Difference between revisions of "Cyber Security"

From CIPedia
Jump to navigation Jump to search
(United States)
(Notes)
Line 267: Line 267:
  
 
[[Category:Security]][[Category:Information]][[Category:Resilience]]
 
[[Category:Security]][[Category:Information]][[Category:Resilience]]
{{#set:defined by=Albania|defined by=Australia|defined by=Austria|defined by=Barbados|defined by=Belgium|defined by=Brazil|defined by=Bulgaria|defined by=Burkina-Faso|defined by=Cameroon|defined by=Canada|defined by=Chile|defined by=Colombia|defined by=Costa Rica|defined by=Cuba|defined by=Cyprus|defined by=Croatia|defined by=Czech Republic|defined by=Denmark|defined by=Egypt|defined by=Estonia|defined by=Finland|defined by=France|defined by=Germany|defined by=Hungary|defined by=India|defined by=Indonesia|defined by=Islamic Republic of Afghanistan|defined by=Israel|defined by=Italy|defined by=Jamaica|defined by=Kenya|defined by=Kingdom of Saudi Arabia|defined by=Kosovo|defined by=Latvia|defined by=Lithuania|defined by=Luxembourg|defined by=Malta|defined by=Moldova|defined by=Montenegro|defined by=Morocco|defined by=Netherlands|defined by=New Zealand|defined by=Nigeria|defined by=Norway|defined by=Pakistan|defined by=Papua New Guinea|defined by=Paraguay|defined by=Philippines|defined by=Poland|defined by=Qatar|defined by=Republic of Trinidad & Tobago|defined by=Romania|defined by=Russian Federation|defined by=Slovenia|defined by=South Africa|defined by=Sweden|defined by=Thailand|defined by=Turkey|defined by=United States|defined by=United Kingdom|defined by=ITU-T|defined by=WEF|defined by=ISO|defined by=NIST|defined by=Scotland|defined by=Russian Federation|defined by=ISO}}
+
{{#set:defined by=Albania|defined by=Australia|defined by=Austria|defined by=Barbados|defined by=Belgium|defined by=Brazil|defined by=Bulgaria|defined by=Burkina-Faso|defined by=Cameroon|defined by=Canada|defined by=Chile|defined by=Colombia|defined by=Costa Rica|defined by=Cuba|defined by=Cyprus|defined by=Croatia|defined by=Czech Republic|defined by=Denmark|defined by=Egypt|defined by=Estonia|defined by=Finland|defined by=France|defined by=Germany|defined by=Hungary|defined by=India|defined by=Indonesia|defined by=Islamic Republic of Afghanistan|defined by=Israel|defined by=Italy|defined by=Jamaica|defined by=Kenya|defined by=Kingdom of Saudi Arabia|defined by=Kosovo|defined by=Latvia|defined by=Lithuania|defined by=Luxembourg|defined by=Malta|defined by=Moldova|defined by=Montenegro|defined by=Morocco|defined by=Netherlands|defined by=New Zealand|defined by=Nigeria|defined by=Norway|defined by=Pakistan|defined by=Papua New Guinea|defined by=Paraguay|defined by=Philippines|defined by=Poland|defined by=Qatar|defined by=Republic of Trinidad & Tobago|defined by=Romania|defined by=Russian Federation|defined by=Slovenia|defined by=South Africa|defined by=Sweden|defined by=Thailand|defined by=Turkey|defined by=United States|defined by=United Kingdom|defined by=ITU-T|defined by=WEF|defined by=ISO|defined by=NIST|defined by=United States|defined by=DHS|defined by=Scotland|defined by=Russian Federation|defined by=ISO}}
  
 
[[Category:RESIN-Glossary]]
 
[[Category:RESIN-Glossary]]
 
{{#set:defined by=EU}}
 
{{#set:defined by=EU}}

Revision as of 13:13, 20 August 2017

Definitions

European Definitions

EU

Cyber-security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber-security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein [1].


