Glossary
- Access
-
The ability and the means necessary to approach, to store or retrieve data, to
communicate with, or to make use of any resource of an electronic system.
- Access Control
-
The restriction to authorised persons only of admittance to data in any manner, or
to the use of any resources in a computer system. It involves the use of protective
countermeasures against unauthorised admittance to, or disclosure of, data.
- Accidental Threat
-
The threat of unintentional damage to the system. is may be caused through
incorrect use of the system or through natural phenomena such as floods or fires.
- Accountabi1ity
-
The requirement that a system user accounts for, or is made liable for, his or her
actions.
- Accreditation
-
The official authorisation that is granted to an electronic system to process
sensitive inforrnation in its operational environment, based upon comprehensive
security evaluation of the system's configuration, and of the system's procedural,
administrative, physical, personnel, and communications security control.
- Active Threat
- A potential breach in security, the nature of which, should it materialise, would
cause actual damage or alteration to the computer, hardware, software or data.
- Active Wlretapping
-
The attaching of an unauthorised device, such as a computer terminal, to a
communications circuit for the purpose of obtaining access to data through the
generation of false messages or control signals, or by altering communications of
legitimate users.
- Administrative Security
- The management constraints, operational procedures, accountability procedures,
and supplemental controls established to provide an acceptable level of protection
for sensitive data. Synonymous with procedural security.
- Applications Program
-
Any program that is specific to the particular role that a given computer performs
within a given organisation and makes a direct contribution to performing that
role. For example, where a computer handles a company's finances a payroll
program would be an applications program. By contrast, an operating system or a
software tool may both be essential to the effective use of the computer system,
but neither makes a direct contribution to meeting the end-user's eventual needs.
- Attack
-
A threat carried out, possibly in a successful manner.
- Audit
-
To conduct the independent review and examination of system records and
activities in order to test for adequacy of system controls, to ensure compliance
with established policy and operational procedures, and to recommend any
indicated changes in controls, policy, or procedures.
- Audit Events
-
Logged data items, which are especially recorded for auditing purposes and are
used as auditing information.
- Audit Trail
- A chronological record of system activities which is sufficient to enable the
reconstruction, review and examination of the sequence of environments and
activities surrounding or leading to each event in the path of a transaction from its
inception to output of final results.
- Authentication
-
The verification of a claimed identity.
- Authorisation
-
The granting to a user, a program, or a process the right of access.
- Availability
-
Availability reflects a system's ability to stay running.
- Back-office
-
Description of the section of an organisation which does not have any direct
contact with the organisation's customers. For example, a head offfice where
internal policy decisions are made and administrative work is carried out would be
regarded as a back-offfice environment.
- Backup
-
Duplicates of hardware and software elements which are available in an
emergency.
- Bridge
-
A device that interconnects two networks and whose presence is usually invisible
to network users (as distinct from a gateway, whose presence is generally visible) .
- Business Process Owner
-
An individual who has the responsibility for a management process in support of a
business function.
- Central Mainame
-
A mainframe of any type, which constitutes the centre of a DP-network and to
which all other components of the network are connected.
- Cerfication
- The technical evaluation, made as part of and in support of the accreditation
process, that establishes the extent to which a particular computer system or
network design and implementation meet a pre-specified set of security
requirements.
- Channel
-
A path along which signals can be sent, e.g. data channel, output channel.
- Checksum
-
In data processing and data communications, the summation of a set of data items
associated with the set for checking purposes. The data items are either
numerals, bits or other character strings regarded as numerals for the purpose of
the calculation.
- Cipher System
-
It includes the algorithms, the hardware (and soware if applicable), the key
management and the rules of use.
- Ciphertet
-
Unintelligible text or signals produced through the use of cryptographic systems.
- Circuit Switching
-
In data communications, a method in which a connection is established on
demand and maintained between data stations in order to allow the exclusive use
of a data circuit until the connection is released.
- Communication
-
The process of transferring information by various media from one point, person
or device to another.
- Communication Security
-
All processes involved by the requirements for confidentiality authentication and
integrity of message exchange.
- Communication System
-
Any system where by a source of information is enabled to convey that
information, with due regard for efficiency and reliabilib, to a destination. Such a
system may contain more than one source and/or more than one destination, in
which case it is called a communication network.
- Compromise
-
An unauthorised disclosure or loss of sensitive information.
- Computer
-
A device which performs pre-specified computations on any valid set of input data
and delivers results within defined levels of accuracy. A term is used for electronic
digital computer.
