Difference between revisions of "Threat"
(→Uruguay) |
|||
Line 65: | Line 65: | ||
==== [[Norway]] ==== | ==== [[Norway]] ==== | ||
{{definition|Trusselaktør: entitet som utgjør en reell eller potensiell trussel mot et identifiserbart mål eller i en avgrenset og identifiserbar sammenheng. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/nasjonal_strategi_infosikkerhet.pdf Nasjonal strategi for informasjonssikkerhet (2012)]</ref><br /><br/>Threat: an entity that constitutes a real or potential threat to an identifiable goal or in a limited and identifiable context. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/cyber_security_strategy_norway.pdf Cyber Security Strategy for Norway (2012)]</ref>}}<br /> | {{definition|Trusselaktør: entitet som utgjør en reell eller potensiell trussel mot et identifiserbart mål eller i en avgrenset og identifiserbar sammenheng. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/nasjonal_strategi_infosikkerhet.pdf Nasjonal strategi for informasjonssikkerhet (2012)]</ref><br /><br/>Threat: an entity that constitutes a real or potential threat to an identifiable goal or in a limited and identifiable context. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/cyber_security_strategy_norway.pdf Cyber Security Strategy for Norway (2012)]</ref>}}<br /> | ||
+ | |||
+ | ==== [[Philippines]] ==== | ||
+ | {{definition|Cyber threats are [[Event|events]], situations and conditions that tend to reduce, degrade and destroy digital infrastructures. <ref>[https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Philippine_2005_National%20Cyber%20Security%20Plan%202005.pdf Philippine National Cyber Security Plan 2005]</ref>}}<br /> | ||
==== [[Republic of Trinidad & Tobago]] ==== | ==== [[Republic of Trinidad & Tobago]] ==== | ||
Line 124: | Line 127: | ||
[[Category:Threat]] | [[Category:Threat]] | ||
[[Category:Infrastructure]][[Category:Policy]] | [[Category:Infrastructure]][[Category:Policy]] | ||
− | {{#set:defined by=EU|defined by=ENISA|defined by=NATO|defined by=ITU-T|defined by=EU project|defined by=Brazil|defined by=Canada|defined by=Colombia|defined by=Czech Republic|defined by=Finland|defined by=France|defined by=Germany|defined by=India|defined by=Japan|defined by=Kingdom of Saudi Arabia|defined by=Netherlands|defined by=Norway|defined by=Republic of Trinidad & Tobago|defined by=Singapore|defined by=Switzerland|defined by=Turkey|defined by=United Kingdom|defined by=United States|defined by=Uruguay|defined by=ISO|defined by=NIST|defined by=IETF}} | + | {{#set:defined by=EU|defined by=ENISA|defined by=NATO|defined by=ITU-T|defined by=EU project|defined by=Brazil|defined by=Canada|defined by=Colombia|defined by=Czech Republic|defined by=Finland|defined by=France|defined by=Germany|defined by=India|defined by=Japan|defined by=Kingdom of Saudi Arabia|defined by=Netherlands|defined by=Norway|defined by=Philippines|defined by=Republic of Trinidad & Tobago|defined by=Singapore|defined by=Switzerland|defined by=Turkey|defined by=United Kingdom|defined by=United States|defined by=Uruguay|defined by=ISO|defined by=NIST|defined by=IETF}} |
Revision as of 17:43, 27 September 2016
The definitions of "Threat" and "Hazard" are very similar, so maybe the terms do not need to be distinguished. A CI-specific usage example for the above terms can be found on the "Hazard" entry.
Contents
- 1 Definitions
- 1.1 European Definitions
- 1.2 Other International Definitions
- 1.3 National Definitions
- 1.3.1 Brazil
- 1.3.2 Canada
- 1.3.3 Colombia
- 1.3.4 Czech Republic
- 1.3.5 Finland
- 1.3.6 France
- 1.3.7 Germany
- 1.3.8 India
- 1.3.9 Japan
- 1.3.10 Kingdom of Saudi Arabia
- 1.3.11 Netherlands
- 1.3.12 Norway
- 1.3.13 Philippines
- 1.3.14 Republic of Trinidad & Tobago
- 1.3.15 Singapore
- 1.3.16 Switzerland
- 1.3.17 Turkey
- 1.3.18 United Kingdom (UK)
- 1.3.19 United States
- 1.3.20 Uruguay
- 1.4 Other Definitions
- 1.5 Standard Definitions
- 2 See also
- 3 Notes
Definitions
European Definitions
The European Commission's CBRN Glossary[2] defines threat as
ENISA
Other International Definitions
ITU-T
NATO CEP / EAPC
An all hazards approach to threat includes accidents, natural hazards as well as deliberate attacks.
EU Project VITA
The semantics of that definition in the context of CI is that a threat to a CI may give rise to serious consequences to critical societal functions, including the supply chain, health, safety, security, economic or social well-being of people.
National Definitions
Brazil
Threat is the cause potential of an undesired incident which may result in harm to a system or organisation.
Canada
Présence d’un danger et d’une voie d’exposition. [10] [11]
Threats may be natural or human-induced, either accidental or intentional.
Colombia
Amenaza informática: La aparición de una situación potencial o actual donde un agente tiene la capacidad de generar una agresión cibernética contra la población, el territorio y la organización política del Estado (Ministerio de Defensa de Colombia)
Czech Republic
Potential cause of an unwanted incident which may result in damage to a system or organization. [14]
Finland
Threat is possibly realising adverse event or development. -unofficial translation- [15]
France
A non-official translation is the following:
Germany
Der Schaden bezieht sich dabei auf einen konkreten Wert wie Vermögen, Wissen, Gegenstände oder Gesundheit. Übertragen in die Welt der Informationstechnik ist eine Bedrohung ein Umstand oder Ereignis, der oder das die Verfügbarkeit, Integrität oder Vertraulichkeit von Informationen beeinträchtigen kann, wodurch dem Besitzer bzw. Benutzer der Informationen ein Schaden entstehen kann. Beispiele für Bedrohungen sind höhere Gewalt, menschliche Fehlhandlungen, technisches Versagen oder vorsätzliche Handlungen. Trifft eine Bedrohung auf eine Schwachstelle (insbesondere technische oder organisatorische Mängel), so entsteht eine Gefährdung.
India
Japan
(Cyber) Threat is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. [19]
Kingdom of Saudi Arabia
Netherlands
Een gebeurtenis of een proces die in potentie tot een incident kan leiden. [21]
Het hogere doel (intentie) kan zijn het verstevigen van de concurrentiepositie; politiek/landelijk gewin, maatschappelijke ontwrichting of levensbedreiging. [22]
Norway
Threat: an entity that constitutes a real or potential threat to an identifiable goal or in a limited and identifiable context. [24]
Philippines
Republic of Trinidad & Tobago
Singapore
Switzerland
Die Gefährdung entspricht daher einem potentiellen Ereignis oder einer potentiellen Entwicklung mit möglichen Auswirkungen für ein Schutzgut.
Turkey
United Kingdom (UK)
United States
DHS
NIST
These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future. The advanced persistent threat: (i) pursues its objectives repeatedly over an extended period of time; (ii) adapts to defenders’ efforts to resist it; and (iii) is determined to maintain the level of interaction needed to execute its objectives.
Uruguay
Other Definitions
Ontario (Canada)
Menace: personne, chose ou événement considéré comme une cause probable de préjudice ou de dommage. [35]
Standard Definitions
IETF
ISO/PAS 22399:2007
ISO/IEC 27000:2014
ISO 22300:2012(en)
See also
Notes
- ↑ EC COM(2006) 787 final, Directive of the Council on the identification and designation of European Critical Infrastructure and the assessment of the need to improve their protection, EC, Brussels 12.12.2006.
- ↑ 2.0 2.1 European Commission's CBRN Glossary, 2012
- ↑ ENISA Risk Glossary
- ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X-800.
- ↑ Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T X.800.
- ↑ Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T X.800.
- ↑ NATO EAPC(SCEPC) lexicon 2003.
- ↑ EU VITA deliverable.
- ↑ GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)
- ↑ [http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/mrgnc-mngmnt-frmwrk/index-eng.aspx An Emergency Management Framework for Canada (Second Edition)
- ↑ Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
- ↑ Lineamientos de política para ciberseguridad y ciberdefensa (2011)
- ↑ http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
- ↑ Cyber Security Explanatory Glossary (2013)
- ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- ↑ INSTRUCTION GENERALE INTERMINISTERIELLE RELATIVE A LA SECURITE DES ACTIVITES D’IMPORTANCE VITALE N°6600/SGDSN/PSE/PSN du 7 janvier 2014, PREMIER MINISTRE, SECRETARIAT GENERAL DE LA DEFENSE ET DE LA SECURITE NATIONALE, Direction Protection et Sécurité de l’Etat N° NOR: PRMD1400503J
- ↑ Glossar und Begriffsdefinitionen BSI
- ↑ India's DGQA Cyber Security Policy (2015)
- ↑ http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
- ↑ Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
- ↑ Zakboekje Preventie Cybercrime (2008
- ↑ NCSC, Cyber Security Beeld Nederland 5 (2015)
- ↑ Nasjonal strategi for informasjonssikkerhet (2012)
- ↑ Cyber Security Strategy for Norway (2012)
- ↑ Philippine National Cyber Security Plan 2005
- ↑ Comprehensive Disaster Management Policy Framework for Trinidad and Tobago
- ↑ Singapore Standard SS 540: 2008 on Business Continuity
- ↑ Leitfaden Schutz kritischer Infrastrukturen 2015
- ↑ 2016-2019 UlUSAL SİBER GÜVENLİk STRATEJİSİ (National Cyber Security Strategy 2016-2019, Sept. 2016)
- ↑ Glossary - Revision to Emergency Preparedness, Cabinet Office (2012)
- ↑ DHS Risk Lexicon 2010 Edition, September 2010
- ↑ NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013/NIST SP 800 series
- ↑ [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)]
- ↑ Glossary CERTuy
- ↑ 35.0 35.1 Province of Ontario’s Emergency Management Glossary of Terms
- ↑ IETF RFC449 Internet Security Glossary 2
- ↑ ISO/PAS 22399:2007 Societal security - Guideline for incident preparedness and operational continuity management.
- ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
- ↑ ISO 22300:2012(en) Societal security — Terminology