National Definitions

Albania

Siguria kibernetike: do të thotë tërësia e mjeteve ligjore, organizative, teknike dhe edukative me qëllim mbrojtjen e hapësirës kibernetike. [2]


Australia

Measures relating to the confidentiality, availability and integrity of information that is processed, stored and communicated by electronic or similar means. [3]


Austria

Cyber security describes the protection of a key legal asset through constitutional means against actor-related, technical, organisational and natural dangers posing a risk to the security of cyberspace (including infrastructure and data security) as well as the security of the users in cyberspace. Cyber security helps to identify, assess and follow up on threats as well as to strengthen the ability to cope with interferences in or from cyber space, to minimise the effects as well as to restore the capacity to act and functional capabilities of the respective stakeholders, infrastructures and services. [4]

Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. [5]


Barbados

Cyber Security refers to the vulnerability of cyber technologies to digital attack. [6]



Belgium

Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van ICT of door misbruik van ICT (be free from danger or damage caused by disturbance or disruption of ICT or misuse of ICT). [7]

Cybersécurité est la situation où la protection du cyberespace est proportionelle à la cybermenace et aux conséquences possibles de cyberattaques. [8]


Brazil

Segurança Cibernética (SegCiber): a arte de assegurar a existência e a continuidade da Sociedade da Informação de uma Nação, garantindo e protegendo, no Espaço Cibernético, seus ativos de informação e suas infra-estruturas críticas. [9]
Cybersecurity is the art to ensure the existence and continuity of the information society of a nation, ensuring and protecting in Cyberspace, their information assets and their critical infrastructure.


Bulgaria

Кибер сигурност: състояние определено и измерено чрез нивото на конфиденциалност, интегритет, достъпност, автентичност и отказоустойчивост на информационните ресурси, системи и услуги. Кибер сигурността се основава на ефективно изграждане и поддръжка на активни и превантивни мерки. [10]


Burkina-Faso

Etat recherché pour un système d’information lui permettant de resister à des évènements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises à des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. [11]


Cameroon (Cameroun)

Cybersécurité: ensemble de mesures de prévention, de protection et de dissuasion d’ordre technique, organisationnel, juridique, financier, humain, procédural et autres actions permettant d’atteindre les objectifs de sécurité fixés à travers les réseaux de communications électroniques, les systèmes d’information et pour la protection de la vie privée des personnes. [12]


Canada

The body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. [13]

Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. [14]


Chile

Ciberseguridad: es tanto una condición caracterizada por un mínimo de riesgos y amenazas a las infraestructuras tecnológicas, los componentes lógicos de la información y las interacciones que se verifican en el ciberespacio, como el conjunto de políticas y técnicas destinadas a lograr dicha condición. [15] [16]


Cybersecurity is described as a condition presenting the least risk for cyberspace –understood as a set of physical and logical infrastructure, and the human interactions taking place in the same. [17]

Within this set, the main feature to be protected is information confidentiality, integrity and availability which, in turn, create a robust and resilient cyberspace.

Colombia

Ciberseguridad: Capacidad del Estado para minimizar el nivel de riesgo al que están expuestos sus ciudadanos, ante amenazas o incidentes de naturaleza cibernética. [18]

Cyber security is the ability of the state to minimise the level of risk their citizens from threats or incidents of cyber nature are exposed to.

Ciberseguridad: es el conjunto de recursos, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión del riesgo, acciones, investigación y desarrollo, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse buscando la disponibilidad, integridad, autenticación, confidencialidad y no repudio, con el fin de proteger a los usuarios y los activos de la organización en el Ciberespacio. [19]



Costa Rica

Ciberseguridad: Conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, practicas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. [20]

Seguridad cibernética: Conservación, a través de políticas, tecnología y educación, de la disponibilidad, confidencialidad e integridad de la información y su infraestructura subyacente a fin de preservar la seguridad de las personas tanto en línea como fuera de línea. [21]



Croatia

Kibernetička sigurnost: obuhvaća aktivnosti i mjere kojima se postiže povjerljivost, cjelovitost i dostupnost podataka i sustava u kibernetičkom prostoru.

