home/dictionary/framework/NERC CIP-006-6 (Physical Security of BES Cyber Systems) v6

Dictionary · NERC CIP-006-6 (Physical Security of BES Cyber Systems) v6

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
64 senses under NERC CIP-006-6 (Physical Security of BES Cyber Systems) v6

Verbs

10 senses
alert

A warning that something has changed, a threshold has been reached, or a failure has occurred.

escort

To accompany someone or something somewhere, especially for protection, guidance, or as a mark of rank.

utilize

To put into use or make use of.

authorize

To give official permission or approval for an undertaking; sanction; empower.

restrict

To confine or put a limit on; keep under control; restrain.

define

To state or describe exactly the nature, scope, or meaning of something.

retain

To keep in possession.

conduct

To manage, control, or organize and carry out.

keep

To have or maintain possession of something.

implement

To put a plan, policy, decision, agreement, etc. into action or effect.

Nouns

54 senses
year

The time during which someone's life continues.

two

The cardinal number that is the sum of one and one or a numeral representing this number.

unescorted access

Not having to be escorted to gain access to a facility, area, or system.

unauthorized access is detected

This Triggering Event takes place when a person, legitimate or unauthorized, accesses a resource that the person is not permitted to use or enters a facility or area the person is not permitted to enter

unauthorized access

Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.

unauthorized physical access

Access to a building, room, site, etc that is not permitted.

visitor access

The processes and mechanisms of ensuring visitors are allowed in specific areas and with specific permissions. Mechanisms such as guarded entries, logged entry, badges, and escorting of visitors are common.

visitor control program

A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to identify, control, and reduce or eliminate the risks inherent to visitors.

visitor log

A paper or electronic record of any non-employee entering a facility, construction site, structure or website.

visitor's name

The given name of an individual who is visiting.

alarm

A warning of danger.

allow

Let someone have or do something.

audit record

An individual entry in an audit log related to an audited event.

cable

A wire or group of wires covered in a protective casing used for transmitting electricity or telecommunication signals.

Compliance

The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.

Compliance Enforcement Authority

The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

cyber asset

Programmable electronic devices and communication networks including hardware, software and data.

cyber incident response plan

The series of actions and processes associated with a security event associated with 'cyberspace' (i.e. the Internet, corporate networks, etc.).

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

date and time

The combination of both the date and the time that something occurred.

day

A period of time that consists of twenty-four hours.

detection

The identifying the existence of malicious content (by signature or heuristic).

Electronic Security Perimeter

The logical border surrounding a network to which Critical Cyber Assets are connected and for which access is controlled.

entrance of a visitor

This Triggering Event takes place when a visitor enters the organization's facility.

entry

A reference to an item in a list, register, or catalog.

entry point

An entry point is a memory address, corresponding to a point in the code of a computer program which is intended as destination of a long jump, be it internal or external.

Evidence

Information used to establish facts.

exit

A way out.

individual

A human being.

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

issue

To give or send out; distribute; supply.

locally mounted hardware

Hardware installed inside the perimeter of a defined location. This includes but is not limited to motion sensors, electronic lock control mechanisms, and badge readers.

log

To record an event or transaction in an organized record-keeping system, usually sequenced in the order they occurred.

maintenance

The process of making repairs and keeping components of an asset in good condition so that the asset may remain in operating condition and last its entire useful life.

monitor

To watch and check the progress or quality of something over a period of time; keep under regular surveillance.

name

The word or phrase by which an individual, family, organization, or thing is known or referred to.

ninety

The cardinal number that is the product of ten and nine.

non-compliance

The failure to achieve performance criteria of a regulation or authority.

non-programmable communication component

An element of a communication system that is not programmable.

operational control

The day-to-day security procedures and mechanisms to protect operational systems. The operational controls consist of the physical, environmental and personnel security controls. These controls deal with the everyday operation of a company or organization to ensure all objectives are achieved.

physical access

The ability of people to physically gain access to a computer system or facility.

physical access control

A mechanism, system, or barrier that prevents unauthorized physical access to an area or a facility.

physical security plan

A formal document that provides an overview of the security requirements for a physical security program and describes the security controls in place or planned for meeting those requirements.

physical access control system

Physical access control enables an authority to control admission to areas and resources in a physical facility. A physical access control system may restrict access via swipe cards, Personal Identity Verification (PIV) 'Smart' cards, and biometric (i.e. fingerprint) readers. Physical access control systems are generally seen as the second layer in the security of a physical facility after fences, doors and barriers.

Physical Access Control system maintenance and testing program

A documented listing of procedures, schedules, roles and responsibilities, and plans to be performed to ensure continued maintenance and testing of the Physical Access Control System.

physical access log

A record of who has accessed something.

physical security perimeter

A type of gate, door, wall, or fence system that is intended to restrict and control the physical access or egress of personnel.

Point Of Contact

This role is focused on being a representative of a group who facilitates communications between two or more groups, organizations, etc. on certain issues. Any individual who coordinates communications between groups, organizations, etc. on certain issues that they work on should be assigned to this role.

requirement

A formal statement of a necessary condition; something needed.

responsible entity

Any group or even individual with an organization that has been given a particular responsibility for a particular process.

show

To demonstrate or prove.

security incident response plan

The steps taken during an incident. An incident response plan brings together and organizes the resources for dealing with any event that harms or threatens the security of information assets. Such an event may be a malicious code attack, an unauthorized access to information or systems, the unauthorized use of services, a denial of service attack, or a hoax.

test

The purpose of this task is to determine if and how well something works.

three

The Roman numeral of the cardinal number three.