- Computer Netvorks
-
A computer network is a network for interconnecting computer systems to allow
the fast and easy flow of data between the systems and users of the systems.
Computer networks have evolved from the development in data communications
and computers.
- Computer System
-
A collection of hardware, firmware, software, sufficient to establish the processing
of information.
- Confidentialty
-
A concept which applies to data. It is the status accorded to data which has been
agreed upon between the person or organisation furnishing the data and the
organisation receiving it, and which describes the degree of protection to be
provided.
- Configuration Management
-
The management of an inventory, configuration conditions, lists all hardware and
software system components, in order to provide audit evidence.
- Console
-
An interactive terminal connected to a computer or electronic system usually for
the purposes of administration.
- Contingeny Plan
-
Plan for making recovery as rapid as possible with minimal disruption, in the
event of a disaster.
- Controlled Access
-
Synonym for access control.
- Countermeasures
-
The methods of any type (e.g. physical, procedural, hardware, software,
personnel) employed to counteract a threat to the system.
- Cryptographic Checkfunction
-
Information which is derived by performing a cryptographic process on the data
unit. The derivation of the checkfunction may be performed in one or more steps
and is a result of a mathematical functions of the key and a data unit. It is usually
used to check the integrity of a data unit.
- Cryptography
-
The protection of a message so as to render it unintelligible to other than
authorised recipients. Many techniques are known for the conversion of the
original message, known as plain text, into its encrypted form, known as cipher,
ciphertext, or code.
- Customer-facing
-
The part of an organisation which directly interfaces with its clients. An example
of this would be a bank's branch office where the cashier comes into direct contact
with customers.
- Data
-
Information with a specific physical presentation.
- Data Integrity
-
The state that exists when computerised data is the same as that in the source and
has not been exposed to accidental or malicious alterations or destruction.
- Data Origin Authentication
-
The corroboration that the source of data received is as claimed.
- Data Security
-
The science and study of methods of protecting data in computer and
communications systems against unauthorised disclosure, transfer, modifications
or destruction whether accidental or intentional.
- Database Administration
-
The realisation of centralised planning and control within a database system.
- Deliberate Threat
-
The threat of a person or persons consciously and willingly attacking the
computer system (synonym to Intentional Threat) .
- Denial of Service
-
The prevention of authorised access to system assets or the delaying of
time-critical operations.
- Dial Back
-
A procedure established for positively identifying a terminal dialling into a
computer system by disconnecting the calling terminal and re-establishing the
connection by the computer system's dialling the telephone number of the calling
terminal.
- Digital Signature
-
Part of a message which authenticates the source and the contents of the
message.
- Eavesdropping
- The unauthorised interception of information-bearing emanations through the use
of methods other than wiretapping.
- Ecrypption
-
A method of protecting data by enciphering or encoding it in order to change it
from plain text into an unintelligible form. Text thus becomes unreadable and
cannot be understood. Encryption can be used as a countermeasure to combat
unauthorised attempts to read files or to intercept communications.
- Encryption Algorithm
-
A set of mathematically expressed rules for rendering information unintelligible by
effecting a series of transformations through the use of variable elements
controlled by the application of a key to the normal representation of the
information. Synonymous with privacy transformation.
- Exclusive LAN
-
A LAN with restricted authorised users, within secure BT premises, and not
connected to any other network.
- Formal proof
-
A complete and convincing mathematical argument, presenting the full logical
justification for each proof step, for the truth of a theorem or a set of theorems.
The formal verification process uses formal proofs to show the truth of certain
properties of formal specification and for showing that computer programs satisfy
their specifications.
- Formal Security Policy Model
-
A mathematically precise statement of a security policy. To be adequately precise,
such a model must represent the initial state of a system, the way in which the
system progresses from one state to another, and a definition of a "secure" state of
the system. To be acceptable as a basis for a Trusting Computing Base, the model
must be supported by a formal proof that if the initial state for the system satisfies
the definition of a "secure" state and if all assumptions required by the model
hold, then all future states of the system will be secure.
- Formal Top-level Specification (FTLS)
-
A Top-Level Specification that is written in a formal mathematical language to
allow theorems showing the correspondence of the system specification to its
formal requirements to be hypothesised and formally proven.
- Formal Verification
-
The process of using formal proofs to demonstrate the consistency (design
verification) between a formal specification or a system and a formal security
policy model or (implementation verification) between the formal specification and
its program implementation.
