home/dictionary/framework/NERC CIP-005-5 (Electronic Security Perimeters) v5

Dictionary · NERC CIP-005-5 (Electronic Security Perimeters) v5

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
46 senses under NERC CIP-005-5 (Electronic Security Perimeters) v5

Verbs

12 senses
be

To take place; occur; happen.

keep

To have or maintain possession of something.

establish

To start something that will last for a long time, or to create or set something in a particular way.

terminate

To bring to an end; form a conclusion; close.

require

To specify as compulsory or obligatory.

grant access

To give someone or some process permission to communicate someone or something, use something, or enter some place.

deny

To refuse to give or grant something to someone.

initiate

To cause or facilitate the beginning of a process or action.

retain

To keep in possession.

utilize

To put into use or make use of.

reside

To be present or inherent as an element or quality in something.

perform

To carry out an action, task, or function.

Nouns

34 senses
Multi-factor authentication

Authentication using two or more factors to achieve authentication. Factors include: • something you know (e.g. password/PIN); • something you have (e.g., cryptographic identification device, token); or • something you are (e.g., biometric).

access right

The legal entitlement of someone to access something (usually belonging to them).

audit record

An individual entry in an audit log related to an audited event.

Authentication

The verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

method

A means or particular procedure for accomplishing or approaching something.

network

Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.

non-compliance

The failure to achieve performance criteria of a regulation or authority.

reason

A cause, explanation, or justification for an action or event.

requirement

A formal statement of a necessary condition; something needed.

responsible entity

Any group or even individual with an organization that has been given a particular responsibility for a particular process.

show

Give expression to.

session

A session is an encounter between an end-user interface device (e.g., computer, terminal, process) and an application, including a network logon. One user session is the time between starting the application and quitting.

system

An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.

three

The Roman numeral of the cardinal number three.

year

A period of time equal to roughly 365 days.

access

To instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system or network. Ability to make use of any information system (IS) resource.

communication

The imparting or exchanging of information by speaking, writing, or using some other medium.

Compliance

The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.

Compliance Enforcement Authority

The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

cyber asset

Programmable electronic devices and communication networks including hardware, software and data.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

dial-up connectivity

The state of being connect through standard phone line and analog modem to access the Internet at data transfer rates (DTR) of up to 56 Kbps.

detect

Discover, investigate, or discern the existence or presence of something.

relate

Make a logical or causal connection.

Electronic Access Point

A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter.

Electronic Security Perimeter

The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.

Encryption

The process of rendering plaintext unintelligible by converting it to ciphertext that can be read only by those with the knowledge to decode the plaintext from the ciphertext. (SAA: Glossary of Archival and Records Terminology).

Evidence

Information used to establish facts.

external routable connectivity

The ability to access a Bulk Electric System Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection.

include

Make part of a whole or set.

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

interactive remote access

User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.

intermediate system

A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter.

malicious activity

Activity with a harmful intent, such as fraud, theft, blackmail, vandalism, looting, sabotage, etc.