Dictionary · NERC CIP-005-5 (Electronic Security Perimeters) v5
L2 — definitions grouped by regulatory framework.
Verbs
12 senses- be
To take place; occur; happen.
- keep
To have or maintain possession of something.
- establish
To start something that will last for a long time, or to create or set something in a particular way.
- terminate
To bring to an end; form a conclusion; close.
- require
To specify as compulsory or obligatory.
- grant access
To give someone or some process permission to communicate someone or something, use something, or enter some place.
- deny
To refuse to give or grant something to someone.
- initiate
To cause or facilitate the beginning of a process or action.
- retain
To keep in possession.
- utilize
To put into use or make use of.
- reside
To be present or inherent as an element or quality in something.
- perform
To carry out an action, task, or function.
Nouns
34 senses- Multi-factor authentication
Authentication using two or more factors to achieve authentication. Factors include: • something you know (e.g. password/PIN); • something you have (e.g., cryptographic identification device, token); or • something you are (e.g., biometric).
- access right
The legal entitlement of someone to access something (usually belonging to them).
- audit record
An individual entry in an audit log related to an audited event.
- Authentication
The verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- method
A means or particular procedure for accomplishing or approaching something.
- network
Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.
- non-compliance
The failure to achieve performance criteria of a regulation or authority.
- reason
A cause, explanation, or justification for an action or event.
- requirement
A formal statement of a necessary condition; something needed.
- responsible entity
Any group or even individual with an organization that has been given a particular responsibility for a particular process.
- show
Give expression to.
- session
A session is an encounter between an end-user interface device (e.g., computer, terminal, process) and an application, including a network logon. One user session is the time between starting the application and quitting.
- system
An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.
- three
The Roman numeral of the cardinal number three.
- year
A period of time equal to roughly 365 days.
- access
To instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system or network. Ability to make use of any information system (IS) resource.
- communication
The imparting or exchanging of information by speaking, writing, or using some other medium.
- Compliance
The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.
- Compliance Enforcement Authority
The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.
- cyber asset
Programmable electronic devices and communication networks including hardware, software and data.
- data
A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)
- dial-up connectivity
The state of being connect through standard phone line and analog modem to access the Internet at data transfer rates (DTR) of up to 56 Kbps.
- detect
Discover, investigate, or discern the existence or presence of something.
- relate
Make a logical or causal connection.
- Electronic Access Point
A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter.
- Electronic Security Perimeter
The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.
- Encryption
The process of rendering plaintext unintelligible by converting it to ciphertext that can be read only by those with the knowledge to decode the plaintext from the ciphertext. (SAA: Glossary of Archival and Records Terminology).
- Evidence
Information used to establish facts.
- external routable connectivity
The ability to access a Bulk Electric System Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection.
- include
Make part of a whole or set.
- information
Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- interactive remote access
User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.
- intermediate system
A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter.
- malicious activity
Activity with a harmful intent, such as fraud, theft, blackmail, vandalism, looting, sabotage, etc.