ICS Industry Control System a general term that encompasses several types of

Ics industry control system a general term that

This preview shows page 89 - 91 out of 102 pages.

ICS Industry Control System, a general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures. ICT Information and Communication Technology INCIDENT An assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system; or the information the system processes, stores, or transmits; or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies. 95 INSIDER THREAT A malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. INTERNET OF THINGS The network of physical objects or "things" embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. 96 IP ADDRESS A numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. 97 ITU International Telecommunication Union MALWARE Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code- based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. 98 OCG Organized crime groups OSI MODEL The Open Systems Interconnection model (OSI Model) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. PHISHING Deceiving individuals into disclosing sensitive personal information through deceptive computer-based means. 99 PNT Positioning, navigation, and timing RANSOMWARE A type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
Image of page 89
HCSS REPORT 105 SCADA Supervisory Control and Data Acquisition System - networks or systems generally used for industrial controls or to manage infrastructure such as pipelines and power systems. 100 SPAM Electronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
Image of page 90
Image of page 91

You've reached the end of your free preview.

Want to read all 102 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture