Difference between revisions of "Cyber Security"
(→United States) |
(→New Zealand) |
||
(282 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | ==Definitions== | + | ==Definitions Cyber Security == |
=== European Definitions === | === European Definitions === | ||
==== [[EU]] ==== | ==== [[EU]] ==== | ||
− | {{definition| | + | {{definition|Cybersecurity comprises all activities necessary to protect [[Network and Information System|network and information systems]], their users, and affected persons from cyber threats. <ref>[http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1505290611859&uri=COM%3A2017%3A477%3AFIN law and publications EUR-Lex EUR-Lex - COM:2017:477:FIN - EN]</ref> <ref>[https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CONSIL:PE_86_2018_REV_1&from=EN law and publications EUR-Lex EUR-Lex - 2017/0225 (COD) LEX 1899 - EN]</ref>}}<br/> |
− | < | + | {{definition|Cyber-security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber-security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein. <ref>[http://ec.europa.eu/dgs/home-affairs/e-library/documents/policies/organized-crime-and-human-trafficking/cybercrime/docs/join_2013_1_en.pdf Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 07/02/2013]</ref>}}<br/> |
− | --> | + | |
+ | {{definition|Cybersecurity means the activities necessary to protect network and information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|(NIS2) ‘cybersecurity’ means cybersecurity within the meaning of Article 2(1) of Regulation (EU) 2019/881 of the European Parliament and of the Council. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/dir/2022/2555/oj# Directive 2022/2555 Measures for a high common level of security of network and information systems across the Union, repealing Directive (EU) 2016/1148]</ref>}}<br/> | ||
+ | |||
+ | ==== [[ECA]] ==== | ||
+ | {{definition|Cybersecurity: All the safeguards and measures adopted to defend IT systems and their data against unauthorised access, attack and damage to ensure their [[availability]], [[confidentiality]] and [[integrity]]. <ref name="ECA">[https://www.eca.europa.eu/Lists/ECADocuments/BRP_CYBERSECURITY/BRP_CYBERSECURITY_EN.pdf European Court of Auditors, Challenges to effective EU cybersecurity policy, Briefing Paper, March 2019]</ref><br/><br/>[BG] Киберсигурност: Всички приети предпазни мерки за защита на ИТ системите и техните данни от неразрешен достъп, атаки и вреди, за да се гарантира тяхната достъпност, поверителност и цялост.<br/><br/>[CS] Kybernetická bezpečnost: Veškerá ochranná a bezpečnostní opatření přijatá na obranu informačních systémů a jejich údajů před neoprávněným přístupem, útokem a poškozením za účelem zajištění jejich dostupnosti, důvěrné povahy a integrity.<br/><br/>[DE] Cybersicherheit: Alle Vorkehrungen und Maßnahmen zum Schutz von IT-Systemen und ihren Daten vor unbefugten Zugriffen, vor Angriffen und vor Schaden, um ihre Verfügbarkeit, Vertraulichkeit und Integrität zu gewährleisten. <br/><br/>[DK] Cybersikkerhed: Alle desikkerhedsforanstaltninger, der er truffet for at beskytte IT systemer og deres data mod uautoriseret adgang, angreb og skader for at sikre deres tilgængelighed, fortrolighed og integritet.<br/><br/>[ES] Ciberseguridad: Conjunto de salvaguardias y medidas adoptadas para defender los sistemas informáticos y sus datos frente a accesos no autorizados, ataques y daños para garantizar su disponibilidad, confidencialidad e integridad.<br/><br/>[NE] Cyberbeveiliging: Alle waarborgen en maatregelen die worden ingevoerd om IT-systemen en hun gegevens te beschermen tegen onbevoegde toegang, aanvallen en schade, teneinde hun beschikbaarheid, vertrouwelijkheid en integriteit te garanderen.}}<br/><br/> | ||
+ | |||
+ | === Other International Definitions === | ||
+ | ==== [[World Bank]] ==== | ||
+ | {{definition|Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. <ref>[https://collaboration.worldbank.org/servlet/JiveServlet/downloadBody/18791-102-1-24249/Glossary%20of%20terms.docx Cyber Security Glossary, World Bank (2015)]</ref>}}In a computing context, the term security implies cybersecurity.<br/> | ||
=== National Definitions === | === National Definitions === | ||
+ | ==== [[Albania]] ==== | ||
+ | {{definition|Siguria kibernetike: do të thotë tërësia e mjeteve ligjore, organizative, teknike dhe edukative me qëllim mbrojtjen e hapësirës kibernetike. <ref>[http://www.inovacioni.gov.al/files/pages_files/Projektligj_Per_sigurine_kibernetike__ver.final.docx PROJEKT LIGJ PËR SIGURINË KIBERNETIKE]</ref>}} | ||
+ | <br /> | ||
+ | {{definition|“Cyber Security” - means all legal, organizational, technical and legal remedies educational, in order to protect the cyber space. <ref>[https://ere.gov.al/doc/Cyber_Security_Regulation_30082020.pdf ENERGY REGULATOR AUTHORITY REGULATION ON CYBER SECURITY OF CRITICAL INFRASTRUCTURES IN THE POWER SECTOR ]</ref>}}<br /> | ||
+ | |||
==== [[Australia]] ==== | ==== [[Australia]] ==== | ||
− | {{definition|[[Measure|Measures]] relating to the [[confidentiality]], [[availability]] and [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtections/CyberSecurity/ Rights and Protections on Cyber Security, Australian Attorney-General’s Department] </ref>}} | + | {{definition|Cyber Security: [[Measure|Measures]] relating to the [[confidentiality]], [[availability]] and [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtections/CyberSecurity/ Rights and Protections on Cyber Security, Australian Attorney-General’s Department] </ref>}} |
<br /> | <br /> | ||
+ | {{definition|Cyber Security: A range of preventative measures used to protect information from being stolen, compromised or attacked. <ref>[https://www.ag.gov.au/Publications/AnnualReports/13-14/Pages/Part5-Appendices/Glossary.aspx Annual Reports AG]</ref>}}Cyber security strategies include identity management, risk management and incident management. <br/> | ||
+ | =====[[New South Wales]]===== | ||
+ | {{definition|Cyber Security: actions required to preclude unauthorised use of, denial of service to, modifications to, disclosure of, loss of revenue from, or destruction of critical systems or informational assets. (derived from International Standard: IEC/TS 62443-1-1 ed. 1.0 ) <ref>[https://www.digital.nsw.gov.au/sites/default/files/NSW%20Cyber%20Security%20Strategy%202018.pdf NSW Government Cyber Security Strategy ]</ref>}}<br/><br/> | ||
==== [[Austria]] ==== | ==== [[Austria]] ==== | ||
+ | {{definition|Cybersicherheit“ bezeichnet alle Tätigkeiten, die notwendig sind, um Netz- und Informationssysteme, die Nutzer solcher Systeme und andere von Cyberbedrohungen betroffene Personen zu schützen. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
{{definition|Cyber security describes the protection of a key legal asset through constitutional means against actor-related, technical, organisational and natural dangers posing a risk to the security of cyberspace (including [[infrastructure]] and data security) as well as the [[security]] of the users in cyberspace. Cyber security helps to identify, assess and follow up on threats as well as to strengthen the ability to cope with interferences in or from cyber space, to minimise the effects as well as to restore the capacity to act and functional capabilities of the respective [[stakeholder]]s, infrastructures and services. <ref>[http://www.bmi.gv.at/cms/BMI_Service/cycer_security/130415_strategie_cybersicherheit_en_web.pdf Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)]</ref><br/><br/>Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. <ref>[https://www.bka.gv.at/DocView.axd?CobId=50748 Österreichische Strategie für Cyber Sicherheit (2013)]</ref>}} | {{definition|Cyber security describes the protection of a key legal asset through constitutional means against actor-related, technical, organisational and natural dangers posing a risk to the security of cyberspace (including [[infrastructure]] and data security) as well as the [[security]] of the users in cyberspace. Cyber security helps to identify, assess and follow up on threats as well as to strengthen the ability to cope with interferences in or from cyber space, to minimise the effects as well as to restore the capacity to act and functional capabilities of the respective [[stakeholder]]s, infrastructures and services. <ref>[http://www.bmi.gv.at/cms/BMI_Service/cycer_security/130415_strategie_cybersicherheit_en_web.pdf Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)]</ref><br/><br/>Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. <ref>[https://www.bka.gv.at/DocView.axd?CobId=50748 Österreichische Strategie für Cyber Sicherheit (2013)]</ref>}} | ||
<br /> | <br /> | ||
+ | ==== [[Barbados]] ==== | ||
+ | {{definition|Cyber Security refers to the vulnerability of cyber technologies to [[Cyber Attack|digital attack]]. <ref>[https://labour.gov.bb/pdf/OSH/Emergency%20Procedures%20from%20plan%20to%20practice.pdf Emergency Procedures: From Plan to Practice]</ref>}}<br /><br/> | ||
==== [[Belgium]] ==== | ==== [[Belgium]] ==== | ||
− | {{definition|Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van [[ICT]] of door misbruik van ICT (be free from danger or [[damage]] caused by disturbance or disruption of [[ICT]] or misuse of ICT). <ref>[ | + | {{definition|Cyberbeveiliging: de activiteiten die nodig zijn om netwerk- en informatiesystemen, de gebruikers van dergelijke systemen, en andere personen die getroffen worden door cyberdreigingen, te beschermen.<br/><br/>Cybersécurité, les actions nécessaires pour protéger les réseaux et les systèmes d’information, les utilisateurs de ces systèmes et les autres personnes exposées aux cybermenaces. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref><br/><br/>Cybersicherheit“ bezeichnet alle Tätigkeiten, die notwendig sind, um Netz- und Informationssysteme, die Nutzer solcher Systeme und andere von Cyberbedrohungen betroffene Personen zu schützen. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | |||
+ | {{definition|Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van [[ICT]] of door misbruik van ICT (be free from danger or [[damage]] caused by disturbance or disruption of [[ICT]] or misuse of ICT). <ref>[https://www.b-ccentre.be/wp-content/uploads/2013/03/cybersecustra_nl.pdf Cyber Security Strategy.be (Nederlands) (2012)]</ref><br/><br/>Cybersécurité est la situation où la protection du cyberespace est proportionelle à la cybermenace et aux conséquences possibles de [[Cyber Attack|cyberattaques]]. <ref>[https://www.b-ccentre.be/wp-content/uploads/2013/03/cybersecustra_fr.pdf Cyber Security Strategy.be (Francais) (2012)]</ref>}} | ||
<br /> | <br /> | ||
+ | {{definition|''Nucleaire'' cyberbeveiliging: de beveiliging van netwerk- en informatiesystemen van nucleaire installaties en inrichtingen waar radioactieve stoffen worden geproduceerd, vervaardigd, gehouden of gebruikt, of waar zich toestellen of installaties bevinden die ioniserende straling uitzenden die niet van radioactieve stoffen afkomstig is. <ref>[https://emis.vito.be/sites/emis.vito.be/files/legislation/3331/2019/sb100519-1.pdf 5APRIL2019.—Wethoudendewijzigingvandewetvan15april1994 betreffende de bescherming van de bevolking en van het leefmilieu tegen de uit ioniserende stralingen voortspruitende gevaren en betreffende het Federaal Agentschap voor Nucleaire Controle betreffende de nucleaire cyberbeveiliging (2019)]</ref><br/><br/>Cybersécurité ''nucléaire'': la sécurité des réseaux et systèmes d’information des installations nucléaires et des établissements où des substances radioactives sont produites, fabriquées, détenues ou utilisées, ou où se trouvent des appareils ou installations émettant des rayonnements ionisants ne provenant pas de substances radioactives <ref>[https://www.spmtarista.be/sites/default/files/loi_05.04.2019_rayonnements_ionisants_mb10.05.2019.pdf 5 AVRIL 2019. — Loi portant modification de la loi du 15 avril 1994 relative à la protection de la population et de l’environnement contre les dangers resultant des rayonnements ionisants et relative à l’Agence fédérale de Controle nucleaire concernant la cybersecurité nucleaire (2019)]</ref>.}} | ||
+ | <br /><br/> | ||
+ | |||
+ | ====[[Belize]]==== | ||
+ | {{definition|Cybersecurity: Takes into account the continuous and planned activities at the political, legal, economic, educational, awareness raising and technical levels to manage risks in cyberspace to ensure the ensure the [[confidentiality]], [[integrity]] and [[availability]] of digital assets. <ref>[https://www.pressoffice.gov.bz/wp-content/uploads/2019/12/belize-cybersecurity-strategy-2020-2023.pdf National Cybersecurity Strategy - Towards A Secure Cyberspace 2020-2023 (2020)]</ref>}} | ||
+ | <br/> | ||
+ | ====[[Bermuda]]==== | ||
+ | {{definition|Cybersecurity: measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. <ref>[https://www.gov.bm/sites/default/files/10999-National-Cybersecurity-Strategy.pdf Bermuda Cybersecurity Strategy 2018-2022]</ref>}}<br/> | ||
+ | |||
+ | ====[[Botswana]]==== | ||
+ | {{definition|Cyber Security is a term that describes the protection of ICT systems from damage, theft or disruption of the processes they run. It encompasses the combination of people, process and technology. <ref>[https://www.bocra.org.bw/sites/default/files/documents/approved%20botswana-national-cybersecurity-strategy.pdf National Cybersecurity Strategy (2021)]</ref>}}<br/><br/> | ||
+ | |||
==== [[Brazil]] ==== | ==== [[Brazil]] ==== | ||
− | {{definition|Segurança Cibernética: arte de assegurar a existência e a continuidade da Sociedade da Informação de uma Nação, garantindo e protegendo, no Espaço Cibernético, seus ativos de informação e suas infra-estruturas | + | {{definition|Segurança Cibernética (SegCiber): a arte de assegurar a existência e a continuidade da Sociedade da Informação de uma Nação, garantindo e protegendo, no Espaço Cibernético, seus ativos de informação e suas infra-estruturas críticas. <ref>[http://www.biblioteca.presidencia.gov.br/publicacoes-oficiais-1/catalogo/orgao-essenciais/gabinete-de-seguranca-institucional/guia-de-referencia-para-seguranca-de-infraestruturas-criticas-da-informacao/at_download/file GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Portaria Nº 45, de 8 de setembro de 2009.]</ref><br />Cybersecurity is the art to ensure the existence and continuity of the information society of a nation, ensuring and protecting in Cyberspace, their information assets and their [[Critical Infrastructure|critical infrastructure]].}} <br /> |
+ | |||
+ | ==== [[Bulgaria]] ==== | ||
+ | {{definition|киберсигурност означава дейностите, необходими за защита от киберзаплахи на мрежите и информационните системи, на ползвателите на такива мрежи и системи и други лица, засегнати от киберзаплахи. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Кибер сигурност: състояние определено и измерено чрез нивото на конфиденциалност, интегритет, достъпност, автентичност и отказоустойчивост на информационните ресурси, системи и услуги. Кибер сигурността се основава на ефективно изграждане и поддръжка на активни и превантивни мерки. <ref>[https://i.utroruse.com/tmp/fd753eb14acf229608801a4c10f83821_1460108941.pdf „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)]</ref>}} | ||
+ | <br /> | ||
+ | |||
+ | ==== [[Burkina-Faso]] ==== | ||
+ | {{definition|Etat recherché pour un système d’information lui permettant de resister à des évènements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises à des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. <ref>[http://www.cirt.bf/documents/plan_cyber&&anssi.pdf Plan National de Cybersécurité (2010)]</ref>}} | ||
+ | <br /> | ||
==== [[Cameroon]] (Cameroun) ==== | ==== [[Cameroon]] (Cameroun) ==== | ||
− | {{definition|Cybersécurité: ensemble de mesures de prévention, de protection et de dissuasion d’ordre technique, organisationnel, juridique, financier, humain, procédural et autres actions permettant d’atteindre les objectifs de sécurité fixés à travers les réseaux de communications électroniques, les systèmes d’information et pour la protection de la vie privée des personnes. <ref>[http://www.antic.cm/images/stories/data/IMG/pdf/cybersecurite/Loi_2010-012_cybersecurite_cybercriminalite.pdf LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN ]</ref>}}<br /> | + | {{definition|Cybersécurité: ensemble de mesures de prévention, de protection et de dissuasion d’ordre technique, organisationnel, juridique, financier, humain, procédural et autres actions permettant d’atteindre les objectifs de sécurité fixés à travers les réseaux de communications électroniques, les systèmes d’information et pour la protection de la vie privée des personnes. <ref>[http://www.antic.cm/images/stories/data/IMG/pdf/cybersecurite/Loi_2010-012_cybersecurite_cybercriminalite.pdf LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN]</ref> <ref>[https://www.unodc.org/res/cld/document/cmr/2010/loi_sur_la_cybersecurite_et_la_cybercriminalite_html/Loi_2010-012_cybersecurite_cybercriminalite.pdf LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN]</ref>}}<br/><br/> |
+ | |||
==== [[Canada]] ==== | ==== [[Canada]] ==== | ||
