Difference between revisions of "Cyber Attack"

From CIPedia
Jump to navigation Jump to search
Line 19: Line 19:
 
{{definition|Кибер атака: злонамерена дейност, която цели да разруши, да осигури контрол над компютърна среда/инфраструктура, да наруши интегритет на данни или открадне контролирана информация. <ref>[https://i.utroruse.com/tmp/fd753eb14acf229608801a4c10f83821_1460108941.pdf „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)]</ref><br/><br/>(НАТО) Действия, предприети за нарушаване, отхвърляне, влошаване или разрушаване на информация, намираща се в компютър и/или компютърна мрежа или на компютъра и/или компютърната мрежа. <ref>[https://i.utroruse.com/tmp/fd753eb14acf229608801a4c10f83821_1460108941.pdf „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)]</ref>}}
 
{{definition|Кибер атака: злонамерена дейност, която цели да разруши, да осигури контрол над компютърна среда/инфраструктура, да наруши интегритет на данни или открадне контролирана информация. <ref>[https://i.utroruse.com/tmp/fd753eb14acf229608801a4c10f83821_1460108941.pdf „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)]</ref><br/><br/>(НАТО) Действия, предприети за нарушаване, отхвърляне, влошаване или разрушаване на информация, намираща се в компютър и/или компютърна мрежа или на компютъра и/или компютърната мрежа. <ref>[https://i.utroruse.com/tmp/fd753eb14acf229608801a4c10f83821_1460108941.pdf „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)]</ref>}}
 
<br />
 
<br />
 +
==== [[Canada]] ====
 +
{{definition|Cyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means) of electronic information and/or the electronic and physical infrastructure used to process, communicate and/or store that information. <ref>[http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/cbr-scrt-strtgy-eng.pdf  Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)]</ref><br/><br />Les cyberattaques comprennent l’accès involontaire ou non autorisé à des renseignements électroniques et/ou des infrastructures électroniques ou matérielles utilisés pour traiter, communiquer ou entreposer cette information, ainsi que leur utilisation, leur manipulation, leur interruption ou leur destruction (par voie électronique). <ref>[http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/cbr-scrt-strtgy-fra.pdf Stratégie de cybersécurité du Canada: renforcer le Canada et accroître sa prospérité. (2010)]</ref>}} <br />
 +
 
==== [[Colombia]] ====
 
==== [[Colombia]] ====
 
{{definition|Ataque cibernético: Acción organizada y/o premeditada de una o más personas para causar daño o
 
{{definition|Ataque cibernético: Acción organizada y/o premeditada de una o más personas para causar daño o
Line 61: Line 64:
 
* Test reference. -->
 
* Test reference. -->
 
[[Category:Security]]
 
[[Category:Security]]
{{#set:defined by=Austria|defined by=Bulgaria|defined by=Colombia|defined by=Germany|defined by=Japan|defined by=Romania|defined by=Turkey|defined by=United Kingdom|defined by=United States|defined by=NIST|defined by=ITU-T}}
+
{{#set:defined by=Austria|defined by=Bulgaria|defined by=Canada|defined by=Colombia|defined by=Germany|defined by=Japan|defined by=Romania|defined by=Turkey|defined by=United Kingdom|defined by=United States|defined by=NIST|defined by=ITU-T}}

Revision as of 22:15, 20 September 2016


Definitions

Other International Definitions

ITU-T

(Cyber) attack are the activities undertaken to bypass or exploit deficiencies in a system's security mechanisms. [1]

By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed

when they bypass the mechanism, or when they make the system use the mechanism incorrectly.

Attaque: Activités entreprises pour contourner ou exploiter des déficiences constatées dans les mécanismes de sécurité d'un système. [2]


Ataque: Actividades realizadas para obviar los mecanismos de seguridad de un sistema o aprovechar sus deficiencias. [3]


攻击: 为绕过一个系统的安全机制或利用其漏洞而采取的行动. [4]



National Definitions

Austria

Cyber attack refers to an attack carried out in cyberspace through tools, services, or applications in cyberspace, which is directed against one or several IT system(s). Its aim is to undermine the objectives of ICT security protection (confidentiality, integrity and availability) partly or totally. [5]