Cyber security includes activities and measures to achieve confidentiality, integrity and availability of data and systems in cyberspace. [22]


Cuba

Ciberseguridad: Conjunto de procedimientos de seguridad, medidas organizativas, técnicas y operativas aplicadas para la gestión y protección del uso, procesamiento, almacenamiento y transmisión de datos e información a través de las TIC que interactúan en el ciberespacio. [23]



Cyprus

Η ‘κυβερνοασφάλεια’ αναφέρεται στην ευρύτερη ασφάλεια των δικτυωμένων συστημάτων που λειτουργούν στον κυβερνοχώρο, ως επί το πλείστον δηλαδή συνδεδεμένων στο Διαδίκτυο, και ο όρος αυτός συμπεριλαμβάνει και την ασφαλή χρήση των συστημάτων αυτών από τελικούς χρήστες. [24]

Cybersecurity is the broader security of networked systems that operate in cyberspace. [25]

I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users.

Czech Republic

Souhrn právních, organizačních, technických a vzdělávacích prostředků směřujících k zajištění ochrany kybernetického prostoru. [26]

Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. [27]


Denmark

Cybersikkerhed omfatter beskyttelse imod de sikkerhedsbrud, der opstår som følge af angreb mod data eller systemer via en for - bindelse til et eksternt net eller system. Arbejdet med cybersikker - hed fokuserer således på sårbarheder ved sammenkoblingen mellem systemer, herunder forbindelser til internettet. [28]


Egypt

Cybersecurity is information security applied to computers and computer networks. [29]


Estonia

Cyber Security is an essential precondition for the securing of cyberspace that every operator of a computer, computer network or information system realises the personal responsibility of using the data and instruments of communication at his or her disposal in a purposeful and appropriate manner. [30]


Finland

Cyber security means the desired end state in which the cyber domain is reliable and in which its functioning is ensured. [31]


Kyberturvallisuus: tila, jossa kybertoimintaympäristöstä yhteiskunnan elintärkeille toiminnoille tai muille kybertoimintaympäristöstä riippuvaisille toiminnoille koituvat uhkat ja riskit ovat hallinnassa.

Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -unofficial translation- [32]


France

Cyber Security: The desired state of an information system in which it can resist events from cyberspace likely to compromise the availability, integrity or confidentiality of the data stored, processed or transmitted and of the related services that these systems offer or make accessible. [33]

Cybersécurité: état recherché pour un système d’information lui permettant de résister à des événements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises et des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. [34]


Germany

Cyber-Sicherheit ist die IT-Sicherheit der im Cyber-Raum auf Datenebene vernetzten bzw. vernetzbaren informationstechnischen Systeme. (2016) [35]

(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. [36]

(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. [37]


Hungary

Cyber security is the continuous and planned taking of political, legal, economic, educational, awareness-raising and technical measures to manage risks in cyberspace that transforms the cyberspace into a reliable environment for the smooth functioning and operation of societal and economic processes by ensuring an acceptable level of risks in cyberspace. [38]


India

Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. [39]


Islamic Republic of Afghanistan

Protection of information systems that protect the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents; putting into force the countermeasures against these incidents and then putting these systems back to their original states prior to the cyber security incident. [40]


Indonesia

Cybersecurity: adalah upaya untuk menjaga kerahasiaan, keutuhan, dan ketersediaan informasi pada pada dunia siber, yang juga termasuk otentikasi,non-repudation (nirsangkal), dan akuntabilitas. [41]


Israel

Cybersecurity are policies, security arrangements, actions, guidelines, risk management protocols and technological tools designated to protect cyberspace and allow action to be taken therein. [42]


Italy

Cyber-Security: Condizione in cui il cyber-space risulti protetto rispetto adeventi, di natura volontaria od accidentale, consistenti nell’acquisizione e nel trasferimento indebiti di dati, nella loro modifica o distruzione illegittime ovvero nel blocco dei sistemi informativi, grazie ad idonee misure di sicurezza fisica, logica e procedurale. [43]

Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.

Jamaica

Cyber Security is the implementation of measures to protect ICT infrastructure including critical infrastructure from intrusion, unauthorized access and includes the adoption of policies, protocols and good practices to better govern the use of cyberspace. [44]


Kenya

Cyber Security is defined as the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. [45]


Kingdom of Saudi Arabia

Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. [46]


Kosovo

Siguria kibernetike përgjithësisht iu referohet masave mbrojtëse dhe veprimeve që mund të ndërmerren për të mbrojtur domenin kibernetik, edhe në fushën civile edhe atë ushtarake, nga ato kërcënime që ndërlidhen me to apo që mund të dëmtojnë rrjetet dhe infrastrukturën komunikuese të ndërvarura. Siguria kibernetike përpiqet të ruajë disponueshmërinë dhe integritetin e rrjeteve dhe infrastrukturës,si dhe fshehtësinë e informatave që mbahen në to." [derived from EU definition] [47]



Latvia

Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [48]

Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.