− | {{definition|The body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, [[damage]] or unauthorized access so as to ensure [[confidentiality]], [[integrity]] and [[availability]].<br />Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. <ref name="canada">[http:// | + | {{definition|Cyber Security: The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. ''More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure [[confidentiality]], [[integrity]] and [[availability]].'' <ref>[https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/ntnl-cbr-scrt-strtg-en.pdf Canada’s Cyber Security Strategy: Canada's Vision for Security and prosperity in the digital age (2018)]</ref><br/><br/>Cybersécurité: Protection de données numériques et préservation de l'intégrité de l'infrastructure servant à stocker et à transmettre des données numériques. ''Plus particulièrement, la cybersécurité englobe l'ensemble des technologies, des processus, des pratiques, des mesures d'intervention et d'atténuation dont la raison d'être est d'empêcher que les réseaux, ordinateurs, programmes et données soient attaqués ou endommagés, ou qu'on y accède sans autorisation, afin d'en assurer [[Confidentiality|la confidentialité]], [[Integrity|l'intégrité]] et [[Availability|la disponibilité]].'' <ref>[https://www.securitepublique.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/ntnl-cbr-scrt-strtg-fr.pdf Stratégie nationale de cybersécurité: Vision du canada pour la sécurité et la prospérité dans l'ère numérique (2018)]</ref>}} |
+ | <br/> | ||
+ | {{definition|The body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, [[damage]] or unauthorized access so as to ensure [[confidentiality]], [[integrity]] and [[availability]]. <ref>[http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/cbr-scrt-strtgy-eng.pdf Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)]</ref><br/><br />Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. <ref name="canada">[http://publications.gc.ca/collections/collection_2012/tpsgc-pwgsc/S52-2-281-2012.pdf Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)]</ref>}} <br /> | ||
+ | |||
+ | ====[[Chile]]==== | ||
+ | {{definition|Ciberseguridad: es tanto una condición caracterizada por un mínimo de riesgos y amenazas a las infraestructuras tecnológicas, los componentes lógicos de la información y las interacciones que se verifican en el ciberespacio, como el conjunto de políticas y técnicas destinadas a lograr dicha condición. <ref>[http://ciberseguridad.interior.gob.cl/media/2015/12/Documento-Bases-Pol%C3%ADtica-Nacional-sobre-Ciberseguridad.pdf BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile ]</ref> <ref>[http://ciberseguridad.interior.gob.cl/media/2017/04/PNCS-ES.pdf Chile Política Nacional de Ciberseguridad (2017)]</ref>}}<br/> | ||
+ | {{definition|Cybersecurity is described as a condition presenting the least risk for [[Cyberspace|cyberspace]] –understood as a set of physical and logical infrastructure, and the human interactions taking place in the same. <ref>[http://ciberseguridad.interior.gob.cl/media/2017/04/NCSP-ENG.pdf Chilean National Cybersecurity Policy (2017)]</ref>}} Within this set, the main feature to be protected is information [[confidentiality]], [[integrity]] and [[availability]] which, in turn, create a robust and resilient cyberspace. <br/><br/> | ||
==== [[Colombia]] ==== | ==== [[Colombia]] ==== | ||
{{definition|Ciberseguridad: Capacidad del Estado para minimizar el nivel de riesgo al que están expuestos sus ciudadanos, ante amenazas o incidentes de naturaleza cibernética. <ref>[http://www.mintic.gov.co/portal/604/articles-3510_documento.pdf Conpes 3510]</ref>}} | {{definition|Ciberseguridad: Capacidad del Estado para minimizar el nivel de riesgo al que están expuestos sus ciudadanos, ante amenazas o incidentes de naturaleza cibernética. <ref>[http://www.mintic.gov.co/portal/604/articles-3510_documento.pdf Conpes 3510]</ref>}} | ||
− | Cyber security is the ability of the state to | + | Cyber security is the ability of the state to minimise the level of [[risk]] their citizens from [[threat|threats]] or [[incident|incidents]] of cyber nature are exposed to.<br /> |
− | <br /> | + | {{definition|Ciberseguridad: es el conjunto de recursos, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión del riesgo, acciones, investigación y desarrollo, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse buscando la [[Availability|disponibilidad]], [[Integrity|integridad]], [[Authentication|autenticación]], [[Confidentiality|confidencialidad]] y no repudio, con el fin de proteger a los usuarios y los activos de la organización en el [[Cyberspace|Ciberespacio]]. <ref>[https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3854.pdf Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)]</ref>}}<br/><br/> |
+ | ==== [[Costa Rica]] ==== | ||
+ | {{definition|Ciberseguridad: Es la capacidad de proteger o defender el uso del ciberespacio de los ataques cibernéticos. <ref>[https://micitt.go.cr/sites/default/files/2023-11/NCS%20Costa%20Rica%20-%2010Nov2023%20SPA.pdf Estrategia Nacional de Ciberseguridad de Costa Rica (2023-2027) ]</ref>}}<br/> | ||
+ | {{definition|Ciberseguridad: Conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el [[Cyberspace|ciberespacio]]. <ref name=CR>[https://micit.go.cr/images/imagenes_noticias/10-11-2017__Ciberseguridad/Estrategia-Nacional-de-Ciberseguridad-de-Costa-Rica-11-10-17.pdf Estrategia Nacional de Ciberseguridad de Costa Rica (2017)]</ref><br/><br/>Seguridad cibernética: Conservación, a través de políticas, tecnología y educación, de la disponibilidad, confidencialidad e integridad de la información y su infraestructura subyacente a fin de preservar la seguridad de las personas tanto en línea como fuera de línea. <ref name=CR>[https://micit.go.cr/images/imagenes_noticias/10-11-2017__Ciberseguridad/Estrategia-Nacional-de-Ciberseguridad-de-Costa-Rica-11-10-17.pdf Estrategia Nacional de Ciberseguridad de Costa Rica (2017)]</ref>}}<br/><br/> | ||
+ | |||
====[[Croatia]]==== | ====[[Croatia]]==== | ||
+ | {{definition|Kibersigurnost znači sve aktivnosti koje su nužne za zaštitu od kiberprijetnji mrežnih i informacijskih sustava, korisnika tih sustava i drugih osoba na koje one utječu. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
{{definition|Kibernetička sigurnost: obuhvaća aktivnosti i mjere kojima se postiže povjerljivost, cjelovitost i dostupnost podataka i sustava u kibernetičkom prostoru.<br/><br/>Cyber security includes activities and measures to achieve [[confidentiality]], [[integrity]] and [[availability]] of data and systems in cyberspace. <ref> [https://esavjetovanja.gov.hr/ECon/MainScreen?entityId=1072 National Cyber Security Strategy draft (2015)]</ref>}} | {{definition|Kibernetička sigurnost: obuhvaća aktivnosti i mjere kojima se postiže povjerljivost, cjelovitost i dostupnost podataka i sustava u kibernetičkom prostoru.<br/><br/>Cyber security includes activities and measures to achieve [[confidentiality]], [[integrity]] and [[availability]] of data and systems in cyberspace. <ref> [https://esavjetovanja.gov.hr/ECon/MainScreen?entityId=1072 National Cyber Security Strategy draft (2015)]</ref>}} | ||
<br /> | <br /> | ||
+ | |||
+ | ====[[Cuba]]==== | ||
+ | {{definition|Ciberseguridad: Conjunto de procedimientos de seguridad, medidas organizativas, técnicas y operativas aplicadas para la gestión y protección del uso, procesamiento, almacenamiento y transmisión de datos e información a través de las TIC que interactúan en el [[Cyberspace|ciberespacio]]. <ref>[http://www.cscuba.cu/es/glosario-de-terminos/A Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio]</ref>}}<br/><br/> | ||
+ | |||
==== [[Cyprus]] ==== | ==== [[Cyprus]] ==== | ||
− | {{definition|Cybersecurity is the broader security of networked systems that operate in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/CybersecurityStrategyoftheRepublicofCyprusv10_English.pdf Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)]</ref>}} | + | {{definition|«κυβερνοασφάλεια»: οι δραστηριότητες που απαιτούνται για την προστασία των συστημάτων δικτύου και πληροφοριών, των χρηστών των εν λόγω συστημάτων και άλλων επηρεαζόμενων από κυβερνοαπειλές προσώπων. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
− | I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users. | + | |
+ | {{definition|Η ‘κυβερνοασφάλεια’ αναφέρεται στην ευρύτερη ασφάλεια των δικτυωμένων συστημάτων που λειτουργούν στον κυβερνοχώρο, ως επί το πλείστον δηλαδή συνδεδεμένων στο Διαδίκτυο, και ο όρος αυτός συμπεριλαμβάνει και την ασφαλή χρήση των συστημάτων αυτών από τελικούς χρήστες. <ref>[http://www.ocecpr.org.cy/sites/default/files/ec_doc_stratigikikevernoasfalias_gr_31-5-2013_ce.pdf Στρατηγική Κυβερνοασφάλειας της Κυπριακής Δημοκρατίας (23 April 2012) ]</ref><br><br>Cybersecurity is the broader security of networked systems that operate in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/CybersecurityStrategyoftheRepublicofCyprusv10_English.pdf Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)]</ref>}} | ||
+ | I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users. | ||
==== [[Czech Republic]] ==== | ==== [[Czech Republic]] ==== | ||
− | {{definition|Souhrn právních, organizačních, technických a vzdělávacích prostředků směřujících k zajištění ochrany kybernetického prostoru. <ref>http://www.govcert.cz/download/nodeid-1143/ Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)]</ref><br><br>Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. <ref> http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)</ref>}}<br/> | + | {{definition|„kybernetickou bezpečností“ činnosti nezbytné k ochraně sítí a informačních systémů, jejich uživatelů a dalších osob dotčených kybernetickými hrozbami. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | {{definition|Kybernetická bezpečnost: Souhrn právních, organizačních, technických a vzdělávacích prostředků směřujících k zajištění ochrany kybernetického prostoru. <ref>[http://www.govcert.cz/download/nodeid-1143/ Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)]</ref><br><br>Cyber security: Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. <ref>[http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)]</ref>}}<br/> | ||
==== [[Denmark]] ==== | ==== [[Denmark]] ==== | ||
− | {{definition|Cybersikkerhed omfatter beskyttelse imod de sikkerhedsbrud, der opstår som følge af angreb mod data eller systemer via en for - bindelse til et eksternt net eller system. Arbejdet med cybersikker - hed fokuserer således på sårbarheder ved sammenkoblingen mellem systemer, herunder forbindelser til internettet. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/DK_NCSS.pdf Danish Cyber Security Strategy, 2014]</ref>}} | + | {{definition|Cybersikkerhed: de aktiviteter, der er nødvendige for at beskytte net- og informationssystemer, brugerne af sådanne systemer og andre personer berørt af cybertrusler. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
− | <br /> | + | {{definition|Cybersikkerhed omfatter beskyttelse imod de sikkerhedsbrud, der opstår som følge af angreb mod data eller systemer via en for - bindelse til et eksternt net eller system. Arbejdet med cybersikker - hed fokuserer således på sårbarheder ved sammenkoblingen mellem systemer, herunder forbindelser til internettet. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/DK_NCSS.pdf Danish Cyber Security Strategy, 2014]</ref>}}<br /> |
+ | |||
+ | ==== [[Egypt]] ==== | ||
+ | {{definition|Cybersecurity is information security applied to computers and computer [[network|networks]]. <ref>[http://www.mcit.gov.eg/TeleCommunications/Cyber_Security Ministry of Communications and Information Technology (MCIT) - Cyber Security]</ref>}}<br /> | ||
+ | ====[[El Salvador]]==== | ||
+ | {{definition|Ciberseguridad: Conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el [[Cyberspace|ciberespacio]]. <ref>[https://consulta.innovacion.gob.sv/legislation/processes/13/draft_versions/31 (Draft) Ley de ciberseguridad]</ref>}}<br/> | ||
+ | ==== [[Estonia]] ==== | ||
+ | {{definition|Küberturvalisus– tegevused, mis on vajalikud, et kaitsta võrgu- ja infosüsteeme, nende kasutajaid ja teisi isikuid küberohtude ees. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Cyber Security is an essential precondition for the securing of cyberspace that every operator of a computer, computer network or information system realises the personal responsibility of using the data and instruments of communication at his or her disposal in a purposeful and appropriate manner. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/national-cyber-security-strategies-in-the-world Cyber Security Strategy, Estonian Ministry of Defence, 2008.]</ref>}}<br /> | ||
+ | |||
+ | ====[[Eswatini]]==== | ||
+ | {{definition|Cyber security: The protection of internet connected systems (to include hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse. This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so. <ref>[https://ncsirt.org.sz/wp-content/uploads/2021/06/Eswatini-NCS-2020.pdf ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)]</ref>}}<br/> | ||
==== [[Finland]] ==== | ==== [[Finland]] ==== | ||
− | {{definition|Cyber security means the desired end state in which the cyber domain is reliable and in which its functioning is ensured. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/FinlandsCyberSecurityStrategy.pdf Finlands' Cyber Security Strategy]</ref>}} | + | {{definition|’kyberturvallisuudella’ toimia, joita tarvitaan verkko- ja tietojärjestelmien, tällaisten järjestelmien käyttäjien ja muiden asianosaisten henkilöiden suojaamiseksi kyberuhilta. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
− | <br /> | + | {{definition|Cyber security means the desired end state in which the cyber domain is reliable and in which its functioning is ensured. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/FinlandsCyberSecurityStrategy.pdf Finlands' Cyber Security Strategy]</ref>}}<br /> |
{{definition|Kyberturvallisuus: tila, jossa kybertoimintaympäristöstä yhteiskunnan elintärkeille toiminnoille tai muille kybertoimintaympäristöstä riippuvaisille toiminnoille koituvat uhkat ja riskit ovat hallinnassa.<br/><br/>Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -''unofficial translation''- <ref name=TSK>[http://www.spek.fi/loader.aspx?id=1c66e01d-a75e-4a9a-80ec-9816340ce752 Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)]</ref>}}<br /> | {{definition|Kyberturvallisuus: tila, jossa kybertoimintaympäristöstä yhteiskunnan elintärkeille toiminnoille tai muille kybertoimintaympäristöstä riippuvaisille toiminnoille koituvat uhkat ja riskit ovat hallinnassa.<br/><br/>Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -''unofficial translation''- <ref name=TSK>[http://www.spek.fi/loader.aspx?id=1c66e01d-a75e-4a9a-80ec-9816340ce752 Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)]</ref>}}<br /> | ||
==== [[France]] ==== | ==== [[France]] ==== | ||
− | {{definition|The desired state of an information system in which it can resist events from cyberspace likely to compromise the [[availability]], [[integrity]] or [[confidentiality]] of the data stored, processed or transmitted and of the related services that these systems offer or make accessible. <ref>[ | + | {{definition|Cybersécurité, les actions nécessaires pour protéger les réseaux et les systèmes d’information, les utilisateurs de ces systèmes et les autres personnes exposées aux cybermenaces. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
− | <br /> | + | {{definition|Cybersécurité: État recherché pour un système d’information lui permettant de résister à des événements d’origine malveillante susceptibles de compromettre la [[Availability|disponibilité]], [[Integrity|l’intégrité]] ou la [[Confidentiality|confidentialité]] des données stockées, traitées ou transmises et des services rendus par ce système. <ref>[https://www.ssi.gouv.fr/uploads/2014/01/securite_industrielle_GT_methode_classification-principales_mesures.pdf Méthode de classification et mesures principales, ANSSI (2014)]</ref><br/><br/>Cybersecurity: A desired condition for an information system, allowing it to withstand events of malicious origin that are likely to compromise the [[availability]], [[integrity]] or [[confidentiality]] of data stored, processed or transferred or the services provided by the system. <ref>[https://www.ssi.gouv.fr/uploads/2014/01/industrial_security_WG_Classification_Method.pdf Classification Method and Key Measures, ANSSI (2014)]</ref>}}<br/> |
+ | |||
+ | {{definition|Cyber Security: The desired state of an information system in which it can resist events from cyberspace likely to compromise the [[availability]], [[integrity]] or [[confidentiality]] of the data stored, processed or transmitted and of the related services that these systems offer or make accessible. <ref>[http://www.ssi.gouv.fr/uploads/IMG/pdf/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf Information systems defence and security: France's Strategy]</ref><br/><br/>Cybersécurité: état recherché pour un système d’information lui permettant de résister à des événements issus du cyberespace susceptibles de compromettre la [[Availability|disponibilité]], [[Integrity|l’intégrité]] ou la [[Confidentiality|confidentialité]] des données stockées, traitées ou transmises et des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. <ref>[http://www.ssi.gouv.fr/uploads/IMG/pdf/2011-02-15_Defense_et_securite_des_systemes_d_information_strategie_de_la_France.pdf La Stratégie de la France en matière de défense et de sécurité des systèmes d’information (2011)]</ref>}}<br/><br/> | ||
==== [[Germany]] ==== | ==== [[Germany]] ==== | ||
− | {{definition|(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber | + | {{definition|Cybersicherheit befasst sich mit allen Aspekten der Sicherheit in der Informations- und Kommunikationstechnik. Das Aktionsfeld der Informationssicherheit wird dabei auf den gesamten Cyberraum ausgeweitet. <ref>[https://www.bmi.bund.de/SharedDocs/downloads/DE/veroeffentlichungen/2021/06/entwurf-cybersicherheitsstrategie-2021.pdf DRAFT Cyber-Sicherheitsstrategie für Deutschland 2021]</ref>}}<br/> |
