Security
In some languages the terms "Security" and "Safety" are the same.
Contents
Definitions
European Definitions
2009/72/EC
ENISA
Other International Definitions
ITU-T
NATO
National Definitions
Cameroon (Cameroun)
Czech Republic
Property of an element (e.g. an information system) which is at a certain level protected against losses, or also a state of protection (at a certain level) against losses. [9]
Bezpečnost IT zahrnuje ochranu důvěrnosti, integrity a dosažitelnosti při zpracování, úschově, distribuci a prezentaci informací (IT security covers protection of confidentiality, integrity and availability during processing, storage, distribution and presentation of information).
Finland
Security is a condition in which the threats and risks are controllable. -unofficial translation- [10]
India
Absolute security is impossible to achieve in practice and the quality of a given security system is relative. Within a state-model security system, security is a specific “state" to be preserved under various operations.
Japan
(1.) システムを防護するためにとる手段。
(2.) システムを防護するための手段を確立・維持管理に起因するシステムの条件。
(3.) 認可されていないアクセスや認可されていないアクセス、もしくは、偶発的な変更/破壊/損失が無いシステム資源の状態。
(Cyber) security is:
(1.) Measures taken to protect a system.
(2.) The condition of a system that results from the establishment and maintenance of measures to protect the system.
(3.) The condition of system resources being free from unauthorized access and from unauthorized or accidental change, destruction, or loss. [12]
United States
NIST
Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s Risk Management approach.
DoD
1. Measures taken by a military unit, activity, or installation to protect itself against all acts designed to, or which may, impair its effectiveness. (JP 3-10)
2. A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. (JP 3-10)
3. With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security. [14]
Standard Definition
IETF
(2) A system condition in which system resources are free from unauthorized access and from unauthorized or accidental change, destruction, or loss.
(3) Measures taken to protect a system. [15]
Discussion
See also
Notes
- Jump up ↑ ENTSO-E Glossary of Terms
- Jump up ↑ ENISA Risk Glossary
- Jump up ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X-800.
- Jump up ↑ Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T X.800.
- Jump up ↑ Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T X.800.
- Jump up ↑ [http://nso.nato.int/nso/zPublic/ap/aap6/AAP-6.pdf NATO Glossary AAP-06(2014)
- Jump up ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- Jump up ↑ http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
- Jump up ↑ http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
- Jump up ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- Jump up ↑ India's DGQA Cyber Security Policy (2015)
- Jump up ↑ http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
- Jump up ↑ NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013
- Jump up ↑ Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
- Jump up ↑ IETF RFC449 Internet Security Glossary 2