ABBREVIATIONS
3G | third generation public cellular mobile system |
4G | fourth generation public cellular mobile system |
5G | fifth generation public cellular mobile system |
AES | Advanced Encryption Standard |
AI | artificial intelligence |
ATM | automatic teller machine |
BC | business continuity |
BCI | Business Continuity Institute |
BCM | business continuation management |
BCP | business continuity plan |
BCS | BCS, The Chartered Institute for IT |
BEC | business email compromise |
BGP | Border Gateway Protocol |
BIA | business impact analysis |
BS | British Standard |
BSI | British Standards Institution |
BT | British Telecom |
BYOD | bring your own device |
C2 | command and control |
CA | certification authority |
CAN | Controller Area Network |
CBT | computer-based training |
CCA | Centre for Cyber Assessment |
CCP | Certified Cyber Professional |
CCSC | Certified Cyber Security Consultancy |
CCSK | Certificate of Cloud Security Knowledge |
CCSP | Certified Cloud Security Professional |
CCTV | closed-circuit television |
CEO | chief executive officer |
European Organization for Nuclear Research | |
CERT | computer emergency response team |
CERT/CC | Computer Emergency Response Team/Coordination Centre |
CERT-UK | Computer Emergency Response Team UK |
CES | Consumer Electronics Show |
CFO | chief financial officer |
CI | critical infrastructure |
CII | critical information infrastructure |
CISMP | Certificate in Information Security Management Principles |
CiSP | Cyber Security Information Sharing Partnership |
CISSP | Certified Information Systems Security Professional |
CLI | Calling Line Identifier |
CNI | critical national infrastructure |
COBIT | Control Objectives for Information and Related Technologies |
COPPA | Children’s Online Privacy Protection Act |
CPNI | Centre for the Protection of National Infrastructure |
CSIRT | computer security incident response team |
CSP | communication service provider |
DARPA | Defense Advanced Research Projects Agency |
DDoS | distributed denial of service |
Defra | Department for Environment, Food and Rural Affairs |
DMZ | demilitarised zone |
DNO | distribution network operator |
DNS | domain name system |
DoD | Department of Defense |
DORA | Digital Operational Resilience Act |
DoS | denial of service |
DPA | Data Protection Act |
DR | disaster recovery |
DVLA | Driver and Vehicle Licensing Agency |
ECU | engine control unit |
EDR | event data recorder |
ENISA | European Union Agency for Network and Information Security |
ETSI | European Telecommunications Standards Institute |
EU | European Union |
FAST | Federation Against Software Theft |
FCA | Financial Conduct Authority |
FIPS | Federal Information Processing Standard |
GCHQ | Government Communications Headquarters |
General Data Protection Regulation | |
GP | general practitioner |
GPS | Global Positioning System |
GSM | Global System for Mobile Communications |
HIDS | host intrusion detection system |
HIPAA | Health Insurance Portability and Accountability Act |
HMRC | His Majesty’s Revenue and Customs |
HR | human resources |
HSCIC | Health and Social Care Information Centre |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
HVAC | heating, ventilation and air conditioning |
IA | information assurance |
ICT | information and communications technology |
IDPS | intrusion detection and prevention systems |
IDS | intrusion detection system |
IEC | International Electrotechnical Commission |
IED | improvised explosive device |
IETF | Internet Engineering Task Force |
IFE | in-flight entertainment |
iOS | iPhone Operating System |
IoT | Internet of Things |
IP | intellectual property or Internet Protocol |
IPC | Investigatory Powers Commission |
IPv6 | Internet Protocol Version 6 |
ISAC | information sharing and analysis centre |
ISF | Information Security Forum |
ISMS | information security management system |
ISO | International Organization for Standardization |
ISP | internet service provider |
ISS | International Space Station |
ITU | International Telecommunication Union |
LAN | local area network |
MAC | media access control |
MAM | Mobile Application Management |
MAO | maximum acceptable outage |
MDR | Managed Detection and Response |
MDM | Mobile Data Management |
MTDL | maximum tolerable data loss |
National Cyber Security Centre | |
NHS | National Health Service |
NIDS | network intrusion detection system |
NIS | Network and Information Security |
NISCC | National Infrastructure Security Coordination Centre |
NIST | National Institute of Standards and Technology |
NSA | National Security Agency |
NTP | Network Time Protocol |
OS | operating system |
P2P | peer-to-peer |
PAS | publicly available specification |
PCI DSS | Payment Card Industry Data Security Standard |
PCIRM | Practitioner Certificate in Information Risk Management |
PDCA | Plan–Do–Check–Act |
Portable Document Format | |
PGP | Pretty Good Privacy |
PII | personally identifiable information |
PIN | personal identification number |
PKI | Public Key Infrastructure |