− | <br /> | + | {{definition|Cybersicherheit“ bezeichnet alle Tätigkeiten, die notwendig sind, um Netz- und Informationssysteme, die Nutzer solcher Systeme und andere von Cyberbedrohungen betroffene Personen zu schützen. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | {{definition|Cyber-Sicherheit ist die IT-Sicherheit der im [[Cyberspace|Cyber-Raum]] auf Datenebene vernetzten bzw. vernetzbaren informationstechnischen Systeme. (2016) <ref>[http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/cybersicherheitsstrategie-2016.pdf?__blob%3DpublicationFile Cyber-Sicherheitsstrategie für Deutschland 2016]</ref><br/><br/>(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. <ref>[http://www.kritis.bund.de/SubSites/Kritis/DE/Servicefunktionen/Glossar/Functions/glossar.html Protection of Critical Infrastructures, BMI.]</ref><br/><br/>(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. <ref>[http://www.kritis.bund.de/SharedDocs/Downloads/Kritis/EN/UP%20KRITIS.pdf?__blob%3DpublicationFile UP KRITIS, BSI, 2014]</ref>}}<br /> | ||
+ | {{definition|Cyber-Sicherheit befasst sich mit allen Aspekten der Sicherheit in der Informations- und Kommunikationstechnik. Das Aktionsfeld der Informationssicherheit wird dabei auf den gesamten Cyber-Raum ausgeweitet. Dieser umfasst sämtliche mit dem Internet und vergleichbaren Netzen verbundene Informationstechnik und schließt darauf basierende Kommunikation, Anwendungen, Prozesse und verarbeitete Informationen mit ein. <ref>[https://www.bsi.bund.de/DE/Themen/Cyber-Sicherheit/Empfehlungen/cyberglossar/Functions/glossar.html BSI Glossar]</ref>}}Häufig wird bei der Betrachtung von Cyber-Sicherheit auch ein spezieller Fokus auf Angriffe aus dem Cyber-Raum gelegt. <br/><br/> | ||
+ | |||
+ | ==== [[Greece]] ==== | ||
+ | {{definition|«κυβερνοασφάλεια»: οι δραστηριότητες που απαιτούνται για την προστασία των συστημάτων δικτύου και πληροφοριών, των χρηστών των εν λόγω συστημάτων και άλλων επηρεαζόμενων από κυβερνοαπειλές προσώπων. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Guatemala]] ==== | ||
+ | {{definition|Seguridad Cibernética o Ciberseguridad: El conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de [[Risk|riesgos]], acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. Fuente: UIT-T X.1205. <ref>[http://mingob.gob.gt/wp-content/uploads/2018/06/version-digital.pdf La Estrategia Nacional de Seguridad Cibernética (June 2018)]</ref>}}Los activos de la organización y los usuarios son los dispositivos informáticos conectados, los usuarios, los servicios/aplicaciones, los sistemas de comunicaciones, las comunicaciones multimedios, y la totalidad de la información transmitida y/o almacenada en el ciberentorno. La ciberseguridad garantiza que se alcancen y mantengan las propiedades de seguridad de los activos de la organización y los usuarios contra los riesgos de seguridad correspondientes en el ciberentorno. Las propiedades de seguridad incluyen una o más de las siguientes: -[[Availability|disponibilidad]]; - [[Integrity|integridad]], que puede incluir la autenticidad y el no repudio; - [[Confidentiality|confidencialidad]]<br /><br/> | ||
+ | |||
+ | ==== [[Hungary]]==== | ||
+ | {{definition|Kiberbiztonság: azok a tevékenységek, amelyek a kiberfenyegetésekkel érintett hálózati és információs rendszereknek, az ilyen rendszerek felhasználóinak és más személyeknek a védelméhez szükségesek. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
− | |||
{{definition|Cyber security is the continuous and planned taking of political, legal, economic, educational, awareness-raising and technical measures to manage risks in cyberspace that transforms the cyberspace into a reliable environment for the smooth functioning and operation of societal and economic processes by ensuring an acceptable level of risks in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/HU_NCSS.pdf Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary]</ref>}} | {{definition|Cyber security is the continuous and planned taking of political, legal, economic, educational, awareness-raising and technical measures to manage risks in cyberspace that transforms the cyberspace into a reliable environment for the smooth functioning and operation of societal and economic processes by ensuring an acceptable level of risks in cyberspace. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/HU_NCSS.pdf Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary]</ref>}} | ||
<br /> | <br /> | ||
+ | |||
+ | ==== [[Iceland]] ==== | ||
+ | {{definition|Cybersecurity relates to the security of digital services and solutions and their secure application in cyberspace. Solutions and methodologies in cybersecurity are used to combat cybersecurity threats which can become cybersecurity incidents if they are realised. <ref>[https://www.stjornarradid.is/library/04-Raduneytin/Haskola---idnadar--og-nyskopunarraduneytid/Icelandic%20National%20Cybersecurity%20Strategy%202022-2037.pdf Icelandic National Cyber Security Strategy 2022–2037 (2022)]</ref>}}<br/> | ||
==== [[India]] ==== | ==== [[India]] ==== | ||
{{definition|Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. <ref>[http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf Information Technology Act Ammendment (2008)] </ref>}}<br /> | {{definition|Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. <ref>[http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf Information Technology Act Ammendment (2008)] </ref>}}<br /> | ||
+ | |||
==== [[Islamic Republic of Afghanistan]] ==== | ==== [[Islamic Republic of Afghanistan]] ==== | ||
{{definition|Protection of information systems that protect the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents; putting into force the countermeasures against these incidents and then putting these systems back to their original states prior to the cyber security incident. <ref>[http://nic.af/Content/files/National%20Cybersecurity%20Strategy%20of%20Afghanistan%20(November2014).pdf National Cyber Security Strategy of Afghanistan (2014)] </ref>}} | {{definition|Protection of information systems that protect the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents; putting into force the countermeasures against these incidents and then putting these systems back to their original states prior to the cyber security incident. <ref>[http://nic.af/Content/files/National%20Cybersecurity%20Strategy%20of%20Afghanistan%20(November2014).pdf National Cyber Security Strategy of Afghanistan (2014)] </ref>}} | ||
<br /> | <br /> | ||
+ | ==== [[Indonesia]] ==== | ||
+ | {{definition|Cybersecurity: adalah upaya untuk menjaga [[confidentiality|kerahasiaan]], [[integrity|keutuhan]], dan [[availability|ketersediaan]] informasi pada pada dunia siber, yang juga termasuk [[authentication|otentikasi]], [[non-repudiation|nirsangkal]], dan [[accountability|akuntabilitas]]. <ref>[http://www.dephub.go.id/public/files/uploads/posts/posts/postbody/strategi_cs_nasional_desember2016.pdf Indonesia National Cyber Security Strategy development (presentation), 2016]</ref>}}<br /> | ||
+ | ==== [[Ireland]] ==== | ||
+ | {{definition|Ciallaíonn “cibearshlándáil” na gníomhaíochtaí go léir is gá chun córais gréasán agus faisnéise, úsáideoirí na gcóras sin, agus daoine eile dá ndéantar difear a chosaint ar chibearbhagairtí. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
==== [[Israel]] ==== | ==== [[Israel]] ==== | ||
− | {{definition|Cybersecurity are policies, security arrangements, actions, guidelines, [[risk management]] protocols and technological tools designated to protect cyberspace and allow action to be taken therein. <ref>[http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber/Documents/Advancing%20National%20Cyberspace%20Capabilities.pdf Advancing National Cyberspace Capabilities (2011)]</ref>}} | + | {{definition|Cybersecurity are policies, security arrangements, actions, guidelines, [[Risk Management|risk management]] protocols and technological tools designated to protect cyberspace and allow action to be taken therein. <ref>[http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber/Documents/Advancing%20National%20Cyberspace%20Capabilities.pdf Advancing National Cyberspace Capabilities (2011)]</ref>}} |
<br /> | <br /> | ||
+ | ==== [[Italy]] ==== | ||
+ | {{definition|«cibersicurezza»: l’insieme delle attività necessarie per proteggere la rete e i sistemi informativi, gli utenti di tali sistemi e altre persone interessate dalle minacce informatiche. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Cyber-Security: Condizione in cui il cyber-space risulti protetto rispetto adeventi, di natura volontaria od accidentale, consistenti nell’acquisizione e nel trasferimento indebiti di dati, nella loro modifica o distruzione illegittime ovvero nel blocco dei sistemi informativi, grazie ad idonee misure di sicurezza fisica, logica e procedurale. <ref>[https://www.sicurezzanazionale.gov.it/sisr.nsf/wp-content/uploads/2013/12/Glossario-intelligence-2013.pdf IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)]</ref>}}Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.<br/><br/> | ||
+ | |||
==== [[Jamaica]] ==== | ==== [[Jamaica]] ==== | ||
− | {{definition|Cyber Security is the implementation of measures to protect ICT [[infrastructure]] including [[Critical Infrastructure|critical infrastructure]] from intrusion, unauthorized access and includes the adoption of policies, protocols and good practices to better govern the use of cyberspace. <ref>[http://www.mstem.gov.jm/sites/default/files/documents/Jamaica%20National%20Cyber%20Security%20Strategy.pdf Jamaica's National Cyber Security Strategy]</ref>}} | + | {{definition|Cyber Security is the implementation of measures to protect ICT [[infrastructure]] including [[Critical Infrastructure|critical infrastructure]] from intrusion, unauthorized access and includes the adoption of policies, protocols and good practices to better govern the use of [[cyberspace]]. <ref>[http://www.mstem.gov.jm/sites/default/files/documents/Jamaica%20National%20Cyber%20Security%20Strategy.pdf Jamaica's National Cyber Security Strategy]</ref>}} |
<br /> | <br /> | ||
+ | |||
+ | ==== [[Japan]] ==== | ||
+ | {{definition|サイバーセキュリティ : 攻撃を防止、検知し、攻撃に対応することにより情報を保護するプロ セス。 <ref>[https://www.ipa.go.jp/files/000038957.pdf 重要インフラのサイバーセキュリティを 向上させるためのフレームワーク (2014)]</ref><br/><br/>Cyber Security is a process that protects information by preventing, detecting, and responding to [[Cyber Attack|attacks]].}}<br/><br/> | ||
+ | ==== [[Jordan]] ==== | ||
+ | {{definition|The protection of connected systems (to include hardware, software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse. <ref> [http://moict.gov.jo/uploads/studies/National%20Cyber%20Security%20Strategy%202018-2023.pdf National Cyber Security Strategy (2018-2023)]</ref>}}This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so. <br/><br/> | ||
==== [[Kenya]] ==== | ==== [[Kenya]] ==== | ||
− | {{definition|Cyber Security is defined as the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. <ref>[http://www.icta.go.ke/wp-content/uploads/2014/03/GOK-national-cybersecurity-strategy.pdf Kenya's National Cyber Security Strategy]</ref>}} | + | {{definition|Cyber Security is defined as the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. <ref>[http://www.icta.go.ke/wp-content/uploads/2014/03/GOK-national-cybersecurity-strategy.pdf Kenya's National Cyber Security Strategy]</ref> <ref>[https://www.centralbank.go.ke/wp-content/uploads/2018/08/DRAFT-CYBER-SECURITY-GUIDELINES-FOR-PSP-AUGUST-2018.pdf GUIDELINES ON CYBERSECURITY FOR PAYMENT SERVICE PROVIDERS, AUGUST 2018, Kenya]</ref>}}<br/><br/> |
− | <br /> | ||
====[[Kingdom of Saudi Arabia]]==== | ====[[Kingdom of Saudi Arabia]]==== | ||
{{definition|Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7]</ref>}} | {{definition|Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7]</ref>}} | ||
− | <br /> | + | <br/> |
+ | {{definition|Cyber security is defined as the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the member organization's information assets against internal and external threats. <ref>[http://www.sama.gov.sa/en-US/Laws/BankingRules/SAMA%20Cyber%20Security%20Framework.pdf Cyber Security Framework Saudi Arabian Monetary Authority Version 1.0 May 2017 ]</ref>}}<br /> | ||
+ | |||
+ | ==== [[Kosovo]] ==== | ||
+ | {{definition|Siguria kibernetike përgjithësisht iu referohet masave mbrojtëse dhe veprimeve që mund të ndërmerren për të mbrojtur domenin kibernetik, edhe në fushën civile edhe atë ushtarake, nga ato kërcënime që ndërlidhen me to apo që mund të dëmtojnë rrjetet dhe infrastrukturën komunikuese të ndërvarura. Siguria kibernetike përpiqet të ruajë disponueshmërinë dhe integritetin e rrjeteve dhe infrastrukturës,si dhe fshehtësinë e informatave që mbahen në to." [derived from EU definition] <ref>[http://stikk.org/fileadmin/user_upload/Strategjia_Shteterore_per_Sigurine_Kibernetike_dhe_Plani_i_Veprimit_2016-2019.pdf Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019]</ref>}}<br /><br/> | ||
+ | ====[[Kuwait]]==== | ||
+ | {{definition|Arab definition - see doc <ref>[https://citra.gov.kw/sites/ar/LegalReferences/Cyber%20Security.pdf الاستراتيجية الوطنية للأمن السيبراني لدولة الكويت (2017-2020)]</ref><br/><br/>Cyber security: is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://citra.gov.kw/sites/en/LegalReferences/English%20Cyber%20Security%20Strategy.pdf National Cyber Security Strategy 2017-2020]</ref>}} | ||
+ | <br/><br/> | ||
+ | ====[[Kyrgyztan]]==== | ||
+ | {{definition|кибербезопасность - сохранение свойств целостности (которая может включать аутентичность и отказоустойчивость), доступности и конфиденциальности информации объектов информационной инфраструктуры, обеспечиваемое за счет использования совокупности средств, стратегий, принципов обеспечения безопасности, гарантий безопасности, подходов к управлению рисками и страхования, профессиональной подготовки, практического опыта и технологий. <ref>[http://cbd.minjust.gov.kg/act/view/ru-ru/15479 СТРАТЕГИЯ кибербезопасности Кыргызской Республики на 2019-2023 годы]</ref>}}<br/><br/> | ||
==== [[Latvia]] ==== | ==== [[Latvia]] ==== | ||
− | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/lv-ncss Latvia's National Cyber Security Strategy]</ref>}} | + | {{definition|“kiberdrošība” ir darbības, kas jāveic, lai aizsargātu tīklu un informācijas sistēmas, to lietotājus un citas personas, kuras skar kiberdraudi. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | |||
+ | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/lv-ncss Latvia's National Cyber Security Strategy]</ref>}} | ||
Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. | Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. | ||
<br /> | <br /> | ||
+ | |||
+ | ==== [[Lebanon]]==== | ||
+ | {{definition|Cybersecurity: Cyber Security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. There is no universally accepted nor straightforward definition of cyber security. When comparing it to 'information security' some people regard it as overlapping, being the same thing. Or they may view information security as focused on protecting specific individual systems and the information within organizations, while cyber security is seen as being focused on protecting the infrastructure and networks of Computer Information Infrastructure <ref>[http://pcm.gov.lb/Library/Files/LRF/tamim/Strategie_Liban_Cyber_EN_V20_Lg.pdf Lebanon Cyber Security Strategy v2]</ref>}}<br/> | ||
+ | ==== [[Liberia]] ==== | ||
+ | {{definition|Cybersecurity: Measures taken to protect computers or critical infrastructure, although some experts suggest that it is about protecting everything of value. <ref>[http://www.lta.gov.lr/doc/ICT%20_%20Telecom%20Policy%20Main%20Body.pdf Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors]</ref>}}<br /><br /> | ||
==== [[Lithuania]] ==== | ==== [[Lithuania]] ==== | ||
+ | {{definition|Kibernetinis saugumas– visa veikla, būtina tinklų ir informacinėms sistemoms, tokių sistemų naudotojams ir kitiems susijusiems asmenims apsaugoti nuo kibernetinių grėsmių. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
{{definition|Cyber security is a set of legal, information dissemination, organizational and technical measures to prevent cyber as well as conventional electronic communications networks, information systems and industrial process control systems operating [[Incident|incidents]] to occur as well as detect, analyze, respond and recover in the event of such incidents. <ref>[http://www.ird.lt/doc/teises_aktai_en/EIS%28KS%29PP_796_2011-06-29_EN_PATAIS.pdf GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019]</ref><br /><br />Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. <ref>[http://www.ird.lt/doc/teises_aktai_en/EIS%28KS%29PP_796_2011-06-29_EN_PATAIS.pdf LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius]</ref>}} <br /> | {{definition|Cyber security is a set of legal, information dissemination, organizational and technical measures to prevent cyber as well as conventional electronic communications networks, information systems and industrial process control systems operating [[Incident|incidents]] to occur as well as detect, analyze, respond and recover in the event of such incidents. <ref>[http://www.ird.lt/doc/teises_aktai_en/EIS%28KS%29PP_796_2011-06-29_EN_PATAIS.pdf GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019]</ref><br /><br />Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. <ref>[http://www.ird.lt/doc/teises_aktai_en/EIS%28KS%29PP_796_2011-06-29_EN_PATAIS.pdf LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius]</ref>}} <br /> | ||
==== [[Luxembourg]]==== | ==== [[Luxembourg]]==== | ||
