Difference between revisions of "Cyber Attack"

From CIPedia
Jump to navigation Jump to search
Line 22: Line 22:
 
{{definition|Atac cybernetic: acţiune ostilă desfăşurată în spaţiul cibernetic de natură să afecteze securitatea cibernetică. <ref>[https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/StrategiaDeSecuritateCiberneticaARomaniei.pdf Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică]</ref>}}  
 
{{definition|Atac cybernetic: acţiune ostilă desfăşurată în spaţiul cibernetic de natură să afecteze securitatea cibernetică. <ref>[https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/StrategiaDeSecuritateCiberneticaARomaniei.pdf Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică]</ref>}}  
 
<br />
 
<br />
 +
 +
==== [[Turkey]] ====
 +
{{definition|Siber saldırı: Ulusal siber uzayda bulunan bilişim sistemlerinin gizlilik, bütünlük veya erişilebilirliğini ortadan kaldırmak amacıyla, siber uzayın her hangi bir yerindeki kişi ve/veya bilişim sistemleri tarafından kasıtlı olarak yapılan işlemleri. <ref>[http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf 2016-2019 ULUSAL SİBER GÜVENLİK STRATEJİSİ</ref>}}<br />
  
 
==== [[United States]]====
 
==== [[United States]]====
Line 39: Line 42:
 
* Test reference. -->
 
* Test reference. -->
 
[[Category:Security]]
 
[[Category:Security]]
{{#set:defined by=Bulgaria|defined by=Japan|defined by=Romania|defined by=United States|defined by=NIST|defined by=ITU-T}}
+
{{#set:defined by=Bulgaria|defined by=Japan|defined by=Romania|defined by=Turkey|defined by=United States|defined by=NIST|defined by=ITU-T}}

Revision as of 22:02, 17 April 2016


Definitions

Other International Definitions

ITU-T

(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]

By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed

when they bypass the mechanism, or when they make the system use the mechanism incorrectly.

Attaque: Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. [2]


Ataque: Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. [3]


攻击: 为绕过一个系统的安全机制或利用其漏洞而采取的行动. [4]



National Definitions

Bulgaria

Кибер атака: злонамерена дейност, която цели да разруши, да осигури контрол над компютърна среда/инфраструктура, да наруши интегритет на данни или открадне контролирана информация. [5]

(НАТО) Действия, предприети за нарушаване, отхвърляне, влошаване или разрушаване на информация, намираща се в компютър и/или компютърна мрежа или на компютъра и/или компютърната мрежа. [6]


Japan

攻撃: インテリジェントな脅威、すなわちセキュリティサービスを回避し、システムのセキュリティポリシーを侵害する故意の試み(特に、方式あるいは技法という意味において)としてのインテリジェントな動作によってもたらされるセキュリティシステムへの攻撃.

(Cyber) attack is an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. [7]


Romania

Atac cybernetic: acţiune ostilă desfăşurată în spaţiul cibernetic de natură să afecteze securitatea cibernetică. [8]


Turkey

Siber saldırı: Ulusal siber uzayda bulunan bilişim sistemlerinin gizlilik, bütünlük veya erişilebilirliğini ortadan kaldırmak amacıyla, siber uzayın her hangi bir yerindeki kişi ve/veya bilişim sistemleri tarafından kasıtlı olarak yapılan işlemleri. [9]


United States

NIST
Cyber attack is an attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. [10]


An attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality. [11]



See also

Notes

  1. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  2. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  3. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.
  4. 关于电信安全的若干议题综述 及相关ITU-T建议书应用简介, ITU-T, Geneva (2012) - ITU-T H.235.
  5. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  6. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  7. http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
  8. Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
  9. [http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf 2016-2019 ULUSAL SİBER GÜVENLİK STRATEJİSİ
  10. NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
  11. NIST Special Publication 800-82 Rev 2: Guide to Industrial Control Systems (ICS) Security (May 2015)