Lithuania

Cyber ​​security is a set of legal, information dissemination, organizational and technical measures to prevent cyber as well as conventional electronic communications networks, information systems and industrial process control systems operating incidents to occur as well as detect, analyze, respond and recover in the event of such incidents. [49]

Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. [50]


Luxembourg

On entend par cybersécurité l’ensemble des outils, politiques, concepts de sécurité, mécanismes de sécurité, lignes directrices, méthodes de gestion des risques, actions, formations, bonnes pratiques, garanties et technologies qui peuvent être utilisés pour protéger le cyberenvironnement et les actifs des organisations et des utilisateurs.[51]

Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. [52]

Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité.
Organisation and user assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organisation and user assets against relevant security risks in the cyber environment. The general security objectives comprise the following: availability;integrity, which may include authenticity and non-repudiation; and confidentiality.

Malta

Cyber ​​security is the safeguards and actions that can be used to protect cyber domain from those threats that are associated with or that may harm its interdependent networks and information infrastructure. [53]

Cyber security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.

Moldova

Cyber security means the state of normality resulted from application of a set of proactive and reactive measures that ensure confidentiality, integrity, availability, authenticity and nonrepudiation of e-information, public and private resources and services in cyberspace. [54]



Montenegro

Cyber security refers to the ISO, Netherlands and ITU-T definitions. [55]


Morocco

Cybersécurité: Situation recherchée pour un système d’information lui permettant de résister à des événements issus du cyberspace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises. [56]

Cybersecurity: Desired situation for an information system enabling it to withstand events arising from cyberspace that may compromise the availability, integrity or confidentiality of the data stored, processed or transmitted.



Netherlands

Cybersecurity is het streven naar het voorkomen van schade door verstoring, uitval of misbruik van ICT en, indien er toch schade is ontstaan, het herstellen hiervan. [57]

Cyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. [58]

Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of the confidentiality and/or integrity of information stored in the ICT systems.

Cyber security is het vrij zijn van gevaar of schade veroorzaakt door verstoring of uitval van ICT of door misbruik van ICT. [59] [60]


New Zealand

Cyber Security is the practice of making the networks that constitute cyber space as secure as possible against intrusions, maintaining confidentiality, availability and integrity of information, detecting intrusions and incidents that do occur, and responding to and recovering from them. [61]


Nigeria

Cyber security provides security for the critical information infrastructure and other critical components of information system within the current state of affairs. [62]


Norway

Cyber Security is the protection of data and systems which are coupled to the Internet. [63]
Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. [64]


Pakistan

“Cyber Security” means the definition as may be developed by the National Cyber Security Council from time to time, given the fast moving dynamism in the subject fields and the need to respond with equivalent enhanced capacity, speed and effectiveness, to the emerging threats to Cyber Security, provided that at all times the definition so developed shall not be over reaching, arbitrary, inconsistent, unique or conflicting in any manner with the globally accepted international best practices, adopted by the leading developed nation states. [65]



Papua New Guinea

Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [66]


Paraguay

Seguridad Cibernética, Ciberseguridad o Seguridad Informática: es el conjunto de medidas preventivas y reactivas de las organizaciones y de los sistemas tecnológicos que permiten resguardar y proteger la información en el medio informático, buscando asegurar la confidencialidad, la disponibilidad e integridad de la misma. [67]



Philippines

Cybersecurity refers to the protection of information systems (hardware and software including associated and support infrastructures), the data within these systems and the services that are provided by these systems from any unauthorized access, harm or misuse whether it includes intentional or accidental or from natural disasters. [68]


Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [69] [70]


Cybersecurity - The ability to protect or defend the use of cyberspace from cyberattacks. The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, organization and users‘ assets. [71]



Poland

Cyberbezpieczeństwo RP (bezpieczeństwo RP w cyberprzestrzeni) – proces zapewniania bezpiecznego funkcjonowania w cyberprzestrzeni państwa jako całości, jego struktur, osób fizycznych i osób prawnych, w tym przedsiębiorców i innych podmiotów nieposiadających osobowości prawnej, a także będących w ich dyspozycji systemów teleinformatycznych oraz zasobów informacyjnych w globalnej cyberprzestrzeni.