− | {{definition|On entend par cybersécurité l’ensemble des outils, politiques, concepts de sécurité, mécanismes de sécurité, lignes directrices, méthodes de gestion des risques, actions, formations, bonnes pratiques, garanties et technologies qui peuvent être utilisés pour protéger le cyberenvironnement et les actifs des organisations et des utilisateurs.<ref>[https://securitymadein.lu/wp-content/uploads/2015/08/LU_NCSS_2_FR_booklet.pdf Stratégie nationale en matière de cyber sécurité II (2015)]</ref><br/><br/>Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. <ref>[https://securitymadein.lu/wp-content/uploads/2015/08/LU_NCSS_2_EN_booklet.pdf National Cybersecurity Strategy II (2015)]</ref>}} | + | {{definition|Cybersécurité, les actions nécessaires pour protéger les réseaux et les systèmes d’information, les utilisateurs de ces systèmes et les autres personnes exposées aux cybermenaces. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | {{definition|On entend par cybersécurité l’ensemble des outils, politiques, concepts de sécurité, mécanismes de sécurité, lignes directrices, méthodes de gestion des risques, actions, formations, bonnes pratiques, garanties et technologies qui peuvent être utilisés pour protéger le cyberenvironnement et les actifs des organisations et des utilisateurs.<ref>[https://securitymadein.lu/wp-content/uploads/2015/08/LU_NCSS_2_FR_booklet.pdf Stratégie nationale en matière de cyber sécurité II (2015)]</ref><br/><br/>Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. <ref>[https://securitymadein.lu/wp-content/uploads/2015/08/LU_NCSS_2_EN_booklet.pdf National Cybersecurity Strategy II (2015)]</ref>}} | ||
Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité. | Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité. | ||
<br/> | <br/> | ||
Line 96: | Line 223: | ||
==== [[Malta]] ==== | ==== [[Malta]] ==== | ||
− | {{definition|Cyber security is the safeguards and actions that can be used to protect cyber domain from those [[threat|threats]] that are associated with or that may harm its interdependent networks and information infrastructure.<ref>[ | + | {{definition|“ċibersigurtà” tfisser l-attivitajiet meħtieġa biex jiġu mħarsa n-netwerks u s-sistemi tal-informazzjoni, l-utenti ta’ tali sistemi, u persuni oħra milquta minn theddid ċibernetiku. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | {{definition|Cyber security is the safeguards and actions that can be used to protect cyber domain from those [[threat|threats]] that are associated with or that may harm its interdependent networks and information infrastructure. <ref>[http://mita.gov.mt/en/maltacybersecuritystrategy/Documents/Mita%20_Malta%20Cyber%20Security%20Strategy%20-%20Book.pdf Malta Cyber Security Strategy 2016]</ref>}}Cyber security strives to preserve the [[availability]] and [[integrity]] of the networks and infrastructure and the [[confidentiality]] of the information contained therein.<br/><br/> | ||
+ | |||
+ | ==== [[Mexico]] ==== | ||
+ | {{definition|Ciberseguridad: Conjunto de políticas, controles, procedimientos, métodos de gestión de riesgos y normas asociadas con la protección de la sociedad, gobierno, economía y seguridad nacional en el ciberespacio y las redes públicas de telecomunicación. <ref>[https://www.gob.mx/cms/uploads/attachment/file/271884/Estrategia_Nacional_Ciberseguridad.pdf Estragia Nacional de Ciberseguridad (November 2017)]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Moldova]] ==== | ||
+ | {{definition|Cyber security means the state of normality resulted from application of a set of proactive and reactive measures that ensure [[confidentiality]], [[integrity]], [[availability]], authenticity and [[Non-repudiation|nonrepudiation]] of e-information, public and private resources and services in cyberspace. <ref>[http://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Moldova_2013_strateg_857_en.pdf NATIONAL STRATEGY for information society development “Digital Moldova 2020” (2013)]</ref>}}<br/><br/> | ||
====[[Montenegro]]==== | ====[[Montenegro]]==== | ||
{{definition| Cyber security refers ''to the ISO, Netherlands and ITU-T definitions''. <ref>[http://www.mid.gov.me%2FResourceManager%2FFileDownload.aspx%3Frid%3D165416%26rType%3D2%26file%3DCyber%2520Security%2520Strategy%2520for%2520Montenegro.pdf NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017]</ref>}}<br /> | {{definition| Cyber security refers ''to the ISO, Netherlands and ITU-T definitions''. <ref>[http://www.mid.gov.me%2FResourceManager%2FFileDownload.aspx%3Frid%3D165416%26rType%3D2%26file%3DCyber%2520Security%2520Strategy%2520for%2520Montenegro.pdf NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017]</ref>}}<br /> | ||
+ | ====[[Morocco]]==== | ||
+ | {{definition|Cybersécurité: Situation recherchée pour un système d’information lui permettant de résister à des événements issus du cyberspace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises. <ref>[http://www.dgssi.gov.ma/dgssi_assets/user_upload/STRATEGIE_NATIONALE.pdf STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011]</ref><br/><br/>Cybersecurity: Desired situation for an information system enabling it to withstand events arising from cyberspace that may compromise the availability, integrity or confidentiality of the data stored, processed or transmitted.}}<br /><br/> | ||
+ | ====[[Mozambique]]==== | ||
+ | {{definition|Segurança Cibernética: Protecção dos sistemas de TIC contra danos, roubo ou interrupção dos processos por estes executados. Abrange a combinação de pessoas, processos e tecnologia. <ref>[https://cta.org.mz/wp-content/uploads/2021/02/Estrategia-Nacional-de-Seguranca-Ciberneticas.pdf Estratégia Nacional de Segurança Cibernética de Moçambique (2021-2024)]</ref>}}<br/><br/> | ||
==== [[Netherlands]] ==== | ==== [[Netherlands]] ==== | ||
− | {{definition|Cyber security refers to efforts to prevent [[damage]] caused by disruptions to, breakdowns in or misuse of ICT and to repair [[damage]] if and when it has occurred. <ref>[http://english.nctv.nl/images/national-cyber-security-strategy-2_tcm92-520278.pdf National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands] </ref>}} | + | {{definition|Cybersecurity: het geheel aan maatregelen om relevante digitale risico’s tot een aanvaardbaar niveau te reduceren. Dit omvat ook het omgaan met risico’s op schade of uitval van digitale systemen en de beschikbaarheid, integriteit en vertrouwelijkheid van gegevens. De maatregelen kunnen zijn gericht op het voorkomen van cyberincidenten en - wanneer cyberincidenten zich hebben voorgedaan - deze te ontdekken, schade te beperken en herstel eenvoudiger te maken. Wat een aanvaardbaar niveau is, is de uitkomst van een risico-afweging. <ref>[https://www.nctv.nl/binaries/nctv/documenten/publicaties/2022/10/10/nederlandse-cybersecuritystrategie-2022-2028/Nederlandse+Cybersecuritystrategie+2022-2028.pdf Nederlandse Cybersecurity Strategie 2022-2028: Ambities en acties voor een digitaal veilige samenleving]</ref><br/><br/>Cybersecurity: the full spectrum of measures designed to reduce relevant cyber risks to an acceptable level. This also includes dealing with risks of damage to or failure of digital systems and the availability, integrity and confidentiality of data. Measures may focus on the prevention of cyber incidents and – if a cyber incident does occur – on detection, damage limitation and recovery. What constitutes an acceptable level of risk will be determined in a risk assessment. <ref>[https://english.nctv.nl/binaries/nctv-en/documenten/publications/2022/12/06/the-netherlands-cybersecurity-strategy-2022-2028/The+Netherlands+Cybersecurity+Strategy+2022-2028.pdf Netherlands Cyber Security Strategy 2022-2028: Ambitions and actions for a digitally secure society]</ref>}}<br/> |
− | + | {{definition|Cyberbeveiliging: de activiteiten die nodig zijn om netwerk- en informatiesystemen, de gebruikers van dergelijke systemen, en andere personen die getroffen worden door cyberdreigingen, te beschermen. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | |
− | the [[confidentiality]] and/or [[integrity]] of information stored in the ICT systems. | + | {{definition|Cybersecurity is het geheel aan maatregelen om schade door verstoring, uitval of misbruik van ICT te voorkomen en, indien er toch schade is ontstaan, het herstellen hiervan. Die schade kan bestaan uit de aantasting van de beschikbaarheid, integriteit of vertrouwelijkheid van informatiesystemen en informatiediensten en de daarin opgeslagen informatie. <ref>[https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2020/juni/29/csbn-2020/CSBN+2020.pdf Cyber Security Beeld Nederland 2020]</ref>}}<br/> |
− | </ | + | {{definition|Cybersecurity is het geheel aan maatregelen om schade door verstoring, uitval of misbruik van ICT te voorkomen en, indien er toch schade is ontstaan, het herstellen hiervan. <ref>[https://www.nctv.nl/binaries/CSAgenda_def_web_tcm31-322330.pdf Nederlandse Cybersecurity Agenda 2018]</ref> <ref>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> |
+ | {{definition|Cybersecurity is the entirety of measures to prevent damage caused by disruption, failure or misuse of ICT and to recover should damage occur. <ref>[https://english.ncsc.nl/topics/national-cybersecurity-agenda/documents/publications/2019/juni/01/national-cyber-security-agenda National Cybersecurity Agenda: A cyber secure Netherlands (2018)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Cybersecurity is het streven naar het voorkomen van schade door verstoring, uitval of misbruik van ICT en, indien er toch schade is ontstaan, het herstellen hiervan. <ref>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/organisatie/nationale-cybersecurity-strategie/1/nationale%2Bcybersecurity%2Bstrategie.pdf Nationale Cybersecurity Strategie 2: van bewust naar bekwaam]</ref><br/><br/>Cyber security refers to efforts to prevent [[damage]] caused by disruptions to, breakdowns in or misuse of ICT and to repair [[damage]] if and when it has occurred. <ref>[http://english.nctv.nl/images/national-cyber-security-strategy-2_tcm92-520278.pdf National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands] </ref>}} | ||
+ | Such [[damage]] may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of | ||
+ | the [[confidentiality]] and/or [[integrity]] of information stored in the ICT systems.<br/> | ||
{{definition|Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van [[ICT]] of door misbruik van ICT. <ref>[http://tsn.tno.nl/Data/Users/luiijfham/Home/Downloads/CSBN-4%20(1).pdf Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands] </ref> <ref>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-5/1/CSBN5.pdf Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands] </ref>}} | {{definition|Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van [[ICT]] of door misbruik van ICT. <ref>[http://tsn.tno.nl/Data/Users/luiijfham/Home/Downloads/CSBN-4%20(1).pdf Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands] </ref> <ref>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-5/1/CSBN5.pdf Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands] </ref>}} | ||
<br /> | <br /> | ||
− | ==== [[New Zealand]] ==== | + | ==== [[New Zealand]]/[[AOTEAROA]] ==== |
+ | {{definition|Cyber security: Protecting people and their computers, networks, programs and data from unauthorised access, exploitation, or modification. <ref>[https://dpmc.govt.nz/sites/default/files/2019-07/Cyber%20Security%20Strategy.pdf New Zealand’s Cyber Security Strategy (2019)]</ref>}}<br/><br/> | ||
{{definition|Cyber Security is the practice of making the networks that constitute cyber space as secure as possible against intrusions, maintaining [[confidentiality]], [[availability]] and [[integrity]] of information, detecting intrusions and incidents that do occur, and responding to and recovering from them. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/nzcybersecuritystrategyjune2011_0.pdf New Zealand’s Cyber Security Strategy (2011)]</ref>}} | {{definition|Cyber Security is the practice of making the networks that constitute cyber space as secure as possible against intrusions, maintaining [[confidentiality]], [[availability]] and [[integrity]] of information, detecting intrusions and incidents that do occur, and responding to and recovering from them. <ref>[http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/nzcybersecuritystrategyjune2011_0.pdf New Zealand’s Cyber Security Strategy (2011)]</ref>}} | ||
<br /> | <br /> | ||
+ | |||
+ | ==== [[Nicaragua]]==== | ||
+ | {{definition|Ciberseguridad: El conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. <ref>[http://legislacion.asamblea.gob.ni/normaweb.nsf/b92aaea87dac762406257265005d21f7/bed236921a6bc847062585f30068db3e DE APROBACIÓN DE LA “ESTRATEGIA NACIONAL DE CIBERSEGURIDAD 2020-2025” (asamblea.gob.ni)]</ref>}}<br/> | ||
+ | ==== [[Nigeria]] ==== | ||
+ | {{definition|Cyber security provides security for the critical information infrastructure and other critical components of information system within the current state of affairs. <ref>[https://cert.gov.ng/images/uploads/NATIONAL_CYBESECURITY_STRATEGY.pdf National Cyber Security Strategy Nigeria (2014)]</ref>}}<br /> | ||
+ | {{definition|Cybersecurity: Cyber security includes information and technical security applied to hardware, software and systems that make up networks. <ref>[https://www.cert.gov.ng/file/docs/draft-action-plan-ncss.pdf DRAFT ACTION PLAN FOR IMPLEMENTATION OF THE NATIONAL CYBERSECURITY STRATEGY 2019]</ref>}}<br /><br/> | ||
+ | |||
+ | ====[[North Macedonia]]==== | ||
+ | {{definition|Сајбер безбедност - активности и мерки за заштита н Сајбер безбедност а информациските системи кои го формираат сајбер просторот од напади, обезбедување доверливост, интегритет и достапност на информации и системи, откривање на напади и сајбер безбедносни инциденти, активирање на механизми за контра-одговор и обновување на системите до состојба во која се наоѓале пред сајбер инцидентот. <ref>[http://www.mioa.gov.mk/sites/default/files/pbl_files/documents/strategies/ns_sajber_bezbednost_2018-2022.pdf НАЦИОНАЛНА СТРАТЕГИЈА ЗА САЈБЕР БЕЗБЕДНОСТ НА РЕПУБЛИКА МАКЕДОНИЈА 2018 -2022]</ref> <ref>[http://www.mioa.gov.mk/sites/default/files/pbl_files/documents/strategies/cyber_security_strategy_macedonia_2018-2022_-_eng.pdf National Cyber Security Strategy of the Republic of Macedonia (2018)]</ref>}}<br/><br/> | ||
==== [[Norway]] ==== | ==== [[Norway]] ==== | ||
+ | {{definition|Cyber security has to do with protecting “everything” that is vulnerable because it is connected to or otherwise dependent on information and communication technology. The term is used synonymously with the terms “ICT security” and “digital security”. <ref>[https://www.regjeringen.no/contentassets/c57a0733652f47688294934ffd93fc53/national-cyber-security-strategy-for-norway.pdf National Cyber Security Strategy for Norway (2019)]</ref><br/><br/>Digital sikkerhet handler om beskyttelse av «alt» som er sårbart fordi det er koblet til eller på annen måte avhengig av informasjons- og kommunikasjonsteknologi. Brukes synonymt med begrepene IKT-sikkerhet og cybersikkerhet. <ref>[https://www.regjeringen.no/contentassets/c57a0733652f47688294934ffd93fc53/nasjonal-strategi-for-digital-sikkerhet.pdf Nasjonal strategi for digital sikkerhet (2019)]</ref>}}<br/> | ||
+ | |||
{{definition|Cyber Security is the protection of data and systems which are coupled to the Internet. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/cyber_security_strategy_norway.pdf Cyber Security Strategy for Norway (2012)]</ref><br />Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/nasjonal_strategi_infosikkerhet.pdf Nasjonal strategi for informasjonssikkerhet (2012)]</ref>}}<br /> | {{definition|Cyber Security is the protection of data and systems which are coupled to the Internet. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/cyber_security_strategy_norway.pdf Cyber Security Strategy for Norway (2012)]</ref><br />Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. <ref>[https://www.regjeringen.no/globalassets/upload/fad/vedlegg/ikt-politikk/nasjonal_strategi_infosikkerhet.pdf Nasjonal strategi for informasjonssikkerhet (2012)]</ref>}}<br /> | ||
====[[Pakistan]]==== | ====[[Pakistan]]==== | ||
− | {{definition|''Cyber Security definition | + | {{definition|''“Cyber Security” means the definition as may be developed by the National Cyber Security Council from time to time, given the fast moving dynamism in the subject fields and the need to respond with equivalent enhanced capacity, speed and effectiveness, to the emerging threats to Cyber Security, provided that at all times the definition so developed shall not be over reaching, arbitrary, inconsistent, unique or conflicting in any manner with the globally accepted international best practices, adopted by the leading developed nation states.'' <ref>[http://www.senate.gov.pk/uploads/documents/1397624997_197.pdf draft BILL to provide for the establishment of a National Cyber Security Council]</ref>}}<br/> |
− | <br /> | + | {{definition|Cyber Security [Telecom sector]: It means proactive and reactive measures for the protection of critical data and infrastructure from attack, damage and unauthorized access. <ref>[https://pta.gov.pk/assets/media/cyber_security_strategy_telecom_sector_2023_2028_13-12-2023_1.pdf Cyber Security Strategy for Telecom Sector 2023-2028]</ref>}}<br/> |
+ | |||
+ | {{definition|Cyber Security - Preservation of confidentiality, integrity, and availability of information in Cyberspace. <ref>[https://moitt.gov.pk/SiteImage/Misc/files/National%20Cyber%20Security%20Policy%202021%20Final.pdf National Cyber Security Policy 2021]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Papua New Guinea]] ==== | ||
+ | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[https://www.unodc.org/res/cld/lessons-learned/png/papua_new_guinea_cybercrime_policy_html/PNG_Cybercrime_Policy.pdf Papua New Guinea Cybercrime Policy]</ref> <ref>[http://ict.gov.pg/wp-content/uploads/2020/docs/cybersecuritypolicy2020.pdf National Cyber Security Strategy (2020)]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Paraguay]] ==== | ||
+ | {{definition|Seguridad Cibernética, Ciberseguridad o Seguridad Informática: es el conjunto de medidas preventivas y reactivas de las organizaciones y de los sistemas tecnológicos que permiten resguardar y proteger la información en el medio informático, buscando asegurar la confidencialidad, la disponibilidad e integridad de la misma. <ref>[https://www.senatics.gov.py/download_file/909 Plan Nacional de Ciberseguridad, República del Paraguay, 2016]</ref>}}<br /><br/> | ||
+ | |||
+ | ==== [[Philippines]] ==== | ||
+ | {{definition|Cybersecurity ay tumutukoy sa koleksyon ng mga kagamitan, mga patakaran, mga plano sa pamamahala ng panganib, mga pagkilos, pagsasanay, pinakamahusay na kasanayan, katiyakan at mga teknolohiya na maaaring magamit upang maprotektahan ang kapaligirang cyber at organisasyon, at ang mga asset ng gumagamit. <ref>[https://thepinoysite.com/2012/09/28/cybercrime-prevention-act-of-2012-pinoy-version/ Cybercrime Prevention Act of 2012 (Pinoy Version) Philippines]</ref>}}<br/> | ||
+ | {{definition|Cybersecurity refers to the protection of information systems (hardware and software including associated and support [[infrastructure|infrastructures]]), the data within these systems and the services that are provided by these systems from any unauthorized access, harm or misuse whether it includes intentional or accidental or from natural [[Disaster|disasters]]. <ref>[http://www.dict.gov.ph/wp-content/uploads/2016/12/National-Cybersecurity-Plan-2022-Draft.pdf National Cyber Security Plan (Working Draft v1.13 as of December 2016)]</ref>}}<br /> | ||
+ | {{definition|Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[http://www.gov.ph/2012/09/12/republic-act-no-10175/ Republic Act No. 10175, 2012]</ref> <ref>[http://www.dict.gov.ph/wp-content/uploads/2017/04/FINAL_NationalCyberSecurityPlan2022.pdf National Cyber Security Plan (May 2017)]</ref>}}<br /> | ||
+ | {{definition|Cybersecurity - The ability to protect or defend the use of cyberspace from cyberattacks. The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, organization and users‘ assets. <ref>[http://www.dnd.gov.ph/miss/PDF/downloadables/Cybersecurity%20Glossary%20(Edited).pdf DND GLOSSARY OF CYBER SECURITY TERMS (v.4)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Cyber Security: The body of technologies, processes and practices designed to protect networks, computers, programmes and data from attack, damage or unauthorised access. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/><br/> | ||
+ | |||
==== [[Poland]] ==== | ==== [[Poland]] ==== | ||
− | {{definition| | + | {{definition|Cyberbezpieczeństwo: oznacza działania niezbędne do ochrony sieci i systemów informatycznych, użytkowników takich systemów oraz innych osób przed cyberzagrożeniami. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> |
+ | |||
+ | {{definition|Cyberbezpieczeństwo – odporność systemów informacyjnych na wszelkie działania naruszające poufność, integralność, dostępność i autentyczność przetwarzanych danych lub związanych z nimi usług oferowanych przez te systemy. <ref>[http://bip.kprm.gov.pl/download/75/30991/RM-10-64-18.pdf U S TAWA z dnia o krajowym systemie cyberbezpieczeństwa / Polish (draft) law on the national cybersecurity system (2018)]</ref>}}<br /> | ||
+ | |||
+ | {{definition|Cyberbezpieczeństwo RP (bezpieczeństwo RP w cyberprzestrzeni) – proces zapewniania bezpiecznego funkcjonowania w cyberprzestrzeni państwa jako całości, jego struktur, osób fizycznych i osób prawnych, w tym przedsiębiorców i innych podmiotów nieposiadających osobowości prawnej, a także będących w ich dyspozycji systemów teleinformatycznych oraz zasobów informacyjnych w globalnej cyberprzestrzeni. <br /><br/>Cyber RP (RP security in cyberspace) is the process of ensuring the safe operation of in cyberspace state as a whole, its structure, individuals and legal persons, including companies and other entities without legal personality, as well as at their disposal ICT systems and information resources in the global cyberspace. <ref>[http://mon.gov.pl/z/pliki/dokumenty/rozne/2015/05/DCB.pdf Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warsaw (2015)]</ref>}}<br /> | ||
+ | |||
+ | {{definition|Bezpieczeństwo cyberprzestrzeni - proces obejmujący zespół przedsięwzięć organizacyjno-prawnych, technicznych, fizycznych i edukacyjnych mający na celu zapewnienie niezakłóconego funkcjonowania cyberprzestrzeni; część cyberbezpieczeństwa państwa obejmująca zapewnienie bezpiecznego funkcjonowania pozostającej pod jego kontrolą teleinformatycznej infrastruktury krytycznej I wykorzystania strategicznych zasobów informacyjnych państwa. <ref>[https://www.bbn.gov.pl/pl/bezpieczenstwo-narodowe/minislownik-bbn-propozy/6035,MINISLOWNIK-BBN-Propozycje-nowych-terminow-z-dziedziny-bezpieczenstwa.html (MINI)SŁOWNIK BBN: Propozycje nowych terminów z dziedziny bezpieczeństwa (2015) - proposed definition]</ref>}}<br /><br/> | ||
+ | |||
+ | ==== [[Portugal]] ==== | ||
+ | {{definition|Cibersegurança, todas as atividades necessárias para proteger de ciberameaças as redes e os sistemas de informação, os seus utilizadores e outras pessoas afetadas. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | {{definition|Cibersegurança: Conjunto de medidas e ações de prevenção, monitorização, deteção, reação, análise e correção que visam manter o estado de segurança desejado e garantir a confidencialidade, integridade, disponibilidade e não repúdio da informação, das redes e sistemas de informação no ciberespaço, e das pessoas que nele interagem. <ref>[https://www.cncs.gov.pt/content/files/cncs_qnrcs_2019.pdf Quadro Nacional de Referência para a Cibersegurança]</ref>}}<br/><br/> | ||
==== [[Qatar]] ==== | ==== [[Qatar]] ==== | ||
− | {{definition|The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[http://www.ictqatar.qa/en/ | + | {{definition|The collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[http://www.ictqatar.qa/en/cyber-security/national-cyber-security-strategy QATAR National Cyber Security Strategy (May 2014)]</ref><br/><br/>مجموعة ا أ لدوات والسياسات والمفاهيم وا إ لجراءات ا أ لمنية والمبادئ التوجيهية ومنهجيات إدارة المخاطر وا إ لجراءات والتدريب وأفضل الممارسات وسبل التأمي ن والتقنيات ال ت ي يمكن استخدامها لحماية بيئة الفضاء ا إ للك ترو ني وأصول<ref>[http://www.ictqatar.qa/ar/cyber-security/national-cyber-security-strategy الاستراتيجية الوطنية للأمن السيبراني QATAR NCSS - Arabic version (May 2014)]</ref>}} |
Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: [[confidentiality]], [[integrity]] (which may include [[authenticity]] and non-repudiation), and [[availability]]. | Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: [[confidentiality]], [[integrity]] (which may include [[authenticity]] and non-repudiation), and [[availability]]. | ||
<br /> | <br /> | ||
==== [[Republic of Trinidad & Tobago]] ==== | ==== [[Republic of Trinidad & Tobago]] ==== | ||
− | {{definition|''See ITU-T definition below'' <ref>[http://www.nationalsecurity.gov.tt/Portals/0/Pdf%20Files/National_Cyber_Security%20Strategy_Final.pdf Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)]</ref>}} | + | {{definition|''See ITU-T definition below'' <br/><br/>La ciberseguridad es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. <ref>[http://www.nationalsecurity.gov.tt/Portals/0/Pdf%20Files/National_Cyber_Security%20Strategy_Final.pdf Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)]</ref>}} |
<br /> | <br /> | ||
==== [[Romania]] ==== | ==== [[Romania]] ==== | ||
+ | {{definition|„Securitate cibernetică” înseamnă activitățile necesare pentru protejarea rețelelor și a sistemelor informatice, a utilizatorilor unor astfel de sisteme și a altor persoane afectate de amenințări cibernetice. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
{{definition|Cyber security is a normality resulting from the application of a set of proactive and reactive measures that ensure the [[confidentiality]], [[integrity]], [[availability]], authenticity and non-repudiation in electronic information, resources and services, public or private, in cyberspace.<br/><br/>Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. <ref>[https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/StrategiaDeSecuritateCiberneticaARomaniei.pdf Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică]</ref>}} | {{definition|Cyber security is a normality resulting from the application of a set of proactive and reactive measures that ensure the [[confidentiality]], [[integrity]], [[availability]], authenticity and non-repudiation in electronic information, resources and services, public or private, in cyberspace.<br/><br/>Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. <ref>[https://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/StrategiaDeSecuritateCiberneticaARomaniei.pdf Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică]</ref>}} | ||
+ | <br /> | ||
+ | ==== [[Russian Federation]] ==== | ||
+ | {{definition|кибербезопасность – совокупность условий, при которых все составляющие киберпространства защищены от максимально возможного числа угроз и воздействий с нежелательными последствиями. <ref>[http://council.gov.ru/media/files/41d4b3dfbdb25cea8a73.pdf КОНЦЕПЦИЯ СТРАТЕГИИ КИБЕРБЕЗОПАСНОСТИ РОССИЙСКОЙ ФЕДЕРАЦИИ (Draft Cyber Security Strategy 2016)]</ref><br/>Cyber security (RAW TRANDLATION): a set of conditions in which all the components are protected from maximum possible number of cyber [[threat|threats]] and impacts of unwanted [[Consequence|consequences]].<br/><br/>информационная инфраструктура: совокупность технических средств и систем формирования, преобразования, передачи, использования и хранения информации. <ref>[http://www.scrf.gov.ru/documents/6/112.html Конвенция об обеспечении международной информационной безопасности (концепция)<br/>Convention on ensuring international information security; draft 2015]</ref>}} | ||
<br /> | <br /> | ||
+ | ==== [[Rwanda]] ==== | ||
+ | {{definition|Umutekano w’urusobe koranabuhanga: kurinda imikorere ya mudasobwa ubujura, kwangiza ibikoresho byayo, uburyo bw’imikorere bwayo cyangwa amakuru kimwe no kurogoya cyangwa kuyobya serivisi zatanzwe.<br/><br/>Cyber security: protection of computer systems from theft of, damage to their hardware, software or information as well as from disruption or misdirection of the services they provide. <br/><br/>Cyber sécurité: protection des systèmes informatiques contre le vol de leurs matériel, logiciels ou informations ou dommages à leur encontre ainsi que contre la perturbation ou la mauvaise orientation des services qu’ils fournissent. <ref>https://cyber.gov.rw/documentation/ Rwanda cybercrime law</ref>}}<br/> | ||
+ | ====[[Samoa]]==== | ||
+ | {{definition|Cyber Security The protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. <ref>[https://www.mesc.gov.ws/wp-content/uploads/2019/09/MESC-ICT-in-Education_Policy_2018-2023-30.10.2018_FINAL.pdf National Information and Communication Technology in Education Policy 2018 - 2023]</ref>}}<br /> | ||
==== [[Saudi Arabia]] ==== | ==== [[Saudi Arabia]] ==== | ||
{{definition|Cyber Security is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)]</ref>}} | {{definition|Cyber Security is the ability to protect or defend the use of cyberspace from cyber-attacks. <ref>[http://www.mcit.gov.sa/Ar/MediaCenter/PubReqDocuments/NISS_Draft_7_EN.pdf Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)]</ref>}} | ||
<br /> | <br /> | ||
+ | ==== [[Senegal]] ==== | ||
+ | {{definition|Cybersécurité: l'ensemble des lois, politiques, outils, dispositifs, concepts et mécanismes de sécurité, méthodes de gestion des risques, actions, formations, bonnes pratiques et technologies qui peuvent être utilisés pour protéger les personnes et les actifs informatiques connectés directement ou indirectement à un réseau des états et des organisations (avec un objectif de disponibilité, intégrité & authenticité, confidentialité, preuve & non-répudiation). <ref>[http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)]</ref>}}<br/> | ||
+ | ==== [[Singapore]] ==== | ||
+ | {{definition|“cybersecurity” means the security of a computer or computer system against unauthorised access or attack, to preserve the [[availability]] and [[integrity]] of the computer or computer system, or the [[confidentiality]] of information stored or processed therein. <ref>[https://www.csa.gov.sg/~/media/csa/cybersecurity_bill/draft_cybersecurity_bill_2017.ashx (draft) Cybersecurity Bill 2017]</ref>}}<br /> | ||
+ | |||
+ | ==== [[Slovenia]]==== | ||
+ | {{definition|Kibernetska varnost“ pomeni dejavnosti, ki so potrebne za zaščito omrežij in informacijskih sistemov, uporabnikov takih sistemov in drugih oseb, na katere vplivajo kibernetske grožnje;. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | |||
+ | {{definition|Kibernetska varnost je v splošnem smislu opredeljena kot: (a) skupek aktivnosti in drugih ukrepov, tehničnih in ne-tehničnih, katerih namen je zaščititi računalnike, računalniška omrežja, strojno in programsko opremo ter informacije, ki jih le-ta vsebuje in obravnava, kar vključuje programsko opremo in podatke kot tudi druge elemente kibernetskega prostora, pred vsemi grožnjami, vključno z grožnjami nacionalni varnosti; (b) stopnja zaščite, ki jo aktivnosti in ukrepi lahko zagotovijo; (c) združena področja profesionalnih naporov, vključno z raziskavami in razvojem na področju implementiranja in izboljševanja ukrepov ter dvigovanja kakovosti le-teh. <ref>[http://www.mizs.gov.si/fileadmin/mizs.gov.si/pageuploads/Informacijska_druzba/pdf/DSI2020_Strategija_Kibernetske_Varnosti.pdf Strategija kibernetske varnosti (2016)]</ref>}} | ||
+ | <br /> | ||
+ | |||
==== [[South Africa]] ==== | ==== [[South Africa]] ==== | ||
− | {{definition|Cyber Security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user assets. <ref>[http://pmg-assets.s3-website-eu-west-1.amazonaws.com/docs/100219cybersecurity.pdf South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010]</ref>}} | + | {{definition|Cyber Security is the practice of making the networks that constitute [[cyberspace]] secure against intrusions, maintaining [[confidentiality]], [[availability]] and [[integrity]] of information, detecting intrusions and [[Incident|incidents]]that do occur, and responding and recovering from them. <ref>[http://www.gov.za/sites/www.gov.za/files/39475_gon609.pdf South Africa Cyber Security Policy, Staatskoerant No. 39475, 4 Desember 2015]</ref>}} |
− | <br /> | + | <br />{{definition|[old] Cyber Security is the collection of tools, policies, security concepts, security safeguards, guidelines,[[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user assets. <ref>[http://pmg-assets.s3-website-eu-west-1.amazonaws.com/docs/100219cybersecurity.pdf South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010]</ref>}} |
+ | <br /><br/> | ||
+ | ==== [[Spain]] ==== | ||
+ | {{definition|Ciberseguridad: todas las actividades necesarias para la protección de las redes y sistemas de información, de los usuarios de tales sistemas y de otras personas afectadas por las ciberamenazas. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | {{definition|Ciberseguridad: Protección de los componentes de las infraestructuras de los sistemas de información y comunicaciones ante amenazas cibernéticas. <ref>[https://publicaciones.defensa.gob.es/media/downloadable/files/links/c/e/ce_149.pdf CIBERSEGURIDAD. RETOS Y AMENAZAS A LA SEGURIDAD NACIONAL EN EL CIBERESPACIO, MINISTERIO DE DEFENSA (2010)]</ref>}}<br/><br/> | ||
+ | |||
+ | ==== [[Sri Lanka]]==== | ||
+ | {{definition|Cyber security means a set of activities intended to make [[cyberspace|cyber space]] safe and secure. <ref>[https://www.cert.gov.lk/Downloads/Cyber_Security_Bill_2019-05-22_LD_Final_Version.pdf Cyber Security bill 2019]</ref>}}<br/> | ||
==== [[Sweden]]==== | ==== [[Sweden]]==== | ||
+ | {{definition|Cybersäkerhet: all verksamhet som är nödvändig för att skydda nätverks- och informationssystem, användare av dessa system och andra berörda personer mot cyberhot. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
{{definition|''See ITU-T definition below''. <ref>[http://www.regeringen.se/sb/d/19838/a/255536 Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)]</ref>}} | {{definition|''See ITU-T definition below''. <ref>[http://www.regeringen.se/sb/d/19838/a/255536 Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)]</ref>}} | ||
<br /> | <br /> | ||
− | ==== [[ | + | ==== [[Switzerland]]==== |
