Vulnerability

From CIPedia
Revision as of 23:57, 21 September 2016 by Eluiijf (talk | contribs) (United States)
Jump to navigation Jump to search

Definitions

European Definitions

COM(2006)787

A characteristic of an element of the CI’s design, implementation, or operation that renders it susceptible to disruption or destruction by a threat and includes dependencies on other types of infrastructure. [1]

ENISA

Vulnerability (ICT) is The existence of a weakness, design, or implementation error that can lead to an unexpected, undesirable event compromising the security of the computer system, network, application, or protocol involved. [2]


Other International Definitions

CARICOM

Vulnerability is defined as the characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard. [3]


ITU-T

Any weakness that could be exploited to violate a system or the information it contains. [4]


Vulnérabilité: Toute faiblesse qui pourrait être exploitée pour violer un système ou les informations qu'il contient. [5]


Vulnerabilidad: Cualquier debilidad que podría explotarse con el fin de violar un sistema o la información que contiene. [6]


NATO CEP / EAPC

A characteristic of an element of the critical infrastructure’s design, implementation, or operation that renders it susceptible to destruction or incapacitation by a threat. [7]


UNISDR

The characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard. [8]

There are many aspects of vulnerability, arising from various physical, social, economic, and environmental factors. Examples may include poor design and construction of buildings, inadequate protection of assets, lack of public information and awareness, limited official recognition of risks and preparedness measures, and disregard for wise environmental management.

Vulnerability varies significantly within a community and over time. This definition identifies vulnerability as a characteristic of the element of interest (community, system or asset) which is independent of its exposure. However, in common use the word is often used more broadly to include the element’s exposure.

National Definitions

Australia

Vulnerability is the degree of susceptibility and resilience of the community and environment to hazards. [9]


Vulnerability is the degree of loss to a given element at risk or set of such elements resulting from the occurrence of a phenomenon of a given magnitude and expressed on a scale of 0 (no damage) to 1 (total loss). [9]


Brazil

Vulnerabilidade: propriedade intrínseca de algo resultando em suscetibilidade a uma fonte de risco que pode levar a um evento com uma conseqüência. [10]

Vulnerability is the intrinsic property of something resulting in susceptibility to a source of risk that can lead to an event with a result.


Cameroon (Cameroun)

Vulnérabilité: défaut de sécurité se traduisant soit intentionnellement, soit accidentellement par une violation de la politique de sécurité, dans l’architecture d’un réseau de communications électroniques, dans la conception d’un système d’information. [11]


Canada

Vulnerability is the conditions determined by physical, social, economic and environmental factors or processes, which increase the susceptibility of a community to the impact of hazards.

Condition ou ensemble de conditions résultant de facteurs ou de processus physiques, sociaux, économiques et environnementaux qui prédispose une collectivité à subir les effets néfastes des aléas. [12] [13]

It is a measure of how well prepared and equipped a community is to minimize the impact of or cope with hazards.

Czech Republic

Zranitelnost: Slabé místo aktiva nebo řízení, které může být využito hrozbou. [14]

Vulnerability is a weak spot of an asset or control which can be made use of by a threat. [15]


France

(in French) Vulnérabilité: propension d’un milieu, d’un bien ou d’une personne à subir des conséquences dommageables à la suite d’un événement. Elle ne produit pas nécessairement de dommage par elle-même. [16]

Non-official translation: propensity of an environment, a good or a person to suffer from adverse consequences as a result of an event. It does not necessarily produce damage itself.

India

A vulnerability is a weakness that could be exploited to cause damage to the system or the assets it contains. [17]


Japan

脆弱性: システムのセキュリティポリシーを侵害するように攻略される可能性がある、システムの設計/実装/運用管理における欠陥もしくは弱点.

(Cyber) Vulnerability is a flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy. [18]


Kingdom of Saudi Arabia

A vulnerabiliuty is a defect or weakness in system security procedure, design, implementation, or internal control that an attacker can exploit. [19]


Vulnerability is the susceptibility of individuals or a community, services or infrastructure to damage or harm arising from an emergency or other incident. [20]


Luxembourg

Vulnérabilité: Faute, par malveillance ou maladresse, dans les spécifications, la conception, la réalisation, l’installation ou la configuration d’un système, ou dans la façon de l’utiliser. [21]


Netherlands

Een kwetsbaarheid is een eigenschap van een samenleving, organisatie of informatiesysteem (of een onderdeel daarvan) die een kwaadwillende partij de kans geeft om de legitieme toegang tot informatie of functionaliteit te verhinderen en te beïnvloeden, of om die ongeautoriseerd te benaderen. [22]


Nigeria

Vulnerability is the structural weaknesses of the nation’s information systems and critical information infrastructure ranging from technical flaws, porous measures, to human negligence. [23]


Norway

Sårbarhet: (1) Et uttrykk for de problemer et system vil få med å fungere når det utsettes for en uønsket hendelse, og de problemer systemet får med å gjenoppta sin virksomhet etter at hendelsen har inntruffet. (2) Sårbarheten til et system er et uttrykk for de svakheter og mangler som finnes i systemet og spesielle omstendigheter som øker sannsynligheten for at trusler vil materialisere seg i en sikkerhetshendelse. [24]

Vulnerability: (1) The challenges a system will have to face to function when subjected to an adverse event, and challenges related to resuming normal system operation after the event has occurred. (2) The vulnerability of a system is an expression of its weaknesses and flaws and special circumstances that would increase the likelihood that threats will materialise into a security incident. [25]


A system’s vulnerability is reduced by increasing the system’s robustness. Examples of special circumstances can include size, complexity, that many stakeholders are involved, geographical distribution, frequent changes, and exposed location.