Ein Cyber Angriff ist ein Angriff mit Mitteln der IT im Cyber Raum, der sich gegen einen oder mehrere andere IT-Systeme richtet und zum Ziel hat, die Schutzziele der IKT Sicherheit als Teil oder Ganzes zu verletzen. [6]


Bulgaria

Кибер атака: злонамерена дейност, която цели да разруши, да осигури контрол над компютърна среда/инфраструктура, да наруши интегритет на данни или открадне контролирана информация. [7]

(НАТО) Действия, предприети за нарушаване, отхвърляне, влошаване или разрушаване на информация, намираща се в компютър и/или компютърна мрежа или на компютъра и/или компютърната мрежа. [8]


Canada

Cyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means) of electronic information and/or the electronic and physical infrastructure used to process, communicate and/or store that information. [9]

Les cyberattaques comprennent l’accès involontaire ou non autorisé à des renseignements électroniques et/ou des infrastructures électroniques ou matérielles utilisés pour traiter, communiquer ou entreposer cette information, ainsi que leur utilisation, leur manipulation, leur interruption ou leur destruction (par voie électronique). [10]


Colombia

Ataque cibernético: Acción organizada y/o premeditada de una o más personas para causar daño o
problemas a un sistema informático a través del ciberespacio. [11]

Cyberattack: organised and / or premeditated misconduct or one or more individuals to cause damage to a computer system problems through cyberspace.

Germany

National Cyber Security Strategy
A cyber attack is an IT attack in cyberspace directed against one or several other IT systems and aimed at damaging IT security. [12]

Ein Cyber-Angriff ist ein IT-Angriff im Cyber-Raum, der sich gegen einen oder mehrere andere IT-Systeme richtet und zum Ziel hat, die IT-Sicherheit zu brechen. [13]
BSI
Cyber attacks are attacks carried out in cyberspace through tools, services, or applications in cyberspace; in the process, cyberspace can be origin, target or the environment of the attack. [14]


Japan

攻撃: インテリジェントな脅威、すなわちセキュリティサービスを回避し、システムのセキュリティポリシーを侵害する故意の試み(特に、方式あるいは技法という意味において)としてのインテリジェントな動作によってもたらされるセキュリティシステムへの攻撃.

(Cyber) attack is an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. [15]


Romania

Atac cybernetic: acţiune ostilă desfăşurată în spaţiul cibernetic de natură să afecteze securitatea cibernetică. [16]


Turkey

Siber saldırı: Ulusal siber uzayda bulunan bilişim sistemlerinin gizlilik, bütünlük veya erişilebilirliğini ortadan kaldırmak amacıyla, siber uzayın her hangi bir yerindeki kişi ve/veya bilişim sistemleri tarafından kasıtlı olarak yapılan işlemleri. [17]


United Kingdom

Cyber attack can refer to anything from small-scale email scams through to sophisticated largescale attacks with diverse political and economic motives. Large-scale attacks may have a number of interrelated aims such as: gaining unauthorised access to sensitive information; causing disruption to IT infrastructure; or causing physical disruption (e.g. to industrial systems). [18]


United States

NIST
Cyber attack is an attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. [19]


An attack is an attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality. [20]



See also

Notes

  1. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  2. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T H.235.
  3. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T H.235.
  4. 关于电信安全的若干议题综述 及相关ITU-T建议书应用简介, ITU-T, Geneva (2012) - ITU-T H.235.
  5. Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
  6. Österreichische Strategie für Cyber Sicherheit (2013)
  7. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  8. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  9. Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
  10. Stratégie de cybersécurité du Canada: renforcer le Canada et accroître sa prospérité. (2010)
  11. Lineamientos de política para ciberseguridad y ciberdefensa (2011)
  12. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/CyberSecurity/Cyber_Security_Strategy_for_Germany.pdf Cyber Security Strategy for Germany (2011)
  13. https://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cyber.pdf Cyber-Sicherheitstrategie für Deutschland (2011)
  14. Unpublished working glossary of UP KRITIS and BSI, 2014
  15. http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
  16. Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
  17. [http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf 2016-2019 ULUSAL SİBER GÜVENLİK STRATEJİSİ
  18. Cyber Security in the UK, Postnote Number 389, September 2011
  19. NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
  20. NIST Special Publication 800-82 Rev 2: Guide to Industrial Control Systems (ICS) Security (May 2015)