Cyber RP (RP security in cyberspace) is the process of ensuring the safe operation of in cyberspace state as a whole, its structure, individuals and legal persons, including companies and other entities without legal personality, as well as at their disposal ICT systems and information resources in the global cyberspace. [72]


Bezpieczeństwo cyberprzestrzeni - proces obejmujący zespół przedsięwzięć organizacyjno-prawnych, technicznych, fizycznych i edukacyjnych mający na celu zapewnienie niezakłóconego funkcjonowania cyberprzestrzeni; część cyberbezpieczeństwa państwa obejmująca zapewnienie bezpiecznego funkcjonowania pozostającej pod jego kontrolą teleinformatycznej infrastruktury krytycznej I wykorzystania strategicznych zasobów informacyjnych państwa. [73]


Qatar

The collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyber environment and organization and user’s assets. [74]

مجموعة ا أ لدوات والسياسات والمفاهيم وا إ لجراءات ا أ لمنية والمبادئ التوجيهية ومنهجيات إدارة المخاطر وا إ لجراءات والتدريب وأفضل الممارسات وسبل التأمي ن والتقنيات ال ت ي يمكن استخدامها لحماية بيئة الفضاء ا إ للك ترو ني وأصول[75]

Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: confidentiality, integrity (which may include authenticity and non-repudiation), and availability.

Republic of Trinidad & Tobago

See ITU-T definition below

La ciberseguridad es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. [76]


Romania

Cyber security is a normality resulting from the application of a set of proactive and reactive measures that ensure the confidentiality, integrity, availability, authenticity and non-repudiation in electronic information, resources and services, public or private, in cyberspace.

Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. [77]


Russian Federation

кибербезопасность – совокупность условий, при которых все составляющие киберпространства защищены от максимально возможного числа угроз и воздействий с нежелательными последствиями. [78]
Cyber security (RAW TRANDLATION): a set of conditions in which all the components are protected from maximum possible number of cyber threats and impacts of unwanted consequences.

информационная инфраструктура: совокупность технических средств и систем формирования, преобразования, передачи, использования и хранения информации. [79]


Saudi Arabia

Cyber Security is the ability to protect or defend the use of cyberspace from cyber-attacks. [80]


Slovenia

Kibernetska varnost je v splošnem smislu opredeljena kot: (a) skupek aktivnosti in drugih ukrepov, tehničnih in ne-tehničnih, katerih namen je zaščititi računalnike, računalniška omrežja, strojno in programsko opremo ter informacije, ki jih le-ta vsebuje in obravnava, kar vključuje programsko opremo in podatke kot tudi druge elemente kibernetskega prostora, pred vsemi grožnjami, vključno z grožnjami nacionalni varnosti; (b) stopnja zaščite, ki jo aktivnosti in ukrepi lahko zagotovijo; (c) združena področja profesionalnih naporov, vključno z raziskavami in razvojem na področju implementiranja in izboljševanja ukrepov ter dvigovanja kakovosti le-teh. [81]


South Africa

Cyber Security is the practice of making the networks that constitute cyberspace secure against intrusions, maintaining confidentiality, availability and integrity of information, detecting intrusions and incidentsthat do occur, and responding and recovering from them. [82]


[old] Cyber Security is the collection of tools, policies, security concepts, security safeguards, guidelines,risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user assets. [83]



Sweden

See ITU-T definition below. [84]


Thailand

Cybersecurity means measures and operations that are conceived in order to maintain national Cybersecurity, enabling it to protect, prevent or tackle circumstances of cyber threats which may affect or pose risks to the service or application of computer network, internet, telecommunications network, or the regular service of satellites in ways that affect national security, which includes military security, domestic peace and order, and economic stability. [85]