- Game
-
Software specifically for recreational purposes.
- Gateway
-
A device that interconnects two networks, and whose presence is usually visible to
network users (as distinct from a bridge, whose presence is generally not visible) .
- Hacker
-
In computing, a computing enthusiast. The term is normally applied to people who
take a delight in experimenting with system hardware, software and
communication systems. Recently the term has been associated with those who
misuse computers for the purpose of nuisance, espionage, or fraud.
- Integrity
-
See system integrity and data integrity.
- Integrity Level
-
An integrity level is assigned to information (object), on the basis of possible
widespread security damage caused by information sabotage.
- Interface
-
In electronics, a shared boundary between two related devices or components
defined for the purpose of specifying the type and form of signals passing between
them.
- Key Lock
-
A physical lock used to secure an electronic system.
- Key Management
- In cryptography, keys are required for encipherment and authentication. These
procedures provide no security when the keys have been handled incorrectly. Key
management implies the effective creation, storage, transmission, installation and
eventual destruction of keys.
- Link Encryption
-
The transfer of an encrypted message across a system where the message is
decrypted and re-encrypted after each stage of its journey. Typically, link
encryption is used in a switched communication network where the message is
decrypted at each switching node to read the routing information prior to
re-encryption and onward transmission via the appropriate switch outlet.
- Local Area Network
-
In data communications, a high bandwidth bidirectional communications network
which operates over a limited geographic area, typically on an office building or a
college campus.
- Logging
-
The recording of processes, including initial parameters, to allow a detailed view
into the activities of a system.
- Logic Bomb
-
A program segment which, during execution, performs unwanted changes to
programs and/or data.
- Logical Security
-
Collection of measures which protect the value of system data and the ways in
which the data is used.
- Logical Ihreat
-
The possibility of destruction alteration or monitoring of software or data It would
be realised by logical manipulation within the system rather than by a physical
attack.
- Mainframe
-
In computing, a term normally applied to a large general purpose computer
installation serving a major section of an organisation or institution.
- Masuerade
-
The pretence by an entity to be a different entity in order to gain unauthorised
access to resources.
- Message
-
A collection of data to be moved as a logical entity within an information network.
- Multi-user System
-
A system which allows the simultaneous execution of a number of jobs by
timesharing.
- Multilevel Secure
-
A class of system containing information with different sensitivities that
simultaneously permits access by users with different security authorisations and
needs-to-know, but prevents users from obtaining access to information for which
they lack authorisation.
- Need-to-know
- An administrative action certifying that a given individual requires access to
specified privacy marked information in order to perform his assigned duties. The
combination of an authorisation and a need-to-know constitutes the necessary and
sufficient conditions for granting access to privacy marked information.
- Network
-
See computer networks.
- Network Management
-
In communications, the systematic procedures necessary to plan organise and
control an evolving communication network with optimum costs and performance
- Non repudiation
-
Characteristic of an authentication process that enables a third party to ensure
that a message has been sent and received without modification or duplication.
- Office System
-
Computer-based systems to enhance the effectiveness and productivity of people
who work in offices.
- One time password
-
A password that is used only once. Usually a list exists that is successively
exhausted.
- One-way Function
-
A function is said to be "one-way" if the problem of finding its inverse is
computationally unfeasible.
- One-way Encryption
-
An method of encryption that employs a one-way function.
- Operating System (OS)
-
The set of software products that jointly controls the system resources and the
processes using these resources on a computer system.
- Packet Assembler/Disassembler (PAD)
-
In packet switching networks, a device that converts the character stream, suitable
for a simple terminal, to packets and vice versa.
- Password
-
Ordered set of alphanumeric characters the knowledge of which is used to
authenticate an entity.
- Passive threat
-
A potential breach of security, the occurrence of which would not change the state
of the system. Hardware, software, data etc. would remain unaltered. Ihe breach
would normally take the form of people reading files without changing them.
- Passive Wlretapping
-
The monitoring and or recording of data while the data is being transmitted over a
communications link.
- Penetration Testing
- The testing of an operational system for security weaknesses while attempting to
override system privileges.
- Physical Security
- The use of locks, guards, badges, and similar administrative measures to control
access to the computer and related equipment, and the measures required for the
protection of the structures housing the computer, related equipment and their
contents from damage by accident, fire, environmental hazards, crime, vandalism,
industrial espionage, and so on.
- Plain text
-
Data which exists in an unenciphered form.