Republic of Trinidad & Tobago

The characteristics and circumstances of a community, system or asset that make it susceptible to the damaging effects of a hazard. [26]


Switzerland

A loophole or bug in hardware or software through which attackers can access a system. [27]

(CIIP/ICT-based definition)


United Kingdom

Susceptibility of individuals or community, services or infrastructure to damage or harm arising from an emergency or other incident. [28]

United States

DHS
A physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard. [29]
NIST
A vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. [30]

The document provides several definitions.

DoD
Vulnerability:
1. The susceptibility of a nation or military force to any action by any means through which its war potential or combat effectiveness may be reduced or its will to fight diminished. (JP 3-01)
2. The characteristics of a system that cause it to suffer a definite degradation (incapability to perform the designated mission) as a result of having been subjected to a certain level of effects in an unnatural (man-made) hostile environment. (JP 3-60)
3. In information operations, a weakness in information system security design, procedures, implementation, or internal controls that could be exploited to gain unauthorized access to information or an information system (source: JP 3-13). [31]




Other Definitions

Ontario (Canada)

Vulnerability is the susceptibility of a community, system or asset to the damaging effects of a hazard. [32]

Vulnérabilité: susceptibilité d’une collectivité, d’un système ou d’un bien à subir les effets dommageables d’un danger. [32]


Standard Definition

IETF

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy. [33]


ISO 22300:2012(en)

Intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence. [34]


ISO/IEC 27000:2014

Weakness of an asset or control that can be exploited by one or more threats. [35]


ISO/IEC 29147:2014

Weakness of software, hardware, or online service that can be exploited. [36]


See also

Notes

  1. EC COM(2006) 787 final, Directive of the Council on the identification and designation of European Critical Infrastructure and the assessment of the need to improve their protection, EC, Brussels 12.12.2006.
  2. ENISA Risk Glossary
  3. Caribbean Disaster Emergency Management Agency (CDEMA) Regional Comprehensive Disaster Management Strategy and Results Framework 2014-2024
  4. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X-800.
  5. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T X.800.
  6. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T X.800.
  7. NATO EAPC(SCEPC) lexicon 2003.
  8. 2009 UNISDR Terminology on Disaster Risk Reduction
  9. 9.0 9.1 Australian Emergency Management Glossary, Emergency Management Australia (1998)
  10. GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ ABNT NBR ISO 31000:2009: Gestão de riscos - Princípios e diretrizes. Rio de Janeiro (2009)
  11. LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
  12. [http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/mrgnc-mngmnt-frmwrk/index-eng.aspx An Emergency Management Framework for Canada (Second Edition)
  13. Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
  14. http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
  15. Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)
  16. INSTRUCTION GENERALE INTERMINISTERIELLE RELATIVE A LA SECURITE DES ACTIVITES D’IMPORTANCE VITALE N°6600/SGDSN/PSE/PSN du 7 janvier 2014, PREMIER MINISTRE, SECRETARIAT GENERAL DE LA DEFENSE ET DE LA SECURITE NATIONALE, Direction Protection et Sécurité de l’Etat N° NOR: PRMD1400503J
  17. India's DGQA Cyber Security Policy (2015)
  18. http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
  19. Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
  20. Glossary - Revision to Emergency Preparedness, Cabinet Office (2012)
  21. [From French Glossary]
  22. NCSC, Cyber Security Beeld Nederland 5 (2015)
  23. National Cyber Security Strategy Nigeria (2014)
  24. Nasjonal strategi for informasjonssikkerhet (2012)
  25. Cyber Security Strategy for Norway (2012)
  26. Comprehensive Disaster Management Policy Framework for Trinidad and Tobago
  27. Melani Glossary (n.d.)
  28. Cabinet Office, Lexicon of UK Civil Protection Terminology, Version 2.1.1, February 2013
  29. DHS Risk Lexicon 2010 Edition, September 2010
  30. NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013/NIST SP 800 series
  31. Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
  32. 32.0 32.1 Province of Ontario’s Emergency Management Glossary of Terms
  33. IETF RFC449 Internet Security Glossary 2
  34. ISO 22300:2012(en) Societal security — Terminology
  35. ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
  36. ISO/IEC 29147:2014, Information technology -- Security techniques -- Vulnerability disclosure