PPs | Professional Practices |
PTZ | point, tilt and zoom |
RFC | Request for Comment |
RIPA | Regulation of Investigatory Powers Act |
RTO | recovery time objective |
SAN | storage area network |
SCADA | Supervisory Control and Data Acquisition |
SIE | security information exchange |
SLA | service level agreement |
SLR | single-lens reflex |
SME | small-to-medium enterprise |
SMTP | Simple Mail Transfer Protocol |
SPoF | single point of failure |
SQL | Structured Query Language |
SSCP | Systems Security Certified Practitioner |
SSH | Secure Socket Shell |
SSID | service set identifier |
TCP | Transmission Control Protocol |
TLP | Traffic Light Protocol |
TLS | Transport Layer Security |
The Onion Router | |
UAC | User Account Control |
UDP | User Datagram Protocol |
UPS | uninterruptible power supply |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VESDA | Very Early Smoke Detection Apparatus |
VoIP | Voice over Internet Protocol |
VPN | virtual private network |
WAN | wide area network |
WAP | wireless access point |
WARP | warning, advice and reporting point |
WEP | Wired Equivalent Privacy |
Wi-Fi | Wireless Fidelity |
WLAN | wireless local area network |
WPA | Wireless Protected Access |
WPA-PSK | Wireless Protected Access Pre-Shared Key |
WPS | Wi-Fi Protected Setup |
GLOSSARY
Some of the following definitions are taken from ISO/IEC 27000:2020 [1], ISO 22301:2019 [2], ISO Guide 73:2009 [3], BS ISO/IEC TR 18044:2004 [4] and ISO/IEC 27032:2012 [5]. A few are not defined in any standards, so I have suggested my own definition.
Access control: The means to ensure that access to assets is authorised and restricted to business and security requirements. [1]
Asset: Any item that has value to the organisation. [1] Assets may be tangible, normally having some physical form such as network equipment, systems and so on, or intangible, having no physical form, such as trademarks or reputation.
Attack: An attempt to destroy, expose, alter, disable, steal or gain unauthorised access to or make unauthorised use of an asset. [1]
Audit: The systematic, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled. [1]
Authentication: The provision of assurance that a claimed characteristic of an entity is correct. [1]
Availability: The property of being accessible and useable upon demand by an authorised entity. [1]
Business continuity (BC): The capability of the organisation to continue delivery of products and services at acceptable predefined levels following a disruptive incident. [2]
Business impact analysis (BIA): The process of analysing activities and the effect that a business disruption might have upon them. [2]
Confidentiality: The property that information is not made available or disclosed to unauthorised individuals, entities or processes. [1]
Consequence: An outcome of an event affecting objectives. [3] Consequences are also referred to as impacts.
Control: A measure that is modifying risk. [3] Controls come in a number of forms – at the strategic level, they can be to modify or reduce the risk; to avoid or terminate it; or to transfer or share it. At the tactical level, control choices are preventative, to stop something from happening; corrective, to fix something that has happened; detective, to discover when something has happened; and directive, to put processes and procedures into place. Finally, operational controls can be physical, such as locks and barriers; procedural, such as change control mechanisms; and technical, such as antivirus software.
Cyber-attack: Aggressive cyber action taken against people, organisations, networks, systems and services, and which is intended to cause loss or damage.
Cyber bullying: Cyber bullying or cyber harassment is simply the act of harassing or bullying a person or group of people using cyber-based methods such as social media, text messaging and the like.
Cybercrime: Criminal activity where services or applications in the cyberspace are used for or are the target of a crime, or where the cyberspace is the source, tool, target or place of a crime. [5]
Cyber espionage: Covert surveillance activity conducted over cyberspace.
Cyber hacktivism: Includes individuals or groups who may be stalking someone in an act of revenge for a perceived grievance, looking to expose some wrongdoing, or a business trying to place their competitors on the wrong foot.
Cyber security: Preservation of confidentiality, integrity and availability of information in the cyberspace. [5]
Cyberspace: Complex environment resulting from the interaction of people, software and services on the internet by means of technology devices and networks connected to it, which does not exist in any physical form.
Cyber terrorism: Includes cyber-attacks by terrorists against nation states, business and commerce. It may also include a terrorist group trying to turn people against their own government, or a nation state trying to unbalance another government. One way or another, it’s all a form of terrorism designed to induce fear or to stir up hatred.
