IEC TS 62351-2:2008
(Main)Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
IEC 62351-2:2008 (E) covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined.
This publication is of core relevance for Smart Grid.
General Information
Buy Standard
Standards Content (Sample)
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
IEC/TS 62351-2:2008(E)
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by
any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or
IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.
Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de la CEI ou du Comité national de la CEI du pays du demandeur.
Si vous avez des questions sur le copyright de la CEI ou si vous désirez obtenir des droits supplémentaires sur cette
publication, utilisez les coordonnées ci-après ou contactez le Comité national de la CEI de votre pays de résidence.
IEC Central Office
3, rue de Varembé
CH-1211 Geneva 20
Switzerland
Email: inmail@iec.ch
Web: www.iec.ch
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.
ƒ Catalogue of IEC publications: www.iec.ch/searchpub
The IEC on-line Catalogue enables you to search by a variety of criteria (reference number, text, technical committee,…).
It also gives information on projects, withdrawn and replaced publications.
ƒ IEC Just Published: www.iec.ch/online_news/justpub
Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available
on-line and also by email.
ƒ Electropedia: www.electropedia.org
The world's leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions
in English and French, with equivalent terms in additional languages. Also known as the International Electrotechnical
Vocabulary online.
ƒ Customer Service Centre: www.iec.ch/webstore/custserv
If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service
Centre FAQ or contact us:
Email: csc@iec.ch
Tel.: +41 22 919 02 11
Fax: +41 22 919 03 00
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
PRICE CODE
XA
ICS 33.200 ISBN 2-8318-9956-7
– 2 – TS 62351-2 © IEC:2008(E)
CONTENTS
FOREWORD.9
1 Scope and object.11
2 Terms and definitions .11
2.1 Glossary references and permissions .11
2.2 Glossary of security and related communication terms .13
2.2.1 Abstract Communication Service Interface (ACSI).13
2.2.2 Access .13
2.2.3 Access Authority .13
2.2.4 Access Control.13
2.2.5 Access Control List (ACL) .13
2.2.6 Accountability .13
2.2.7 Adequate Security.13
2.2.8 Advanced Encryption Standard (AES) .14
2.2.9 Alarm .14
2.2.10 Application Layer .14
2.2.11 Association .14
2.2.12 Assurance.14
2.2.13 Asymmetric Cipher.14
2.2.14 Asymmetric Cryptography .14
2.2.15 Asymmetric Key Pair.14
2.2.16 Attack .14
2.2.17 Audit .15
2.2.18 Audit Log .15
2.2.19 Audit Record Field .15
2.2.20 Audit Trail .15
2.2.21 Authentic Signature.15
2.2.22 Authentication.15
2.2.23 Authorization.15
2.2.24 Authorization Process .15
2.2.25 Authorized User .16
2.2.26 Availability .16
2.2.27 Back Door .16
2.2.28 Bandwidth.16
2.2.29 Biometric .16
2.2.30 Block Cipher .16
2.2.31 Boundary Protection.16
2.2.32 Buffer Overflow .16
2.2.33 Bump-in-the-Stack .17
2.2.34 Bump-in-the-Wire.17
2.2.35 Call Back .17
2.2.36 Certificate .17
2.2.37 Certificate Management .17
2.2.38 Certificate Revocation List (CRL) .17
2.2.39 Certification .17
2.2.40 Certification Authority (CA) .18
TS 62351-2 © IEC:2008(E) – 3 –
2.2.41 Chain of Custody .18
2.2.42 Challenge Handshake Authentication Protocol (CHAP) .18
2.2.43 Challenge-Response, Challenge-Response Protocol.18
2.2.44 Checksum.18
2.2.45 Cipher.18
2.2.46 Ciphertext .19
2.2.47 Cleartext .19
2.2.48 Client .19
2.2.49 Compromise.19
2.2.50 Computer Emergency Response Team (CERT).19
2.2.51 Computer Virus .19
2.2.52 Confidentiality .19
2.2.53 Conformance Test.19
2.2.54 Control Network .20
2.2.55 Control System .20
2.2.56 Control System Operations .20
2.2.57 Cookie .20
2.2.58 Countermeasure .20
2.2.59 Cracker .20
2.2.60 Credential .21
2.2.61 Critical System Resource .21
2.2.62 Crypto-algorithm .21
2.2.63 Cryptographic Hash .21
2.2.64 Cryptographic Key .21
2.2.65 Cryptography .21
2.2.66 Cyber.21
2.2.67 Cyber Attack .21
2.2.68 Cyber Security .22
2.2.69 Cyclic Redundancy Check (CRC) .22
2.2.70 Data Authentication.22
2.2.71 Data Corruption .22
2.2.72 Data Encryption Standard (DES).22
2.2.73 Data Integrity .22
2.2.74 Data Object (DO) .22
2.2.75 Data Security .22
2.2.76 Datagram .22
2.2.77 Decode .23
2.2.78 Decrypt .23
2.2.79 Decryption .23
2.2.80 De-Facto Standard.23
2.2.81 Defence in Depth .23
2.2.82 Denial of Service (DoS).23
2.2.83 Designated Approving Authority (DAA).24
2.2.84 Device .24
2.2.85 Diffie-Hellman Key Exchange.24
2.2.86 Digital Certificate .24
2.2.87 Digital Data.24
2.2.88 Digital Signature .24
2.2.89 Digital Signature Standard (DSS).25
– 4 – TS 62351-2 © IEC:2008(E)
2.2.90 Distributed Control System (DCS) .25
2.2.91 Dongle .25
2.2.92 Eavesdropping .25
2.2.93 Electronic Deception .25
2.2.94 Elliptic Curve Cryptography.25
2.2.95 Encrypt .25
2.2.96 Encryption.25
2.2.97 Firewall .26
2.2.98 Flooding.26
2.2.99 Flow Control .
...