− | {{definition|Siber güvenlik: Siber ortamı oluşturan bilişim sistemlerinin saldırılardan korunmasını, bu ortamda işlenen bilginin gizlilik, bütünlük ve erişilebilirliğinin güvence altına alınmasını, saldırıların ve siber güvenlik olaylarının tespit edilmesini, bu tespitlere karşı tepki mekanizmalarının devreye alınmasını ve sonrasında ise sistemlerin yaşanan siber güvenlik olayı öncesi durumlarına geri döndürülmesini. <ref>[http://www.resmigazete.gov.tr/eskiler/2013/06/20130620-1-1.pdf UlUSAL SİBER GÜVENLİk STRATEJİSİ VE]</ref><br/><br/>Cyber Security is the protection of information systems that make up the cyber space from attacks, ensuring the [[confidentiality]], [[integrity]] and [[accessibility]] of the information being processed in this space, detection of attacks and [[Cyber Security|cyber security]] [[Incident|incidents]], putting into force the countermeasures against these incidents and then putting these systems back to their states previous to the cyber security incident. <ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref>}}<br /> | + | {{definition|Cyber security: Desirable state within cyberspace in which communication and data exchange between information and communication infrastructures function as originally intended. This state is achieved with measures of information security and cyber defence. <ref>[https://www.isb.admin.ch/dam/isb/en/dokumente/ikt-vorgaben/strategien/ncs/Nationale_Strategie_Schutz_Schweiz_vor_Cyber-Risiken_NCS_2018-22_EN.pdf.download.pdf SN002 - National strategy for Switzerland’s protection against cyber risks (NCS) 2018-2022 (2018)]</ref><br/><br/>Cyber-Sicherheit: Anzustrebender Zustand innerhalb des Cyber-Raums, bei dem die Kommunikation und der Datenaustausch zwischen Informations- und Kommunikationsinfrastrukturen wie ursprünglich beabsichtigt funktionieren. Dieser Zustand wird mit Massnahmen der Informationssicherheit und der Cyber-Defence erreicht. <ref> [https://www.isb.admin.ch/dam/isb/de/dokumente/ikt-vorgaben/strategien/ncs/Nationale_Strategie_Schutz_Schweiz_vor_Cyber-Risiken_NCS_2018-22_DE.pdf.download.pdf SN002 - Nationale Strategie zum Schutz der Schweiz vor Cyber-Risiken (NCS) 2018-2022 (2018)]</ref><br/><br/>Cybersécurité: Situation visée au sein du cyberespace dans laquelle la communication et l’échange de données entre les infrastructures d’information et de communication fonctionnent comme prévu. Cette situation est atteinte grâce aux mesures en matière de sécurité de l’information et à la cyberdéfense. <ref>[https://www.isb.admin.ch/dam/isb/fr/dokumente/ikt-vorgaben/strategien/ncs/Nationale_Strategie_Schutz_Schweiz_vor_Cyber-Risiken_NCS_2018-22_FR.pdf.download.pdf SN002 - Stratégie nationale de protection de la Suisse contre les cyberrisques (SNPC) 2018-2022 (2018)]</ref><br/><br/>Cyber sicurezza: Stato auspicabile nel cyberspazio in cui le comunicazioni e lo scambio di dati tra le infrastrutture TIC funzionano come previsto originariamente. Questo stato si consegue adottando misure di sicurezza delle informazioni e di cyber difesa. <ref>[https://www.isb.admin.ch/dam/isb/it/dokumente/ikt-vorgaben/strategien/ncs/Nationale_Strategie_Schutz_Schweiz_vor_Cyber-Risiken_NCS_2018-22_IT.pdf.download.pdf SN002 - Strategia nazionale per la protezione della Svizzera contro i cyber-rischi (SNPC) 2018-2022 (2018)]</ref>}}<br/> |
+ | |||
+ | ==== [[Thailand]] ==== | ||
+ | {{definition|Cybersecurity means measures and operations that are conceived in order to maintain national Cybersecurity, enabling it to protect, prevent or tackle circumstances of cyber threats which may affect or pose risks to the service or application of computer network, internet, telecommunications network, or the regular service of satellites in ways that affect national security, which includes military security, domestic peace and order, and economic stability. <ref>[https://thainetizen.org/wp-content/uploads/2015/03/cybersecurity-bill-20150106-en.pdf National Cybersecurity Bill (DRAFT approved by the Cabinet on 6 January 2015), Unofficial translation by Thai Netizen Network – March 2015]</ref>}}<br /> | ||
+ | |||
+ | ==== [[Türkiye]] ==== | ||
+ | {{definition|Siber güvenlik: Siber ortamı oluşturan bilişim sistemlerinin saldırılardan korunmasını, bu ortamda işlenen bilginin gizlilik, bütünlük ve erişilebilirliğinin güvence altına alınmasını, saldırıların ve siber güvenlik olaylarının tespit edilmesini, bu tespitlere karşı tepki mekanizmalarının devreye alınmasını ve sonrasında ise sistemlerin yaşanan siber güvenlik olayı öncesi durumlarına geri döndürülmesini. <ref>[http://www.resmigazete.gov.tr/eskiler/2013/06/20130620-1-1.pdf UlUSAL SİBER GÜVENLİk STRATEJİSİ VE]</ref><br/><br/>Cyber security: Protection of information systems forming [[Cyberspace|cyber space]] from [[Cyber Attack|attacks]], assuring [[confidentiality]], [[integrity]] and [[availability]] of information/data processed in this environment, detection of attacks and cyber security incidents, activation of counter-response mechanisms and recovering systems to conditions prior the cyber security incident. <ref>[http://www.udhb.gov.tr/doc/siberg/UlusalSibereng.pdf Turkey's National Cyber Security Strategy 2016-2019 (2016)]</ref>}}<br/><br/> | ||
+ | {{definition|Cyber Security is the protection of information systems that make up the cyber space from attacks, ensuring the [[confidentiality]], [[integrity]] and [[accessibility]] of the information being processed in this space, detection of attacks and [[Cyber Security|cyber security]] [[Incident|incidents]], putting into force the countermeasures against these incidents and then putting these systems back to their states previous to the cyber security incident. <ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref>}}<br /> | ||
+ | |||
+ | ==== [[Ukraine]] ==== | ||
+ | {{definition|кібербезпека - захищеність життєво важливих інтересів людини і громадянина, суспільства та держави під час використання кіберпростору, за якої забезпечуються сталий розвиток інформаційного суспільства та цифрового комунікативного середовища, своєчасне виявлення, запобігання і нейтралізація реальних і потенційних загроз національній безпеці України у кіберпросторі.<br/><br/>{machine translation} cybersecurity - the protection of the vital interests of man and citizen, the society and the state during the use of cyberspace, which ensures the sustainable development of the information society and the digital communicative environment, timely detection, prevention and neutralisation of real and potential threats to the national security of Ukraine in [[cyberspace]]. <ref>[http://zakon3.rada.gov.ua/laws/show/2163-viii ЗАКОН УКРАЇНИ - Про основні засади забезпечення кібербезпеки України / THE LAW OF UKRAINE: About the basic principles of providing cyber security of Ukraine 2163-19]</ref>}}<br><br> | ||
+ | ====[[United Kingdom|United Kingdom (UK)]]==== | ||
+ | {{definition|Cybersecurity means the activities necessary to protect network and information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/oj REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)]</ref>}}<br/> | ||
+ | {{definition|Cyber security is the protection of internetconnected systems (to include hardware,software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse. This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so. <ref>[https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/564268/national_cyber_security_strategy.pdf National Cyber Security Strategy 2016, HM Government]</ref>}} | ||
==== [[United States]] ==== | ==== [[United States]] ==== | ||
+ | =====[[DHS]]===== | ||
+ | {{definition|Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. <ref name=nicss>[https://niccs.us-cert.gov/glossary DHS/NICSS Glossary]</ref>}}<br/> | ||
+ | {{definition|Cybersecurity is the strategy, policy, and standards regarding the security of and operations in cyberspace, and encompass[ing] the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. <ref name=nicss>[https://niccs.us-cert.gov/glossary DHS/NICSS Glossary]</ref>}}<br/> | ||
+ | =====[[Financial Stability Board]]===== | ||
+ | {{definition|Cyber Security Preservation of confidentiality, integrity and availability of information and/or information systems through the cyber medium. In addition, other properties, such as [[authenticity]], accountability, [[non-repudiation]] and [[reliability]] can also be involved. Source: Adapted from ISO/IEC 27032:2012. <ref>[https://www.fsb.org/wp-content/uploads/P121118-1.pdf Financial Stability Board, Cyber Lexicon (Nov. 12, 2018)]</ref>}}<br/> | ||
+ | |||
+ | ===== [[NIA]] ===== | ||
+ | {{definition|The ability to protect or defend the use of cyberspace from cyber attacks. <ref>[http://www.ncix.gov/publications/policy/docs/CNSSI_4009.pdf National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, 26 April 2010.]</ref>}}<br/> | ||
+ | |||
===== [[NIPP]] ===== | ===== [[NIPP]] ===== | ||
{{definition|The prevention of [[damage]] to, unauthorized use of, or exploitation of, and, if needed, the restoration of electronic information and communications systems and the information contained therein to ensure confidentiality, integrity, and availability; includes protection and restoration, when needed, of information networks and wireline, wireless, satellite, public safety answering points, and 911 communications systems and control systems. <ref>[http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009]</ref>}}<br/> | {{definition|The prevention of [[damage]] to, unauthorized use of, or exploitation of, and, if needed, the restoration of electronic information and communications systems and the information contained therein to ensure confidentiality, integrity, and availability; includes protection and restoration, when needed, of information networks and wireline, wireless, satellite, public safety answering points, and 911 communications systems and control systems. <ref>[http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009]</ref>}}<br/> | ||
− | + | ||
− | |||
===== [[NIST]] ===== | ===== [[NIST]] ===== | ||
{{definition|The ability to protect or defend the use of cyberspace from [[Cyber Attack|cyber attacks]]. <ref>[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)]</ref>}} | {{definition|The ability to protect or defend the use of cyberspace from [[Cyber Attack|cyber attacks]]. <ref>[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)]</ref>}} | ||
Synonymous with security controls and safeguards.<br/><br/> | Synonymous with security controls and safeguards.<br/><br/> | ||
+ | |||
+ | ===== [[DoD]]===== | ||
+ | {{definition|Cybersecurity: Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its [[availability]], [[integrity]], [[authentication]], [[confidentiality]], and nonrepudiation. (DODI 8500.01). <ref>[http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)]</ref>}}<br/> | ||
+ | ====[[Uzbekistan]]==== | ||
+ | {{definition|Muhim axborot infratuzilmasining kiberxavfsizligi — muhim axborot infratuzilmasi obyektida kiberxavfsizlik hodisasini keltirib chiqarishi mumkin bo‘lgan buzilishdan muhim axborot infratuzilmasi obyekti barqaror ishlashini ta’minlovchi himoyalanganlik holati <br/><br/>кибербезопасность (объектов) критической информационной инфраструктуры — состояние защищенности, обеспечивающее устойчивое функционирование объекта критической информационной инфраструктуры и защиту от нарушения, которое может привести к возникновению инцидента кибербезопасности на объекте критической информационной инфраструктуры.<br/><br/>(''Cybersecurity'' (objects) of critical information infrastructure is a state of security that ensures the stable operation of a critical information infrastructure facility and protection against a breach that may lead to a cybersecurity incident at a critical information infrastructure facility) <ref>[https://lex.uz/docs/6479190 Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”]</ref>}}<br/> | ||
+ | {{definition|Kiberhimoya — kiberxavfsizlik hodisalarining oldini olishga, kiberhujumlarni aniqlashga va ulardan himoya qilishga, kiberhujumlarning oqibatlarini bartaraf etishga, telekommunikatsiya tarmoqlari, axborot tizimlari hamda resurslari faoliyatining barqarorligini va ishonchliligini tiklashga qaratilgan huquqiy, tashkiliy, moliyaviy-iqtisodiy, muhandislik-texnik chora-tadbirlar, shuningdek, ma’lumotlarni kriptografik va texnik jihatdan himoya qilish chora-tadbirlari majmui. <br/><br/>киберҳимоя — киберхавфсизлик ҳодисаларининг олдини олишга, киберҳужумларни аниқлашга ва улардан ҳимоя қилишга, киберҳужумларнинг оқибатларини бартараф этишга, телекоммуникация тармоқлари, ахборот тизимлари ҳамда ресурслари фаолиятининг барқарорлигини ва ишончлилигини тиклашга қаратилган ҳуқуқий, ташкилий, молиявий-иқтисодий, муҳандислик-техник чора-тадбирлар, шунингдек, маълумотларни криптографик ва техник жиҳатдан ҳимоя қилиш чора-тадбирлари мажмуи. <br/><br/>(Cyber ''protection'' - a set of legal, organizational, financial, economic, engineering and technical measures, as well as measures of cryptographic and technical data protection aimed at preventing cybersecurity incidents, detecting cyber attacks and protecting against them, eliminating the consequences of cyber attacks, restoring stability and reliability of telecommunication networks, information systems and resources) <ref>[https://lex.uz/docs/6479190 Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”]</ref>}}<br/> | ||
+ | |||
+ | ====[[Vanuatu]]==== | ||
+ | {{definition|Cyber Security: is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. <ref>[https://cert.gov.vu/images/ressources/Vanuatu_National_CyberSecurity_Strategy2030_Booklet.pdf National Cybersecurity Strategy 2030]</ref>}}<br/> | ||
+ | |||
+ | ====[[Zambia]]==== | ||
+ | {{definition|Cybersecurity means the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. <ref>[https://www.zicta.zm/storage/sites/attachments/TVV4W9VO7MgqBMtdHT4h09NNq8XSXyS3VVYU44PF.pdf National Cyber Security Policy]</ref>}}<br/> | ||
+ | |||
+ | ===Regional Definitions=== | ||
+ | |||
+ | =====[[Isle of Man]]===== | ||
+ | {{definition|Cyber-security - The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. <ref>[https://www.gov.im/media/1363851/national-cyber-security-strategy.pdf Isle of Man National Cyber Security Strategy (2018-2022)]</ref>}} More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from [[attack]], damage or unauthorized access so as to ensure [[confidentiality]], [[integrity]] and [[availability]].<br/><br/> | ||
===International organisations === | ===International organisations === | ||
+ | ====[[WEF|World Economic Forum]]==== | ||
+ | {{definition|The analysis, warning, [[Information Sharing|information sharing]], vulnerability reduction, [[risk]] mitigation and recovery efforts for networked information systems. <ref>[http://www3.weforum.org/docs/WEF_IT_PartneringCyberResilience_Guidelines_2012.pdf WEF Partnering for Cyber Resilience Guidelines 2012]</ref>}}<br /> | ||
+ | |||
+ | ===International standards === | ||
+ | ====[[ISO|ISO/IEC]]==== | ||
+ | {{definition|“Cybersecurity” or “Cyberspace security” is defined as the “preservation of [[confidentiality]], [[integrity]] and [[availability]] of information in the [[Cyberspace]]. <ref>[http://www.iso27001security.com/html/27032.html ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity]</ref>}}<br /> | ||
+ | |||
====[[ITU-T]]==== | ====[[ITU-T]]==== | ||
− | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref>[ | + | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. <ref name=ITUT>[https://www.itu.int/rec/T-REC-X.1205-200804-I ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205]</ref>}} |
Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. | Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. | ||
<br /> | <br /> | ||
− | = | + | {{definition|网络安全:网络安全涉及用以保护网络环境和机构及用户资产的各种工具、政策、安全理念、安全保障、指导原则、风险管理方式、行动、培训、最佳做法、保证和技术。 <ref name=ITUT>[https://www.itu.int/rec/T-REC-X.1205-200804-I ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205]</ref>}}<br /> |
− | {{definition| | + | {{definition|Ciberseguridad: El conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. <ref name=ITUT>[https://www.itu.int/rec/T-REC-X.1205-200804-I ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205]</ref>}}<br /> |
+ | {{definition|Cybersécurité: ensemble des outils, politiques, concepts de sécurité, mécanismes de sécurité, lignes directrices, méthodes de gestion des risques, actions, formations, bonnes pratiques, garanties et technologies qui peuvent être utilisés pour protéger le cyberenvironnement et les actifs des organisations et des utilisateurs. <ref name=ITUT>[https://www.itu.int/rec/T-REC-X.1205-200804-I ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205]</ref>}}<br /> | ||
+ | {{definition|кибербезопасность: Кибербезопасность – это набор средств, стратегии, принципы обеспечения безопасности, гарантии безопасности, руководящие принципы, подходы к управлению рисками, действия, профессиональная подготовка, практический опыт, страхование и технологии, которые могут быть использованы для защиты киберсреды, ресурсов организации и пользователя. <ref name=ITUT>[https://www.itu.int/rec/T-REC-X.1205-200804-I ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205]</ref>}}<br /> | ||
− | + | ====[[IETF]]==== | |
− | ====[[ | + | {{definition|Cyber Security: The vulnerability of any computing system, software program, or critical infrastructure, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> |
− | {{definition|Cyber | ||
===Other Definitions=== | ===Other Definitions=== | ||
====[[Scotland]]==== | ====[[Scotland]]==== | ||
− | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s [[Asset|assets]]. <ref>[http:// | + | {{definition|Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, [[Risk Management|risk management]] approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s [[Asset|assets]]. <ref>[http://www.gov.scot/Resource/0048/00489206.pdf Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland]</ref>}}<br /> |
+ | ====[[Cymru]]/[[Wales]]==== | ||