Cyber theft: Theft or a fraudulent activity conducted over cyberspace.
Cyber warfare: An attack on another nation state’s information or infrastructure conducted over cyberspace.
Data: A collection of values assigned to base measures, derived measures and/or indicators. [1]
Disaster recovery (DR): A coordinated activity to enable the recovery of IT systems and networks due to a disruption.
Event: The occurrence or change of a particular set of circumstances. [3]
Exploit or exploitation: A particular form of attack that takes advantage of one or more vulnerabilities, and in which a tried-and-tested method of causing an impact is followed with some rigour. Exploits are similar in nature to processes, but whereas processes are generally benign, exploits are almost always harmful.
Hazards: A source of potential harm. [3] They are frequently viewed as being natural, as opposed to human-made, events, including such things as severe weather and pandemics.
Impact: An outcome of an event affecting objectives. [3] This is also referred to as a consequence.
Information: An organised and formatted collection of data.
Information assurance: The process of ensuring that data is not lost when critical events or incidents occur. It is generally associated with computer, cyber or IT security rather than the somewhat wider meaning of ‘information security’.
Information security: The preservation of confidentiality, integrity and availability of information. [1]
Information security incident: An information security incident is indicated by a single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security. [4]
Integrity: Property of protecting the accuracy and completeness of assets. [1]
Level of risk: The magnitude of a risk expressed in terms of the combination of consequences and their likelihood. [1]
Likelihood: The chance of something happening. [3] The terms ‘likelihood’ and ‘probability’ are often used interchangeably, but ‘likelihood’ is a rather general term denoting a degree of uncertainty, whereas the term ‘probability’ has a more statistical underpinning. The term ‘possibility’ is generally not used, since many things are possible, but the term gives no indication whether or not the event is actually likely to take place.
Malware payload: Malicious code that can cause harm to the victim. Malware payloads can be distributed by methods such as worms and emails. Malware authors typically encrypt the payload to hide the malicious code from malware detection systems.
Monitoring: Determining the status of a system, a process or an activity. [2]
Non-repudiation: The ability to prove the occurrence of a claimed event or action and its originating entities, in order to resolve disputes about the occurrence or non-occurrence of the event or action and involvement of entities in the event. [1]
Objective: A result to be achieved. [1]
Organisation: A person or group of people that has its own functions with responsibilities, authorities and relationships to achieve its objectives. [1]
Policy: The intentions of an organisation as formally expressed by its top management. [1]
Probability: The measure of the chance of occurrence expressed as a number between 0 and 1, where 0 is impossibility and 1 is absolute certainty. [3]
Process: A set of interacting activities, which transforms inputs into outputs. [1]
Resilience: The adaptive capacity of an organisation in a complex and changing environment. [3] Although this definition refers to organisations rather than to information assets, the definition holds true in that where an information asset is properly protected, it is able to resist certain threats. However, to make an information asset fully resilient may be a very complex task and require several different methods of protection.
Review: An activity undertaken to determine the suitability, adequacy and effectiveness of the subject matter to achieve established objectives. [1]
Risk: The effect of uncertainty on objectives. [3] Risk is the product of consequence or impact and likelihood or probability, and is not the same as a threat or hazard. In the context of information risk management, risk is usually taken to have negative connotations. In the wider context of risk, however, it can also be seen in a positive light and referred to as ‘opportunity’.
Risk acceptance: The informed decision to take a particular risk. [3] Risk acceptance (or risk tolerance) is the final choice in risk treatment once all other possible avenues have been explored. This is not the same as ignoring risks – something that should never be done.
Risk analysis: The process to comprehend the nature of risk and to determine the level of risk. [3] This is the part of risk assessment where we combine the impact and the likelihood (or probability) of a risk to calculate the level of risk in order to plot it onto a risk matrix, which allows us to compare risks for their severity and to decide which are in most urgent need of treatment.
Risk appetite: The amount and type of risk that an organisation is willing to pursue or retain. [3]
Risk assessment: The overall process of risk identification, risk analysis and risk evaluation. [3] This includes identification of the information assets and their owners; impact assessment; threat and vulnerability identification; likelihood assessment; risk analysis; production of the risk matrix; and finally risk evaluation.
Risk avoidance: An informed decision to not be involved in, or to withdraw from, an activity in order not to be exposed to a particular risk. [3] Risk avoidance (or risk termination) is one of the four strategic options for risk treatment. Avoiding the risk should normally remove the risk completely but may leave the organisation with other challenges.