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
IEC/TS 62351-2:2008(E)
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by
any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or
IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.
Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de la CEI ou du Comité national de la CEI du pays du demandeur.
Si vous avez des questions sur le copyright de la CEI ou si vous désirez obtenir des droits supplémentaires sur cette
publication, utilisez les coordonnées ci-après ou contactez le Comité national de la CEI de votre pays de résidence.
IEC Central Office
3, rue de Varembé
CH-1211 Geneva 20
Switzerland
Email: inmail@iec.ch
Web: www.iec.ch
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.
ƒ Catalogue of IEC publications: www.iec.ch/searchpub
The IEC on-line Catalogue enables you to search by a variety of criteria (reference number, text, technical committee,…).
It also gives information on projects, withdrawn and replaced publications.
ƒ IEC Just Published: www.iec.ch/online_news/justpub
Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available
on-line and also by email.
ƒ Electropedia: www.electropedia.org
The world's leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions
in English and French, with equivalent terms in additional languages. Also known as the International Electrotechnical
Vocabulary online.
ƒ Customer Service Centre: www.iec.ch/webstore/custserv
If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service
Centre FAQ or contact us:
Email: csc@iec.ch
Tel.: +41 22 919 02 11
Fax: +41 22 919 03 00
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
PRICE CODE
XA
ICS 33.200 ISBN 2-8318-9956-7
– 2 – TS 62351-2 © IEC:2008(E)
CONTENTS
FOREWORD.9
1 Scope and object.11
2 Terms and definitions .11
2.1 Glossary references and permissions .11
2.2 Glossary of security and related communication terms .13
2.2.1 Abstract Communication Service Interface (ACSI).13
2.2.2 Access .13
2.2.3 Access Authority .13
2.2.4 Access Control.13
2.2.5 Access Control List (ACL) .13
2.2.6 Accountability .13
2.2.7 Adequate Security.13
2.2.8 Advanced Encryption Standard (AES) .14
2.2.9 Alarm .14
2.2.10 Application Layer .14
2.2.11 Association .14
2.2.12 Assurance.14
2.2.13 Asymmetric Cipher.14
2.2.14 Asymmetric Cryptography .14
2.2.15 Asymmetric Key Pair.14
2.2.16 Attack .14
2.2.17 Audit .15
2.2.18 Audit Log .15
2.2.19 Audit Record Field .15
2.2.20 Audit Trail .15
2.2.21 Authentic Signature.15
2.2.22 Authentication.15
2.2.23 Authorization.15
2.2.24 Authorization Process .15
2.2.25 Authorized User .16
2.2.26 Availability .16
2.2.27 Back Door .16
2.2.28 Bandwidth.16
2.2.29 Biometric .16
2.2.30 Block Cipher .16
2.2.31 Boundary Protection.16
2.2.32 Buffer Overflow .16
2.2.33 Bump-in-the-Stack .17
2.2.34 Bump-in-the-Wire.17
2.2.35 Call Back .17
2.2.36 Certificate .17
2.2.37 Certificate Management .17
2.2.38 Certificate Revocation List (CRL) .17
2.2.39 Certification .17
2.2.40 Certification Authority (CA) .18
TS 62351-2 © IEC:2008(E) – 3 –
2.2.41 Chain of Custody .18
2.2.42 Challenge Handshake Authentication Protocol (CHAP) .18
2.2.43 Challenge-Response, Challenge-Response Protocol.18
2.2.44 Checksum.18
2.2.45 Cipher.18
2.2.46 Ciphertext .19
2.2.47 Cleartext .19
2.2.48 Client .19
2.2.49 Compromise.19
2.2.50 Computer Emergency Response Team (CERT).19
2.2.51 Computer Virus .19
2.2.52 Confidentiality .19
2.2.53 Conformance Test.19
2.2.54 Control Network .20
2.2.55 Control System .20
2.2.56 Control System Operations .20
2.2.57 Cookie .20
2.2.58 Countermeasure .20
2.2.59 Cracker .20
2.2.60 Credential .21
2.2.61 Critical System Resource .21
2.2.62 Crypto-algorithm .21
2.2.63 Cryptographic Hash .21
2.2.64 Cryptographic Key .21
2.2.65 Cryptography .21
2.2.66 Cyber.21
2.2.67 Cyber Attack .21
2.2.68 Cyber Security .22
2.2.69 Cyclic Redundancy Check (CRC) .22
2.2.70 Data Authentication.22
2.2.71 Data Corruption .22
2.2.72 Data Encryption Standard (DES).22
2.2.73 Data Integrity .22
2.2.74 Data Object (DO) .22
2.2.75 Data Security .22
2.2.76 Datagram .22
2.2.77 Decode .23
2.2.78 Decrypt .23
2.2.79 Decryption .23
2.2.80 De-Facto Standard.23
2.2.81 Defence in Depth .23
2.2.82 Denial of Service (DoS).23
2.2.83 Designated Approving Authority (DAA).24
2.2.84 Device .24
2.2.85 Diffie-Hellman Key Exchange.24
2.2.86 Digital Certificate .24
2.2.87 Digital Data.24
2.2.88 Digital Signature .24
2.2.89 Digital Signature Standard (DSS).25
– 4 – TS 62351-2 © IEC:2008(E)
2.2.90 Distributed Control System (DCS) .25
2.2.91 Dongle .25
2.2.92 Eavesdropping .25
2.2.93 Electronic Deception .25
2.2.94 Elliptic Curve Cryptography.25
2.2.95 Encrypt .25
2.2.96 Encryption.25
2.2.97 Firewall .26
2.2.98 Flooding.26
2.2.99 Flow Control .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.