+ | {{definition|Seiberddiogelwch: Amddiffyn systemau a gysylltwyd â’r rhyngrwyd (yn cynnwys caledwedd, meddalwedd a seilwaith cysylltiedig), y data sydd arnynt, a’r gwasanaethau a ddarparant, rhag mynediad nas awdurdodwyd, niwed neu gamddefnydd. Mae hyn yn cynnwys niwed a achoswyd yn anfwriadol, neu’n ddamweiniol, gan weithredwr y system o ganlyniad i fethu â dilyn gweithdrefnau diogelwch neu gael ei ysgogi i wneud hynny. <ref>[https://assets.publishing.service.gov.uk/media/620e0b45e90e0710c2aab683/government-cyber-security-strategy-welsh.pdf Strategaeth Seiberddiogelwch Llywodraeth: Adeiladu sector cyhoeddus seibergadarn 2022-2030]</ref>}}<br/> | ||
+ | |||
+ | ====[[Victoria]] (Australia) ==== | ||
+ | {{definition|Cyber security refers to measures relating to the [[confidentiality]], [[availability]] and [[integrity]] of information and data that is processed, stored and communicated by electronic or similar means, protecting it and associated systems from external or internal [[threat]]. <ref>[http://www.enterprisesolutions.vic.gov.au/wp-content/uploads/2017/08/153-DPC-Cyber-Security-Strategy-12-%C6%92-web.pdf Cyber Security Strategy Victoria (2017)]</ref>}}<br /> | ||
====East-West Institute (Russia-US) ==== | ====East-West Institute (Russia-US) ==== | ||
− | {{definition|Cybersecurity is a property of cyber space that is an ability to resist intentional and unintentional [[Threat|threats]] and respond and recover.<br /><br />Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. <ref>[ | + | {{definition|Cybersecurity is a property of cyber space that is an ability to resist intentional and unintentional [[Threat|threats]] and respond and recover.<br /><br />Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. <ref>[https://www.eastwest.ngo/sites/default/files/ideas-files/Russia-US-terminology.pdf RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS]</ref>}}<br /> |
+ | ==== Academic ==== | ||
+ | {{definition|Cyber security is a broad concept which encompasses the technologies, processes, and policies that help to prevent and/or reduce the negative impact of events in cyberspace that can happen as the result of deliberate actions against information technology by a hostile or malevolent actor. <ref>[https://www.ncbi.nlm.nih.gov/books/NBK223215/ Clark, D., Berson, T., & Lin, H. S. (Eds.) (2014). At the nexus of cybersecurity and public policy. Computer Science and Telecommunications Board, National Research Council, Washington DC: The National Academies Press.]</ref>}}<br /> | ||
<!--===Standard Definition=== | <!--===Standard Definition=== | ||
--> | --> | ||
+ | === [[Dictionary]]=== | ||
+ | {{definition|Cybersecurity Alle beveiligingsmaatregelen die men neemt om schade te voorkomen door een storing, uitval of misbruik van een informatiesysteem of computer. Ook worden maatregelen genomen om schade te beperken en/of herstellen als die toch is ontstaan. Voorbeelden van schade zijn dat men niet meer in een computersysteem kan komen wanneer men dat wil. Of dat de opgeslagen informatie bij anderen terecht komt of niet meer klopt. De maatregelen hebben te maken met processen in de organisatie, technologie en gedrag van mensen. <ref>[https://www.cybersecurityalliantie.nl/ecp_images/2021/12/Cybersecurity-Woordenboek-2021_ZonderSpreads.pdf Cybersecurity Woordenboek 2021]</ref>}}<br/><br/> | ||
+ | {{#set:defined by=Dictionary}} | ||
+ | ==Definitions Science of Cyber Security == | ||
+ | === Academic === | ||
+ | {{definition|Science of cyber security is the study of relations -- preferably expressed as theoretically-grounded models -- between attributes, structures and dynamics of: violations of cyber security policy; the network of computing devices under attack; the defenders' tools and techniques; and the attackers' tools and techniques where malicious software plays the central role. <ref>[https://arxiv.org/abs/1512.00407 Alexander Kott, Science of Cyber Security as a System of Models and Problems (2015)]</ref>}}<br/> | ||
==See also== | ==See also== | ||
Line 186: | Line 454: | ||
==Notes== | ==Notes== | ||
− | |||
− | |||
==References== | ==References== | ||
− | + | <references /> | |
+ | [[Category:Security]][[Category:Information]][[Category:Resilience]] | ||
+ | {{#set:defined by=ECA|defined by=Albania|defined by=Australia|defined by=Austria|defined by=Barbados|defined by=Belgium|defined by=Belize|defined by=Bermuda|defined by=Botswana|defined by=Brazil|defined by=Bulgaria|defined by=Burkina-Faso|defined by=Cameroon|defined by=Canada|defined by=Chile|defined by=Colombia|defined by=Costa Rica|defined by=Cuba|defined by=Cyprus|defined by=Croatia|defined by=Czech Republic|defined by=Denmark|defined by=Egypt|defined by=El Salvador|defined by=Estonia|defined by=Eswatini|defined by=Finland|defined by=France|defined by=Germany|defined by=Greece|defined by=Guatemala|defined by=Hungary|defined by=Iceland|defined by=India|defined by=Indonesia|defined by=Islamic Republic of Afghanistan|defined by=Ireland|defined by=Israel|defined by=Italy|defined by=Jamaica|defined by=Japan|defined by=Jordan|defined by=Kenya|defined by=Kingdom of Saudi Arabia|defined by=Kosovo|defined by=Kuwait|defined by=Kyrgyztan|defined by=Latvia|defined by=Lebanon|defined by=Liberia|defined by=Lithuania|defined by=Luxembourg|defined by=North Macedonia|defined by=Malta|defined by=Mexico|defined by=Moldova|defined by=Montenegro|defined by=Morocco|defined by=Mozambique|defined by=Netherlands|defined by=New Zealand|defined by=Nicaragua|defined by=Nigeria|defined by=Norway|defined by=Pakistan|defined by=Papua New Guinea|defined by=Paraguay|defined by=Philippines|defined by=Poland|defined by=Portugal|defined by=Qatar|defined by=Republic of Trinidad & Tobago|defined by=Romania|defined by=Russian Federation|defined by=Rwanda|defined by=Samoa|defined by=Senegal|defined by=Singapore|defined by=Slovenia|defined by=South Africa|defined by=Spain|defined by=Sri Lanka|defined by=Sweden|defined by=Switzerland|defined by=Thailand|defined by=Turkey|defined by=Ukraine|defined by=United States|defined by=Uzbekistan|defined by=Vanuatu|defined by=United Kingdom|defined by=ITU-T|defined by=WEF|defined by=ISO|defined by=NIST|defined by=United States|defined by=DHS|defined by=Scotland|defined by=Victoria|defined by=Isle of Man|defined by=Russian Federation|defined by=ISO|defined by=World Bank|defined by=New South Wales|defined by=Zambia|defined by=Financial Stability Board|defined by=Wales|defined by=Cymru}} | ||
− | [[Category: | + | [[Category:RESIN-Glossary]] |
− | {{#set:defined by= | + | {{#set:defined by=EU}} |
+ | {{#set: Showmainpage=Yes}} |
Revision as of 11:21, 1 April 2024
Contents
- 1 Definitions Cyber Security
- 1.1 European Definitions
- 1.2 Other International Definitions
- 1.3 National Definitions
- 1.3.1 Albania
- 1.3.2 Australia
- 1.3.3 Austria
- 1.3.4 Barbados
- 1.3.5 Belgium
- 1.3.6 Belize
- 1.3.7 Bermuda
- 1.3.8 Botswana
- 1.3.9 Brazil
- 1.3.10 Bulgaria
- 1.3.11 Burkina-Faso
- 1.3.12 Cameroon (Cameroun)
- 1.3.13 Canada
- 1.3.14 Chile
- 1.3.15 Colombia
- 1.3.16 Costa Rica
- 1.3.17 Croatia
- 1.3.18 Cuba
- 1.3.19 Cyprus
- 1.3.20 Czech Republic
- 1.3.21 Denmark
- 1.3.22 Egypt
- 1.3.23 El Salvador
- 1.3.24 Estonia
- 1.3.25 Eswatini
- 1.3.26 Finland
- 1.3.27 France
- 1.3.28 Germany
- 1.3.29 Greece
- 1.3.30 Guatemala
- 1.3.31 Hungary
- 1.3.32 Iceland
- 1.3.33 India
- 1.3.34 Islamic Republic of Afghanistan
- 1.3.35 Indonesia
- 1.3.36 Ireland
- 1.3.37 Israel
- 1.3.38 Italy
- 1.3.39 Jamaica
- 1.3.40 Japan
- 1.3.41 Jordan
- 1.3.42 Kenya
- 1.3.43 Kingdom of Saudi Arabia
- 1.3.44 Kosovo
- 1.3.45 Kuwait
- 1.3.46 Kyrgyztan
- 1.3.47 Latvia
- 1.3.48 Lebanon
- 1.3.49 Liberia
- 1.3.50 Lithuania
- 1.3.51 Luxembourg
- 1.3.52 Malta
- 1.3.53 Mexico
- 1.3.54 Moldova
- 1.3.55 Montenegro
- 1.3.56 Morocco
- 1.3.57 Mozambique
- 1.3.58 Netherlands
- 1.3.59 New Zealand/AOTEAROA
- 1.3.60 Nicaragua
- 1.3.61 Nigeria
- 1.3.62 North Macedonia
- 1.3.63 Norway
- 1.3.64 Pakistan
- 1.3.65 Papua New Guinea
- 1.3.66 Paraguay
- 1.3.67 Philippines
- 1.3.68 Poland
- 1.3.69 Portugal
- 1.3.70 Qatar
- 1.3.71 Republic of Trinidad & Tobago
- 1.3.72 Romania
- 1.3.73 Russian Federation
- 1.3.74 Rwanda
- 1.3.75 Samoa
- 1.3.76 Saudi Arabia
- 1.3.77 Senegal
- 1.3.78 Singapore
- 1.3.79 Slovenia
- 1.3.80 South Africa
- 1.3.81 Spain
- 1.3.82 Sri Lanka
- 1.3.83 Sweden
- 1.3.84 Switzerland
- 1.3.85 Thailand
- 1.3.86 Türkiye
- 1.3.87 Ukraine
- 1.3.88 United Kingdom (UK)
- 1.3.89 United States
- 1.3.90 Uzbekistan
- 1.3.91 Vanuatu
- 1.3.92 Zambia
- 1.4 Regional Definitions
- 1.5 International organisations
- 1.6 International standards
- 1.7 Other Definitions
- 1.8 Dictionary
- 2 Definitions Science of Cyber Security
- 3 See also
- 4 Notes
- 5 References
Definitions Cyber Security
European Definitions
EU
ECA
[BG] Киберсигурност: Всички приети предпазни мерки за защита на ИТ системите и техните данни от неразрешен достъп, атаки и вреди, за да се гарантира тяхната достъпност, поверителност и цялост.
[CS] Kybernetická bezpečnost: Veškerá ochranná a bezpečnostní opatření přijatá na obranu informačních systémů a jejich údajů před neoprávněným přístupem, útokem a poškozením za účelem zajištění jejich dostupnosti, důvěrné povahy a integrity.
[DE] Cybersicherheit: Alle Vorkehrungen und Maßnahmen zum Schutz von IT-Systemen und ihren Daten vor unbefugten Zugriffen, vor Angriffen und vor Schaden, um ihre Verfügbarkeit, Vertraulichkeit und Integrität zu gewährleisten.
[DK] Cybersikkerhed: Alle desikkerhedsforanstaltninger, der er truffet for at beskytte IT systemer og deres data mod uautoriseret adgang, angreb og skader for at sikre deres tilgængelighed, fortrolighed og integritet.
[ES] Ciberseguridad: Conjunto de salvaguardias y medidas adoptadas para defender los sistemas informáticos y sus datos frente a accesos no autorizados, ataques y daños para garantizar su disponibilidad, confidencialidad e integridad.
[NE] Cyberbeveiliging: Alle waarborgen en maatregelen die worden ingevoerd om IT-systemen en hun gegevens te beschermen tegen onbevoegde toegang, aanvallen en schade, teneinde hun beschikbaarheid, vertrouwelijkheid en integriteit te garanderen.
Other International Definitions
World Bank
In a computing context, the term security implies cybersecurity.
National Definitions
Albania
Australia
Cyber security strategies include identity management, risk management and incident management.
New South Wales
Austria
Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. [14]
Barbados
Belgium
Cybersécurité, les actions nécessaires pour protéger les réseaux et les systèmes d’information, les utilisateurs de ces systèmes et les autres personnes exposées aux cybermenaces. [4]
Cybersicherheit“ bezeichnet alle Tätigkeiten, die notwendig sind, um Netz- und Informationssysteme, die Nutzer solcher Systeme und andere von Cyberbedrohungen betroffene Personen zu schützen. [4]
Cybersécurité est la situation où la protection du cyberespace est proportionelle à la cybermenace et aux conséquences possibles de cyberattaques. [17]
Cybersécurité nucléaire: la sécurité des réseaux et systèmes d’information des installations nucléaires et des établissements où des substances radioactives sont produites, fabriquées, détenues ou utilisées, ou où se trouvent des appareils ou installations émettant des rayonnements ionisants ne provenant pas de substances radioactives [19].
Belize
Bermuda
Botswana
Brazil
Cybersecurity is the art to ensure the existence and continuity of the information society of a nation, ensuring and protecting in Cyberspace, their information assets and their critical infrastructure.
Bulgaria
Burkina-Faso
Cameroon (Cameroun)
Canada
Cybersécurité: Protection de données numériques et préservation de l'intégrité de l'infrastructure servant à stocker et à transmettre des données numériques. Plus particulièrement, la cybersécurité englobe l'ensemble des technologies, des processus, des pratiques, des mesures d'intervention et d'atténuation dont la raison d'être est d'empêcher que les réseaux, ordinateurs, programmes et données soient attaqués ou endommagés, ou qu'on y accède sans autorisation, afin d'en assurer la confidentialité, l'intégrité et la disponibilité. [29]
Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. [31]
Chile
Within this set, the main feature to be protected is information confidentiality, integrity and availability which, in turn, create a robust and resilient cyberspace.
Colombia
Cyber security is the ability of the state to minimise the level of risk their citizens from threats or incidents of cyber nature are exposed to.
Costa Rica
Seguridad cibernética: Conservación, a través de políticas, tecnología y educación, de la disponibilidad, confidencialidad e integridad de la información y su infraestructura subyacente a fin de preservar la seguridad de las personas tanto en línea como fuera de línea. [38]
Croatia
Cyber security includes activities and measures to achieve confidentiality, integrity and availability of data and systems in cyberspace. [39]
Cuba
Cyprus
Cybersecurity is the broader security of networked systems that operate in cyberspace. [42]
I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users.
Czech Republic
Cyber security: Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. [44]
Denmark
Egypt
El Salvador
Estonia
Eswatini
Finland
Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -unofficial translation- [51]
France
Cybersecurity: A desired condition for an information system, allowing it to withstand events of malicious origin that are likely to compromise the availability, integrity or confidentiality of data stored, processed or transferred or the services provided by the system. [53]
Cybersécurité: état recherché pour un système d’information lui permettant de résister à des événements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises et des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. [55]
Germany
(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. [58]
(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. [59]
Häufig wird bei der Betrachtung von Cyber-Sicherheit auch ein spezieller Fokus auf Angriffe aus dem Cyber-Raum gelegt.
Greece
Guatemala
Los activos de la organización y los usuarios son los dispositivos informáticos conectados, los usuarios, los servicios/aplicaciones, los sistemas de comunicaciones, las comunicaciones multimedios, y la totalidad de la información transmitida y/o almacenada en el ciberentorno. La ciberseguridad garantiza que se alcancen y mantengan las propiedades de seguridad de los activos de la organización y los usuarios contra los riesgos de seguridad correspondientes en el ciberentorno. Las propiedades de seguridad incluyen una o más de las siguientes: -disponibilidad; - integridad, que puede incluir la autenticidad y el no repudio; - confidencialidad
Hungary
Iceland
India
Islamic Republic of Afghanistan
Indonesia
Ireland
Israel
Italy
Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.
Jamaica
Japan
Cyber Security is a process that protects information by preventing, detecting, and responding to attacks.
Jordan
This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so.
Kenya
Kingdom of Saudi Arabia
Kosovo
Kuwait
Cyber security: is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [78]
Kyrgyztan
Latvia
Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.
Lebanon
Liberia
Lithuania
Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. [84]
Luxembourg
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. [86]
Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité.
Organisation and user assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organisation and user assets against relevant security risks in the cyber environment. The
general security objectives comprise the following: availability;integrity, which may include authenticity and non-repudiation; and confidentiality.
Malta
Cyber security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.
Mexico
Moldova
Montenegro
Morocco
Cybersecurity: Desired situation for an information system enabling it to withstand events arising from cyberspace that may compromise the availability, integrity or confidentiality of the data stored, processed or transmitted.
Mozambique
Netherlands
Cybersecurity: the full spectrum of measures designed to reduce relevant cyber risks to an acceptable level. This also includes dealing with risks of damage to or failure of digital systems and the availability, integrity and confidentiality of data. Measures may focus on the prevention of cyber incidents and – if a cyber incident does occur – on detection, damage limitation and recovery. What constitutes an acceptable level of risk will be determined in a risk assessment. [94]
Cyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. [100]
Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of
the confidentiality and/or integrity of information stored in the ICT systems.
New Zealand/AOTEAROA
Nicaragua
Nigeria
North Macedonia
Norway
Digital sikkerhet handler om beskyttelse av «alt» som er sårbart fordi det er koblet til eller på annen måte avhengig av informasjons- og kommunikasjonsteknologi. Brukes synonymt med begrepene IKT-sikkerhet og cybersikkerhet. [111]
Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. [113]
Pakistan
Papua New Guinea
Paraguay
Philippines
Poland
Cyber RP (RP security in cyberspace) is the process of ensuring the safe operation of in cyberspace state as a whole, its structure, individuals and legal persons, including companies and other entities without legal personality, as well as at their disposal ICT systems and information resources in the global cyberspace. [127]
Portugal
Qatar
مجموعة ا أ لدوات والسياسات والمفاهيم وا إ لجراءات ا أ لمنية والمبادئ التوجيهية ومنهجيات إدارة المخاطر وا إ لجراءات والتدريب وأفضل الممارسات وسبل التأمي ن والتقنيات ال ت ي يمكن استخدامها لحماية بيئة الفضاء ا إ للك ترو ني وأصول[131]
Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: confidentiality, integrity (which may include authenticity and non-repudiation), and availability.