Risk evaluation: The process of comparing the results of risk analysis with risk criteria to determine whether the risk and/or its magnitude is acceptable or tolerable. [3]
Risk identification: The process of finding, recognising and describing risks. [3]
Risk management: The coordinated activities to direct and control an organisation with regard to risk. [3]
Risk matrix: A graphical representation of impact versus likelihood used to assist in the prioritisation of risks.
Risk modification: Risk modification (or risk reduction) is the process of treating risk by the use of controls to reduce either the consequence/impact or the likelihood/probability. Sometimes the term ‘risk treatment’ is used in this context, but risk treatment is really a generic term for all four kinds of strategic control. Strangely, ISO Guide 73 does not attempt to define risk modification or reduction, although it does refer to it under the definition of ‘control’.
Risk reduction: See ‘Risk modification’.
Risk retention: The acceptance of the potential benefit of gain, or burden of loss, from a particular risk. [3] Once risks have undergone the risk treatment process, there may be some outstanding risk that cannot be further reduced, transferred or eliminated. This is referred to as ‘residual risk’, and risk retention is the ongoing process of accepting and managing this.
Risk review: The activity undertaken to determine the suitability, adequacy and effectiveness of the subject matter to achieve established objectives. [3]
Risk sharing: A form of risk treatment involving the agreed distribution of risk with other parties. [3]
Risk termination: An informed decision to not be involved in, or to withdraw from, an activity in order not to be exposed to a particular risk. [3]
Risk tolerance: An organisation or stakeholder’s readiness to bear the risk after risk treatment in order to achieve its objectives. [3]
Risk transfer: Risk transfer (or risk sharing) is a form of risk treatment involving the agreed distribution of risk with other parties. [3] One of the strategic risk treatment options is to transfer the risk to or to share it with a third party. Transferring or sharing the risk, however, does not change ownership of the risk; it remains with the organisation itself, regardless of who else shares the risk.
Risk treatment: The process to modify risk. [3] While this may be technically correct, risk modification is just one form of risk treatment, and alternatively may involve risk transference or sharing, or risk avoidance or termination.
Stakeholder: A person or organisation that can affect, be affected by, or perceive themselves to be affected by, a decision or activity. [3]
Threat: The potential cause of an unwanted incident, which may result in harm to a system or organisation. [1] Whereas hazards are generally viewed as natural events, threats are usually human-made, whether accidental or deliberate, and may include such things as sabotage and cyber-attacks.
Threat actions: The actual attacks. These are often not a single isolated event, but can consist of many discrete activities, involving surveillance, initial activities, testing and the final attacks.
Threat actor or threat agent: An individual or group of individuals who actually execute a cyber-attack.
Threat analysis: The process of understanding the level of threat – this is referred to in more detail in Chapter 6.
Threat consequences or impacts: The results or impacts of a cyber-attack, which we deal with in Chapter 4.
Threat source: A person or organisation that wishes to benefit from attacking an information asset. Threat sources often pay or otherwise pressurise threat actors to attack information assets on their behalf.
Threat vectors or attack vectors: Tools, techniques and mechanisms by which an attacker conducts the attack on their target.
Vulnerability: The intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence. [1] Vulnerabilities or weaknesses in or surrounding an asset leave it open to attack from a threat or hazard. Vulnerabilities come in two types – intrinsic vulnerabilities, which are something inherent in the very nature of an information asset, such as the ease of erasing information from magnetic media (whether accidental or deliberate), and extrinsic vulnerabilities, which are those that are poorly applied, such as software that is out of date due to a lack of patching.
Sources of standards information:
[1] ISO/IEC 27000:2020 – Information technology – Security techniques – Information security management systems – Overview and vocabulary.
[2] ISO 22301:2019 – Societal security – Business continuity management systems – Requirements.
[3] ISO Guide 73:2009 – Risk management – Vocabulary.
[4] BS ISO/IEC TR 18044:2004 – Information technology – Security techniques – Information security incident management.
[5] ISO/IEC 27032:2012 – Information technology – Security techniques – Guidelines for cybersecurity.
Note: Permission to reproduce extracts from British and ISO Standards is granted by the British Standards Institution (BSI).
British and ISO Standards can be obtained in PDF or hard copy formats from the BSI online shop: www.bsigroup.com/Shop or by contacting BSI Customer Services for hard copies only: tel: +44 (0)20 8996 9001, email: [email protected]