home/dictionary/framework/NERC CIP-007-6 (System Security Management) v6

Dictionary · NERC CIP-007-6 (System Security Management) v6

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
88 senses under NERC CIP-007-6 (System Security Management) v6

Verbs

22 senses
address

To deal with an issue.

alert

A warning that something has changed, a threshold has been reached, or a failure has occurred.

review

To examine or evaluate formally with the intent of making changes if necessary.

keep

To have or maintain possession of something.

evaluate

To assess or form an idea of the nature, quality, ability, amount, number, or value of something.

limit

To restrict or assign boundaries to something.

create

To bring something or cause to come into existence; originate; make; design.

update

To modernize or bring up to date.

fail

To break down or cease to work properly.

change

To make, or become different; alter.

generate

To produce or cause something to come about; create.

retain

To keep in possession.

identify

To establish, indicate, or verify who or what someone or something is.

implement

To put a new system into effect.

use

The action of employing something or the state of being put into action for some purpose.

prevent

To keep something from happening or stop someone from doing something.

revise

To look over again and alter something in the light of further evidence.

deploy

To bring or put into action or use.

protect

To shield or defend from danger, harm, injury, loss, destruction, or damage.

mitigate

To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.

inventory

To make a comprehensive complete list of things.

enforce

To compel obedience to, observance of, or compliance with laws, rules, duties, or commitments.

Nouns

66 senses
vulnerability

A weakness in an information system, administrative controls, internal controls, system security practices and procedures, implementation, or physical layout that could be accidentally triggered or intentionally exploited by a threat in order to gain unauthorized access to information or disrupt processing.

access attempt

A process of interaction with a communications system by one or more users to enable initiation of user information transfer. The process begins with the granting of an access request by an access originator, and ends in either successful access or access failure.

account type

A category for various accounts that are on a computer system.

password complexity

A set of rules that defines what set of characters and the amount of characters a password must contain.

password parameter

A setting that defines a condition or requirement that a password must match.

patch

A file containing software or operating system code that is intended to correct a vulnerability, a defect, or to improve the functioning of code.

patch and vulnerability management process

One of the many process associated with the patching of software applications and the situations when an organization is forced to make emergency configuration changes that may reduce functionality to protect the organization from exploitation of the vulnerability.

port range

In computer networking, a designated range of port numbers. Port numbers are divided into three ranges: well-known ports, registered ports, and dynamic or private ports.

process

A particular series of actions or steps to bring about a certain outcome; series of procedures.

requirement

A formal statement of a necessary condition; something needed.

responsible entity

Any group or even individual with an organization that has been given a particular responsibility for a particular process.

Risk Mitigation Plan

This record contains detailed proposals intended to reduce the risks to a critical asset, typically including actions or countermeasures designed to counter the threats to assets.

security event

The unauthorized access to a facility or to information. A breach of established security systems.

security patch

Computer code intended to repair or lessen the impact of vulnerabilities within application software.

security incident

An adverse event where a threat or exploit may compromise a computer system and cause: loss of data confidentiality, disruption of system or data integrity, or disruption or denial of availability of the system and/or data.

shared account

A single local account created for a group, with one user name and one password.

show

To demonstrate or prove.

signature

A recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system.

source

The place, person, or thing where something begins or comes into being.

threshold

The level which must be exceeded in order for a certain reaction, phenomenon, result, or condition to occurred or be manifested.

test

To ascertain the performance, reliability, or quality of something.

time frame

A specified period of time for something to be done or take place.

threat

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.

track

Follow the course, trail, or progress of.

unsuccessful authentication attempt

A failed attempt to receive authentication to access a system.

applicability

The degree to which something is applicable or relevant.

apply

Bring or put into operation or practical use.

audit log

A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

Audit Log event

Any of the various triggering actions that cause an application to write a new entry into the log.

audit record

An individual entry in an audit log related to an audited event.

Authentication

The verification of the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

authorized access

Access to system components that (a) has been approved by a person designated to do so by management and (b) does not compromise segregation of duties, confidentiality commitments, or otherwise increase risk to the system beyond the levels approved by management (that is, access is appropriate).

computer port

A computer port is a connection point or interface between a computer and an external or internal device. Internal ports may connect such devices as hard drives and CD ROM or DVD drives; external ports may connect modems, printers, mice and other devices.

Compliance

The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.

Compliance Enforcement Authority

The North American Electric Reliability Corporation (NERC) or the Regional Entity in their respective roles of monitoring and enforcing compliance with the NERC Reliability Standards.

cyber asset

Programmable electronic devices and communication networks including hardware, software and data.

cybersecurity patch

Computer code intended to fix a cybersecurity vulnerability.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

default password

Password on system administration, user, or service accounts predefined in a system, application, or device; usually associated with default account. Default accounts and passwords are published and well known, and therefore easily guessed.

deter

Discourage (someone) from doing something by instilling doubt or fear of the consequences.

detect

Discover, investigate, or discern the existence or presence of something.

enable

In Computing: to make a device or system ready for use; activate.

event logging

The purpose of this task is to record the actions performed on a system.

Evidence

Information used to establish facts.

event

Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring. (CNSSI-4009).

event log

A basic resource that helps provide information about network traffic, usage and other conditions. An event log stores these data for retrieval by security professionals or automated security systems to help network administrators manage various aspects such as security, performance and transparency.

Failure

The condition or action of not functioning.

Identification

The process or act of establishing who or what someone or something is.

include

Make part of a whole or set.

individual

A human being.

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

install

Set up for use.

interactive user access

User access to an operating system by means of a log-in through a Graphical User Interface.

investigation

The work of inquiring into something thoroughly and systematically.

log

To record an event or transaction in an organized record-keeping system, usually sequenced in the order they occurred.

login attempt

Any failed or aborted activity of logging in.

malicious code

Software or firmware designed to infiltrate or damage a computer system without the owner's knowledge or consent, with the intent of compromising the confidentiality, integrity, or availability of the owner’s data, applications, or operating system. Such software typically enters a network during many business-approved activities, which results in the exploitation of system vulnerabilities. Examples include viruses, worms, Trojans (or Trojan horses), spyware, adware, and rootkits.

Malicious Code Prevention

This purpose of policy is to prevent malicious code attacks from happening, and if they should happen, to quarantine the infected systems and eradicate the malicious code before it spreads further.

minimum

The smallest possible quantity.

method

A means or particular procedure for accomplishing or approaching something.

Minimum password length

This policy setting determines the least number of characters that make up a password for a user account. There are many different theories about how to determine the best password length for an organization, but perhaps "pass phrase" is a better term than "password." In Microsoft Windows 2000 or later, pass phrases can be quite long and can include spaces. Therefore, a phrase such as "I want to drink a $5 milkshake" is a valid pass phrase; it is a considerably stronger password than an 8 or 10 character string of random numbers and letters, and yet is easier to remember. Users must be educated about the proper selection and maintenance of passwords, especially with regard to password length. In enterprise environments, the ideal value for the Minimum password length setting is 14 characters, however you should adjust this value to meet your organization's business requirements.

need

Require (something) because it is essential or very important.

network port

A network port is a process-specific or an application-specific software construct serving as a communication endpoint, which is used by the Transport Layer protocols of Internet Protocol suite, such as User Diagram Protocol (UDP) and Transmission Control Protocol (TCP).

non-compliance

The failure to achieve performance criteria of a regulation or authority.

number

An arithmetical value, expressed by a word, symbol, or figure , representing a particular quantity and used in counting and making calculations and for showing order in a series or for identification.

password change

The changing of a user's password.