Republic of Trinidad & Tobago
La ciberseguridad es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. [132]
Romania
Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. [133]
Russian Federation
Cyber security (RAW TRANDLATION): a set of conditions in which all the components are protected from maximum possible number of cyber threats and impacts of unwanted consequences.
информационная инфраструктура: совокупность технических средств и систем формирования, преобразования, передачи, использования и хранения информации. [135]
Rwanda
Cyber security: protection of computer systems from theft of, damage to their hardware, software or information as well as from disruption or misdirection of the services they provide.
Cyber sécurité: protection des systèmes informatiques contre le vol de leurs matériel, logiciels ou informations ou dommages à leur encontre ainsi que contre la perturbation ou la mauvaise orientation des services qu’ils fournissent. [136]
Samoa
Saudi Arabia
Senegal
Singapore
Slovenia
South Africa
Spain
Sri Lanka
Sweden
Switzerland
Cyber-Sicherheit: Anzustrebender Zustand innerhalb des Cyber-Raums, bei dem die Kommunikation und der Datenaustausch zwischen Informations- und Kommunikationsinfrastrukturen wie ursprünglich beabsichtigt funktionieren. Dieser Zustand wird mit Massnahmen der Informationssicherheit und der Cyber-Defence erreicht. [148]
Cybersécurité: Situation visée au sein du cyberespace dans laquelle la communication et l’échange de données entre les infrastructures d’information et de communication fonctionnent comme prévu. Cette situation est atteinte grâce aux mesures en matière de sécurité de l’information et à la cyberdéfense. [149]
Cyber sicurezza: Stato auspicabile nel cyberspazio in cui le comunicazioni e lo scambio di dati tra le infrastrutture TIC funzionano come previsto originariamente. Questo stato si consegue adottando misure di sicurezza delle informazioni e di cyber difesa. [150]
Thailand
Türkiye
Cyber security: Protection of information systems forming cyber space from attacks, assuring confidentiality, integrity and availability of information/data processed in this environment, detection of attacks and cyber security incidents, activation of counter-response mechanisms and recovering systems to conditions prior the cyber security incident. [153]
Ukraine
{machine translation} cybersecurity - the protection of the vital interests of man and citizen, the society and the state during the use of cyberspace, which ensures the sustainable development of the information society and the digital communicative environment, timely detection, prevention and neutralisation of real and potential threats to the national security of Ukraine in cyberspace. [155]
United Kingdom (UK)
United States
DHS
Financial Stability Board
NIA
NIPP
NIST
Synonymous with security controls and safeguards.
DoD
Uzbekistan
кибербезопасность (объектов) критической информационной инфраструктуры — состояние защищенности, обеспечивающее устойчивое функционирование объекта критической информационной инфраструктуры и защиту от нарушения, которое может привести к возникновению инцидента кибербезопасности на объекте критической информационной инфраструктуры.
(Cybersecurity (objects) of critical information infrastructure is a state of security that ensures the stable operation of a critical information infrastructure facility and protection against a breach that may lead to a cybersecurity incident at a critical information infrastructure facility) [163]
киберҳимоя — киберхавфсизлик ҳодисаларининг олдини олишга, киберҳужумларни аниқлашга ва улардан ҳимоя қилишга, киберҳужумларнинг оқибатларини бартараф этишга, телекоммуникация тармоқлари, ахборот тизимлари ҳамда ресурслари фаолиятининг барқарорлигини ва ишончлилигини тиклашга қаратилган ҳуқуқий, ташкилий, молиявий-иқтисодий, муҳандислик-техник чора-тадбирлар, шунингдек, маълумотларни криптографик ва техник жиҳатдан ҳимоя қилиш чора-тадбирлари мажмуи.
(Cyber protection - a set of legal, organizational, financial, economic, engineering and technical measures, as well as measures of cryptographic and technical data protection aimed at preventing cybersecurity incidents, detecting cyber attacks and protecting against them, eliminating the consequences of cyber attacks, restoring stability and reliability of telecommunication networks, information systems and resources) [164]
Vanuatu
Zambia
Regional Definitions
Isle of Man
More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability.
International organisations
World Economic Forum
International standards
ISO/IEC
ITU-T
Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.
IETF
Other Definitions
Scotland
Cymru/Wales
Victoria (Australia)
East-West Institute (Russia-US)
Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. [175]
Academic
Dictionary
Definitions Science of Cyber Security
Academic
See also
Notes
References
- ↑ law and publications EUR-Lex EUR-Lex - COM:2017:477:FIN - EN
- ↑ law and publications EUR-Lex EUR-Lex - 2017/0225 (COD) LEX 1899 - EN
- ↑ Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 07/02/2013
- ↑ 4.00 4.01 4.02 4.03 4.04 4.05 4.06 4.07 4.08 4.09 4.10 4.11 4.12 4.13 4.14 4.15 4.16 4.17 4.18 4.19 4.20 4.21 4.22 4.23 4.24 4.25 4.26 4.27 4.28 REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act)
- ↑ Directive 2022/2555 Measures for a high common level of security of network and information systems across the Union, repealing Directive (EU) 2016/1148
- ↑ European Court of Auditors, Challenges to effective EU cybersecurity policy, Briefing Paper, March 2019
- ↑ Cyber Security Glossary, World Bank (2015)
- ↑ PROJEKT LIGJ PËR SIGURINË KIBERNETIKE
- ↑ ENERGY REGULATOR AUTHORITY REGULATION ON CYBER SECURITY OF CRITICAL INFRASTRUCTURES IN THE POWER SECTOR
- ↑ Rights and Protections on Cyber Security, Australian Attorney-General’s Department
- ↑ Annual Reports AG
- ↑ NSW Government Cyber Security Strategy
- ↑ Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
- ↑ Österreichische Strategie für Cyber Sicherheit (2013)
- ↑ Emergency Procedures: From Plan to Practice
- ↑ Cyber Security Strategy.be (Nederlands) (2012)
- ↑ Cyber Security Strategy.be (Francais) (2012)
- ↑ 5APRIL2019.—Wethoudendewijzigingvandewetvan15april1994 betreffende de bescherming van de bevolking en van het leefmilieu tegen de uit ioniserende stralingen voortspruitende gevaren en betreffende het Federaal Agentschap voor Nucleaire Controle betreffende de nucleaire cyberbeveiliging (2019)
- ↑ 5 AVRIL 2019. — Loi portant modification de la loi du 15 avril 1994 relative à la protection de la population et de l’environnement contre les dangers resultant des rayonnements ionisants et relative à l’Agence fédérale de Controle nucleaire concernant la cybersecurité nucleaire (2019)
- ↑ National Cybersecurity Strategy - Towards A Secure Cyberspace 2020-2023 (2020)
- ↑ Bermuda Cybersecurity Strategy 2018-2022
- ↑ National Cybersecurity Strategy (2021)
- ↑ GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Portaria Nº 45, de 8 de setembro de 2009.
- ↑ „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
- ↑ Plan National de Cybersécurité (2010)
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ Canada’s Cyber Security Strategy: Canada's Vision for Security and prosperity in the digital age (2018)
- ↑ Stratégie nationale de cybersécurité: Vision du canada pour la sécurité et la prospérité dans l'ère numérique (2018)
- ↑ Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
- ↑ Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
- ↑ BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile
- ↑ Chile Política Nacional de Ciberseguridad (2017)
- ↑ Chilean National Cybersecurity Policy (2017)
- ↑ Conpes 3510
- ↑ Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)
- ↑ Estrategia Nacional de Ciberseguridad de Costa Rica (2023-2027)
- ↑ 38.0 38.1 Estrategia Nacional de Ciberseguridad de Costa Rica (2017)
- ↑ National Cyber Security Strategy draft (2015)
- ↑ Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio
- ↑ Στρατηγική Κυβερνοασφάλειας της Κυπριακής Δημοκρατίας (23 April 2012)
- ↑ Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)
- ↑ Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)
- ↑ Výkladový slovník kybernetické bezpečnosti (2013)
- ↑ Danish Cyber Security Strategy, 2014
- ↑ Ministry of Communications and Information Technology (MCIT) - Cyber Security
- ↑ (Draft) Ley de ciberseguridad
- ↑ Cyber Security Strategy, Estonian Ministry of Defence, 2008.
- ↑ ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
- ↑ Finlands' Cyber Security Strategy
- ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- ↑ Méthode de classification et mesures principales, ANSSI (2014)
- ↑ Classification Method and Key Measures, ANSSI (2014)
- ↑ Information systems defence and security: France's Strategy
- ↑ La Stratégie de la France en matière de défense et de sécurité des systèmes d’information (2011)
- ↑ DRAFT Cyber-Sicherheitsstrategie für Deutschland 2021
- ↑ Cyber-Sicherheitsstrategie für Deutschland 2016
- ↑ Protection of Critical Infrastructures, BMI.
- ↑ UP KRITIS, BSI, 2014
- ↑ BSI Glossar
- ↑ La Estrategia Nacional de Seguridad Cibernética (June 2018)
- ↑ Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
- ↑ Icelandic National Cyber Security Strategy 2022–2037 (2022)
- ↑ Information Technology Act Ammendment (2008)
- ↑ National Cyber Security Strategy of Afghanistan (2014)
- ↑ Indonesia National Cyber Security Strategy development (presentation), 2016
- ↑ Advancing National Cyberspace Capabilities (2011)
- ↑ IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
- ↑ Jamaica's National Cyber Security Strategy
- ↑ 重要インフラのサイバーセキュリティを 向上させるためのフレームワーク (2014)
- ↑ National Cyber Security Strategy (2018-2023)
- ↑ Kenya's National Cyber Security Strategy
- ↑ GUIDELINES ON CYBERSECURITY FOR PAYMENT SERVICE PROVIDERS, AUGUST 2018, Kenya
- ↑ Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
- ↑ Cyber Security Framework Saudi Arabian Monetary Authority Version 1.0 May 2017
- ↑ Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019
- ↑ الاستراتيجية الوطنية للأمن السيبراني لدولة الكويت (2017-2020)
- ↑ National Cyber Security Strategy 2017-2020
- ↑ СТРАТЕГИЯ кибербезопасности Кыргызской Республики на 2019-2023 годы
- ↑ Latvia's National Cyber Security Strategy
- ↑ Lebanon Cyber Security Strategy v2
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019
- ↑ LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius
- ↑ Stratégie nationale en matière de cyber sécurité II (2015)
- ↑ National Cybersecurity Strategy II (2015)
- ↑ Malta Cyber Security Strategy 2016
- ↑ Estragia Nacional de Ciberseguridad (November 2017)
- ↑ NATIONAL STRATEGY for information society development “Digital Moldova 2020” (2013)
- ↑ NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
- ↑ STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011
- ↑ Estratégia Nacional de Segurança Cibernética de Moçambique (2021-2024)
- ↑ Nederlandse Cybersecurity Strategie 2022-2028: Ambities en acties voor een digitaal veilige samenleving
- ↑ Netherlands Cyber Security Strategy 2022-2028: Ambitions and actions for a digitally secure society
- ↑ Cyber Security Beeld Nederland 2020
- ↑ Nederlandse Cybersecurity Agenda 2018
- ↑ Cyber Security Beeld Nederland 2018
- ↑ National Cybersecurity Agenda: A cyber secure Netherlands (2018)
- ↑ Nationale Cybersecurity Strategie 2: van bewust naar bekwaam
- ↑ National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ New Zealand’s Cyber Security Strategy (2019)
- ↑ New Zealand’s Cyber Security Strategy (2011)
- ↑ DE APROBACIÓN DE LA “ESTRATEGIA NACIONAL DE CIBERSEGURIDAD 2020-2025” (asamblea.gob.ni)
- ↑ National Cyber Security Strategy Nigeria (2014)
- ↑ DRAFT ACTION PLAN FOR IMPLEMENTATION OF THE NATIONAL CYBERSECURITY STRATEGY 2019
- ↑ НАЦИОНАЛНА СТРАТЕГИЈА ЗА САЈБЕР БЕЗБЕДНОСТ НА РЕПУБЛИКА МАКЕДОНИЈА 2018 -2022
- ↑ National Cyber Security Strategy of the Republic of Macedonia (2018)
- ↑ National Cyber Security Strategy for Norway (2019)
- ↑ Nasjonal strategi for digital sikkerhet (2019)
- ↑ Cyber Security Strategy for Norway (2012)
- ↑ Nasjonal strategi for informasjonssikkerhet (2012)
- ↑ draft BILL to provide for the establishment of a National Cyber Security Council
- ↑ Cyber Security Strategy for Telecom Sector 2023-2028
- ↑ National Cyber Security Policy 2021
- ↑ Papua New Guinea Cybercrime Policy
- ↑ National Cyber Security Strategy (2020)
- ↑ Plan Nacional de Ciberseguridad, República del Paraguay, 2016
- ↑ Cybercrime Prevention Act of 2012 (Pinoy Version) Philippines
- ↑ National Cyber Security Plan (Working Draft v1.13 as of December 2016)
- ↑ Republic Act No. 10175, 2012
- ↑ National Cyber Security Plan (May 2017)
- ↑ DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
- ↑ NHS Cyber security glossary
- ↑ U S TAWA z dnia o krajowym systemie cyberbezpieczeństwa / Polish (draft) law on the national cybersecurity system (2018)
- ↑ Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warsaw (2015)
- ↑ (MINI)SŁOWNIK BBN: Propozycje nowych terminów z dziedziny bezpieczeństwa (2015) - proposed definition
- ↑ Quadro Nacional de Referência para a Cibersegurança
- ↑ QATAR National Cyber Security Strategy (May 2014)
- ↑ الاستراتيجية الوطنية للأمن السيبراني QATAR NCSS - Arabic version (May 2014)
- ↑ Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)
- ↑ Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
- ↑ КОНЦЕПЦИЯ СТРАТЕГИИ КИБЕРБЕЗОПАСНОСТИ РОССИЙСКОЙ ФЕДЕРАЦИИ (Draft Cyber Security Strategy 2016)
- ↑ Конвенция об обеспечении международной информационной безопасности (концепция)
Convention on ensuring international information security; draft 2015 - ↑ https://cyber.gov.rw/documentation/ Rwanda cybercrime law
- ↑ National Information and Communication Technology in Education Policy 2018 - 2023
- ↑ Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ (draft) Cybersecurity Bill 2017
- ↑ Strategija kibernetske varnosti (2016)
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 39475, 4 Desember 2015
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010
- ↑ CIBERSEGURIDAD. RETOS Y AMENAZAS A LA SEGURIDAD NACIONAL EN EL CIBERESPACIO, MINISTERIO DE DEFENSA (2010)
- ↑ Cyber Security bill 2019
- ↑ Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)
- ↑ SN002 - National strategy for Switzerland’s protection against cyber risks (NCS) 2018-2022 (2018)
- ↑ SN002 - Nationale Strategie zum Schutz der Schweiz vor Cyber-Risiken (NCS) 2018-2022 (2018)
- ↑ SN002 - Stratégie nationale de protection de la Suisse contre les cyberrisques (SNPC) 2018-2022 (2018)
- ↑ SN002 - Strategia nazionale per la protezione della Svizzera contro i cyber-rischi (SNPC) 2018-2022 (2018)
- ↑ National Cybersecurity Bill (DRAFT approved by the Cabinet on 6 January 2015), Unofficial translation by Thai Netizen Network – March 2015
- ↑ UlUSAL SİBER GÜVENLİk STRATEJİSİ VE
- ↑ Turkey's National Cyber Security Strategy 2016-2019 (2016)
- ↑ Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
- ↑ ЗАКОН УКРАЇНИ - Про основні засади забезпечення кібербезпеки України / THE LAW OF UKRAINE: About the basic principles of providing cyber security of Ukraine 2163-19
- ↑ National Cyber Security Strategy 2016, HM Government
- ↑ 157.0 157.1 DHS/NICSS Glossary
- ↑ Financial Stability Board, Cyber Lexicon (Nov. 12, 2018)
- ↑ National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, 26 April 2010.
- ↑ National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009
- ↑ NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
- ↑ Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
- ↑ Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”
- ↑ Presidential Resolution No. PP-167 dated May 31, 2023, “On additional measures to improve the system of cybersecurity of critical information infrastructure facilities of the Republic of Uzbekistan”
- ↑ National Cybersecurity Strategy 2030
- ↑ National Cyber Security Policy
- ↑ Isle of Man National Cyber Security Strategy (2018-2022)
- ↑ WEF Partnering for Cyber Resilience Guidelines 2012
- ↑ ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity
- ↑ 170.0 170.1 170.2 170.3 170.4 ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205
- ↑ IETF RFC449 Internet Security Glossary 2
- ↑ Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland
- ↑ Strategaeth Seiberddiogelwch Llywodraeth: Adeiladu sector cyhoeddus seibergadarn 2022-2030
- ↑ Cyber Security Strategy Victoria (2017)
- ↑ RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS
- ↑ Clark, D., Berson, T., & Lin, H. S. (Eds.) (2014). At the nexus of cybersecurity and public policy. Computer Science and Telecommunications Board, National Research Council, Washington DC: The National Academies Press.
- ↑ Cybersecurity Woordenboek 2021
- ↑ Alexander Kott, Science of Cyber Security as a System of Models and Problems (2015)