↑ Protection of Critical Infrastructures, BMI.
- ↑ UP KRITIS, BSI, 2014
- ↑ BSI Glossar
- ↑ National Cyber Security Policy & Strategy (2024)
- ↑ Plan Estrategia Nacional de Seguridad Cibernética (National Cyber Security Strategy) 2020-2024 (2020)
- ↑ La Estrategia Nacional de Seguridad Cibernética (June 2018)
- ↑ Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
- ↑ Icelandic National Cyber Security Strategy 2022–2037 (2022)
- ↑ Information Technology Act Ammendment (2008)
- ↑ National Cyber Security Strategy of Afghanistan (2014)
- ↑ Peraturan Presiden (Perpres) Nomor 47 Tahun 2023 tentang Strategi Keamanan Siber Nasional dan Manajemen Krisis Siber
- ↑ Regulation of the President of the Republic of Indonesia No. 47 of 2023 on the National Cyber Security Strategy and Cyber Crisis Management
- ↑ Indonesia National Cyber Security Strategy development (presentation), 2016
- ↑ Advancing National Cyberspace Capabilities (2011)
- ↑ IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
- ↑ Stratégie Nationale de Cybersecurité 2021-2025
- ↑ Jamaica's National Cyber Security Strategy
- ↑ 重要インフラのサイバーセキュリティを 向上させるためのフレームワーク (2014)
- ↑ National Cyber Security Strategy (2018-2023) - 2023-2018 حُغ٤زشح٢ٗ -ظشحط٤ـ٤ش حُٞؽ٤٘ش ُألٖٓ ح
- ↑ Kenya's National Cyber Security Strategy
- ↑ GUIDELINES ON CYBERSECURITY FOR PAYMENT SERVICE PROVIDERS, AUGUST 2018, Kenya
- ↑ Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
- ↑ Cyber Security Framework Saudi Arabian Monetary Authority Version 1.0 May 2017
- ↑ National Cyber Security Strategy and Action Plan 2023 – 2026 (2023)
- ↑ Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019
- ↑ الاستراتيجية الوطنية للأمن السيبراني لدولة الكويت (2017-2020)
- ↑ National Cyber Security Strategy 2017-2020
- ↑ СТРАТЕГИЯ кибербезопасности Кыргызской Республики на 2019-2023 годы
- ↑ Latvia's National Cyber Security Strategy
- ↑ Lebanon Cyber Security Strategy v2
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019
- ↑ LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius
- ↑ Stratégie nationale en matière de cyber sécurité II (2015)
- ↑ National Cybersecurity Strategy II (2015)
- ↑ Cybersecurity definitions
- ↑ Malta Cyber Security Strategy 2023-2026
- ↑ Malta Cyber Security Strategy 2016
- ↑ Loi n° 05-20 relative à la cybersécurité
- ↑ Strategie nationale de cybersecurite 2022-2025 (2022)
- ↑ Estragia Nacional de Ciberseguridad (November 2017)
- ↑ NATIONAL STRATEGY for information society development “Digital Moldova 2020” (2013)
- ↑ NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
- ↑ Strategija sajber bezbjednosti Crne Gore 2022-2026 (2021)
- ↑ Стратегија сајбер безбједности Црне Горе 2022-2026
- ↑ STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011
- ↑ Estratégia Nacional de Segurança Cibernética de Moçambique (2021-2024)
- ↑ Nederlandse Cybersecurity Strategie 2022-2028: Ambities en acties voor een digitaal veilige samenleving
- ↑ Netherlands Cyber Security Strategy 2022-2028: Ambitions and actions for a digitally secure society
- ↑ Cyber Security Beeld Nederland 2020
- ↑ Nederlandse Cybersecurity Agenda 2018
- ↑ Cyber Security Beeld Nederland 2018
- ↑ National Cybersecurity Agenda: A cyber secure Netherlands (2018)
- ↑ Nationale Cybersecurity Strategie 2: van bewust naar bekwaam
- ↑ National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ New Zealand’s Cyber Security Strategy (2019)
- ↑ New Zealand’s Cyber Security Strategy (2011)
- ↑ DE APROBACIÓN DE LA “ESTRATEGIA NACIONAL DE CIBERSEGURIDAD 2020-2025” (asamblea.gob.ni)
- ↑ National Cyber Security Strategy Nigeria (2014)
- ↑ DRAFT ACTION PLAN FOR IMPLEMENTATION OF THE NATIONAL CYBERSECURITY STRATEGY 2019
- ↑ НАЦИОНАЛНА СТРАТЕГИЈА ЗА САЈБЕР БЕЗБЕДНОСТ НА РЕПУБЛИКА МАКЕДОНИЈА 2018 -2022
- ↑ National Cyber Security Strategy of the Republic of Macedonia (2018)
- ↑ National Cyber Security Strategy for Norway (2019)
- ↑ Nasjonal strategi for digital sikkerhet (2019)
- ↑ Cyber Security Strategy for Norway (2012)
- ↑ Nasjonal strategi for informasjonssikkerhet (2012)
- ↑ draft BILL to provide for the establishment of a National Cyber Security Council
- ↑ Cyber Security Strategy for Telecom Sector 2023-2028
- ↑ National Cyber Security Policy 2021
- ↑ National Cyber Security Policy (2024 - 2030)
- ↑ Papua New Guinea Cybercrime Policy
- ↑ National Cyber Security Strategy (2020)
- ↑ Plan Nacional de Ciberseguridad, República del Paraguay, 2016