Turkey

Siber güvenlik: Siber ortamı oluşturan bilişim sistemlerinin saldırılardan korunmasını, bu ortamda işlenen bilginin gizlilik, bütünlük ve erişilebilirliğinin güvence altına alınmasını, saldırıların ve siber güvenlik olaylarının tespit edilmesini, bu tespitlere karşı tepki mekanizmalarının devreye alınmasını ve sonrasında ise sistemlerin yaşanan siber güvenlik olayı öncesi durumlarına geri döndürülmesini. [86]

Cyber security: Protection of information systems forming cyber space from attacks, assuring confidentiality, integrity and availability of information/data processed in this environment, detection of attacks and cyber security incidents, activation of counter-response mechanisms and recovering systems to conditions prior the cyber security incident. [87]



Cyber Security is the protection of information systems that make up the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents, putting into force the countermeasures against these incidents and then putting these systems back to their states previous to the cyber security incident. [88]


United Kingdom (UK)

Cyber security is the protection of internetconnected systems (to include hardware,software and associated infrastructure), the data on them, and the services they provide, from unauthorised access, harm or misuse. This includes harm caused intentionally by the operator of the system, or accidentally, as a result of failing to follow security procedures or being manipulated into doing so. [89]


United States

DHS
Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. [90]


Cybersecurity is the strategy, policy, and standards regarding the security of and operations in cyberspace, and encompass[ing] the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure. [90]


NIA
The ability to protect or defend the use of cyberspace from cyber attacks. [91]


NIPP
The prevention of damage to, unauthorized use of, or exploitation of, and, if needed, the restoration of electronic information and communications systems and the information contained therein to ensure confidentiality, integrity, and availability; includes protection and restoration, when needed, of information networks and wireline, wireless, satellite, public safety answering points, and 911 communications systems and control systems. [92]


NIST
The ability to protect or defend the use of cyberspace from cyber attacks. [93]

Synonymous with security controls and safeguards.

DoD
Cybersecurity: Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. (DODI 8500.01). [94]



International organisations

World Economic Forum

The analysis, warning, information sharing, vulnerability reduction, risk mitigation and recovery efforts for networked information systems. [95]


International standards

ISO/IEC

“Cybersecurity” or “Cyberspace security” is defined as the “preservation of confidentiality, integrity and availability of information in the Cyberspace. [96]


ITU-T

Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [97]

Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

IETF

Cyber Security: The vulnerability of any computing system, software program, or critical infrastructure, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems. [98]


Other Definitions

Scotland

Cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. [99]


East-West Institute (Russia-US)

Cybersecurity is a property of cyber space that is an ability to resist intentional and unintentional threats and respond and recover.

Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. [100]


Academic

Cyber security is a broad concept which encompasses the technologies, processes, and policies that help to prevent and/or reduce the negative impact of events in cyberspace that can happen as the result of deliberate actions against information technology by a hostile or malevolent actor. [101]