- ↑ Cybercrime Prevention Act of 2012 (Pinoy Version) Philippines
- ↑ National Cyber Security Plan (Working Draft v1.13 as of December 2016)
- ↑ Republic Act No. 10175, 2012
- ↑ National Cyber Security Plan (May 2017)
- ↑ DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
- ↑ NHS Cyber security glossary
- ↑ U S TAWA z dnia o krajowym systemie cyberbezpieczeństwa / Polish (draft) law on the national cybersecurity system (2018)
- ↑ Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warsaw (2015)
- ↑ (MINI)SŁOWNIK BBN: Propozycje nowych terminów z dziedziny bezpieczeństwa (2015) - proposed definition
- ↑ Quadro Nacional de Referência para a Cibersegurança
- ↑ QATAR National Cyber Security Strategy (May 2014)
- ↑ الاستراتيجية الوطنية للأمن السيبراني QATAR NCSS - Arabic version (May 2014)
- ↑ Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)
- ↑ Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
- ↑ КОНЦЕПЦИЯ СТРАТЕГИИ КИБЕРБЕЗОПАСНОСТИ РОССИЙСКОЙ ФЕДЕРАЦИИ (Draft Cyber Security Strategy 2016)
- ↑ Конвенция об обеспечении международной информационной безопасности (концепция)
Convention on ensuring international information security; draft 2015 - ↑ https://cyber.gov.rw/documentation/ Rwanda cybercrime law
- ↑ National Information and Communication Technology in Education Policy 2018 - 2023
- ↑ Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ National Cyber Security Strategy 2021 - 2025 (2023)
- ↑ (draft) Cybersecurity Bill 2017
- ↑ Strategija kibernetske varnosti (2016)
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 39475, 4 Desember 2015
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010
- ↑ CIBERSEGURIDAD. RETOS Y AMENAZAS A LA SEGURIDAD NACIONAL EN EL CIBERESPACIO, MINISTERIO DE DEFENSA (2010)
- ↑ Cyber Security bill 2019
- ↑ Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)
- ↑ SN002 - National strategy for Switzerland’s protection against cyber risks (NCS) 2018-2022 (2018)
- ↑ SN002 - Nationale Strategie zum Schutz der Schweiz vor Cyber-Risiken (NCS) 2018-2022 (2018)
- ↑ SN002 - Stratégie nationale de protection de la Suisse contre les cyberrisques (SNPC) 2018-2022 (2018)
- ↑ SN002 - Strategia nazionale per la protezione della Svizzera contro i cyber-rischi (SNPC) 2018-2022 (2018)
- ↑ National Cybersecurity Bill (DRAFT approved by the Cabinet on 6 January 2015), Unofficial translation by Thai Netizen Network – March 2015
- ↑ Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)
- ↑ République tunisienne Stratégie nationale en matière de cybersécurité 2020-2025
- ↑ UlUSAL SİBER GÜVENLİk STRATEJİSİ VE
- ↑ Turkey's National Cyber Security Strategy 2016-2019 (2016)
- ↑ Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
- ↑ ЗАКОН УКРАЇНИ - Про основні засади забезпечення кібербезпеки України / THE LAW OF UKRAINE: About the basic principles of providing cyber security of Ukraine 2163-19
- ↑ National Cyber Security Strategy 2016, HM Government
- ↑ 179.0 179.1 DHS/NICSS Glossary
- ↑ Financial Stability Board, Cyber Lexicon (Nov. 12, 2018)
- ↑ National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, 26 April 2010.
- ↑ National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009
- ↑ NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
- ↑ Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
- ↑ Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”
- ↑ Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”
- ↑ National Cybersecurity Strategy 2030
- ↑ National Cyber Security Policy
- ↑ WEF Partnering for Cyber Resilience Guidelines 2012
- ↑ ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity
- ↑ 191.0 191.1 191.2 191.3 191.4 ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205
- ↑ IETF RFC449 Internet Security Glossary 2
- ↑ Isle of Man National Cyber Security Strategy (2022-2027)
- ↑ Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland
- ↑ Strategaeth Seiberddiogelwch Llywodraeth: Adeiladu sector cyhoeddus seibergadarn 2022-2030
- ↑ Cyber Security Strategy Victoria (2017)
- ↑ RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS
- ↑ Clark, D., Berson, T., & Lin, H. S. (Eds.) (2014). At the nexus of cybersecurity and public policy. Computer Science and Telecommunications Board, National Research Council, Washington DC: The National Academies Press.
- ↑ Cybersecurity Woordenboek 2021
- ↑ Alexander Kott, Science of Cyber Security as a System of Models and Problems (2015)