See also

Notes

  1. Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 07/02/2013
  2. PROJEKT LIGJ PËR SIGURINË KIBERNETIKE
  3. Rights and Protections on Cyber Security, Australian Attorney-General’s Department
  4. Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
  5. Österreichische Strategie für Cyber Sicherheit (2013)
  6. Emergency Procedures: From Plan to Practice
  7. Cyber Security Strategy.be (2012)
  8. Cyber Security Strategy.be (2012)
  9. GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Portaria Nº 45, de 8 de setembro de 2009.
  10. „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
  11. Plan National de Cybersécurité (2010)
  12. LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
  13. Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
  14. Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
  15. BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile
  16. Chile Política Nacional de Ciberseguridad (2017)
  17. Chilean National Cybersecurity Policy (2017)
  18. Conpes 3510
  19. Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)
  20. [DRAFT Estrategia Nacional de Ciberseguridad de Costa Rica (2016-2017)]
  21. [DRAFT Estrategia Nacional de Ciberseguridad de Costa Rica (2016-2017)]
  22. National Cyber Security Strategy draft (2015)
  23. Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio
  24. [http://www.ocecpr.org.cy/sites/default/files/ec_doc_stratigikikevernoasfalias_gr_31-5-2013_ce.pdf Στρατηγική Κυβερνοασφάλειας της Κυπριακής Δημοκρατίας (23 April 2012)]
  25. Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)
  26. Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)]
  27. Výkladový slovník kybernetické bezpečnosti (2013)
  28. Danish Cyber Security Strategy, 2014
  29. Ministry of Communications and Information Technology (MCIT) - Cyber Security
  30. Cyber Security Strategy, Estonian Ministry of Defence, 2008.
  31. Finlands' Cyber Security Strategy
  32. Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
  33. Information systems defence and security: France's Strategy
  34. La Stratégie de la France en matière de défense et de sécurité des systèmes d’information (2011)
  35. Cyber-Sicherheitsstrategie für Deutschland 2016
  36. Protection of Critical Infrastructures, BMI.
  37. UP KRITIS, BSI, 2014
  38. Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
  39. Information Technology Act Ammendment (2008)
  40. National Cyber Security Strategy of Afghanistan (2014)
  41. Indonesia National Cyber Security Strategy development (presentation), 2016
  42. Advancing National Cyberspace Capabilities (2011)
  43. IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
  44. Jamaica's National Cyber Security Strategy
  45. Kenya's National Cyber Security Strategy
  46. Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
  47. Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019
  48. Latvia's National Cyber Security Strategy
  49. GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019
  50. LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius
  51. Stratégie nationale en matière de cyber sécurité II (2015)
  52. National Cybersecurity Strategy II (2015)
  53. Malta Cyber Security Strategy 2016
  54. NATIONAL STRATEGY for information society development “Digital Moldova 2020” (2013)
  55. NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
  56. STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011
  57. Nationale Cybersecurity Strategie 2: van bewust naar bekwaam
  58. National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands
  59. Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands
  60. Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands
  61. New Zealand’s Cyber Security Strategy (2011)
  62. National Cyber Security Strategy Nigeria (2014)
  63. Cyber Security Strategy for Norway (2012)
  64. Nasjonal strategi for informasjonssikkerhet (2012)
  65. draft BILL to provide for the establishment of a National Cyber Security Council
  66. Papua New Guinea Cybercrime Policy
  67. Plan Nacional de Ciberseguridad, República del Paraguay, 2016
  68. National Cyber Security Plan (Working Draft v1.13 as of December 2016)
  69. Republic Act No. 10175, 2012
  70. National Cyber Security Plan (May 2017)
  71. DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
  72. Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warsaw (2015)
  73. (MINI)SŁOWNIK BBN: Propozycje nowych terminów z dziedziny bezpieczeństwa (2015) - proposed definition
  74. QATAR National Cyber Security Strategy (May 2014)
  75. الاستراتيجية الوطنية للأمن السيبراني QATAR NCSS - Arabic version (May 2014)
  76. Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)
  77. Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
  78. КОНЦЕПЦИЯ СТРАТЕГИИ КИБЕРБЕЗОПАСНОСТИ РОССИЙСКОЙ ФЕДЕРАЦИИ (Draft Cyber Security Strategy 2016)
  79. Конвенция об обеспечении международной информационной безопасности (концепция)
    Convention on ensuring international information security; draft 2015
  80. Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)
  81. Strategija kibernetske varnosti (2016)
  82. South Africa Cyber Security Policy, Staatskoerant No. 39475, 4 Desember 2015
  83. South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010
  84. Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)
  85. National Cybersecurity Bill (DRAFT approved by the Cabinet on 6 January 2015), Unofficial translation by Thai Netizen Network – March 2015
  86. UlUSAL SİBER GÜVENLİk STRATEJİSİ VE
  87. Turkey's National Cyber Security Strategy 2016-2019 (2016)
  88. Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
  89. National Cyber Security Strategy 2016, HM Government
  90. 90.0 90.1 DHS/NICSS Glossary
  91. National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, 26 April 2010.
  92. National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009
  93. NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
  94. Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
  95. WEF Partnering for Cyber Resilience Guidelines 2012
  96. ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity
  97. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205
  98. IETF RFC449 Internet Security Glossary 2
  99. Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland
  100. RUSSIA-­‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS
  101. Clark, D., Berson, T., & Lin, H. S. (Eds.) (2014). At the nexus of cybersecurity and public policy. Computer Science and Telecommunications Board, National Research Council, Washington DC: The National Academies Press.