- Privacy
-
Privacy is a concept which applies to an individual. It is the right of an individual to
decide what information is shared with others.
- Privacy marking
-
Privacy markings are used to identify information which requires a level of
protection above that of information available to the general public (see the
information Securiy Code).
- Process (task)
-
A stream of activity. A process is defined by its code, i.e. the ordered set of
machine instructions defining the actions that the process is to take, the contents
of its workspace, i.e. the set of data values that it can read, write, and manipulate,
and its process descriptor, which defines the current status of any resources that
are allocated to the process.
- Program
-
A set of statements that can be submitted as a unit to some computer system and
used to direct the behaviour of that system.
- Protocol
-
In data communications, a formally specified set of conventions governing the
format and control of inputs and outputs between two communicating systems.
- Reliability
-
Reliability reflects the ability to perform an intended function accurately within a
specific time.
- Repudiation
-
Denial by one of the entities involved in a communication of having participated in
all or part of the communication.
- Resource
-
In a system, any function, device, or data collection that may be allocated to users
or programs.
- Risk
-
The potential danger of loss to an organisation as, for example, that resulting from
the misuse of its computer, usually involving an assessed balance between threat
and vulnerability. This may involve unauthorised disclosure, unauthorised
modification, and/or loss of information resources, as well as the authorised but
incorrect use of a computer. Risk can be measured to some extent by performing
risk analysis.
- Risk Analysis (RA)
-
A comprehensive concept for defining and analysing threats to, and vulnerabilities
of, computer system assets and capabilities, and for supplying management with
information suitable for a decision in order to optimise investment in security
countermeasures.
- Security
-
See Administrative Security; Communications Security; Logical Security; Physical
Security; Traffic Flow Security.
- Security Model
-
A security model defines the security rules that every implementation must
enforce. It may reflect the demands of a general security policy on a particular
application environment. A security model can act as a basis both for users to
understand system operation and for system design. It is stated formally and used
as a basis for formal specification proofs. The security model rigorously defines
system security.
- Security Policy
-
The set of laws, rules, and practices regulating how an organisation, computer
system manages, protects, and distributes sensitive information.
- Security-Relevant Events
-
All occurrences which alter the status of sensitive data and/or can be determined
as extraordinary. They involve the action of security functions.
- Segregation of Duties
-
Part of orderly data processing. llle practice demands that functions, such as
programming, operating and controlling are performed by different people in
order to enhance mutual control.
- Sensitive Information
-
Information that, as determined by a competent authority, must be protected
because its unauthorised disclosure, alteration, loss, or destruction will cause
perceivable damage to someone or something.
- Sensitivity
-
See Confidentiality.
- Sensitivity Labe1
-
A piece of information representing the security level of an object and that
describes the sensitivity of the data in the object. Sensitivity labels are used to
mediate access according to an access policy.
- System Integrity
-
The state that exists when there is complete assurance that under all conditions an
lT system is based on the logical correctness and reliability of the operating
system, the logical completeness of the hardware and software that implement the
protection mechanisms, and data integrity.
- System
-
The composite of hardware, software, users and data to fulfil all or part of a
business process.
- System Administrator
-
An administrator of an electronic system, responsible for the day to day operation.
- System Supplier
-
Those who supply software and perhaps hardware components for the purposes of
constructing a system often to a specific set of end-user written requirements.
- TEMPEST
-
The study and control of spurious electronic signals emitted from electronic
equipment.
- Terminal
-
A data input and/or output device that is connected to a controlling processor to
which it is subservient and usually remote. There are a very wide range of
terminal types.
- Terminal Identity TID
-
In computing, a terminal identification code enabling a computer to recognise a
terminal uniquely.
- Threat
-
A potential violation of the security of the system.
- Threat Analysis
-
An important step carried out in Risk Analysis in order to determine the possible
threat in a computer installation which may affect the organisation.
- Top Level Specification (TLS)
-
A non-procedural description of system behaviour at the most abstract level.
Typically, a functional specification that omits all information details.
- Traffic Flow Security
-
The protection that results from those features in some crypto-equipment that
conceal the presence of valid messages on a communications circuit, usually by
causing the circuit to appear busy at all times, or by encrypting the source and
destination addresses of valid messages.
- Trap Door
-
A hidden software or hardware mechanism that permits system protection
mechanisms to be circumvented. It is activated in some non-apparent manner
(e.g., special "random" key sequence at a terminal) .
- Trojan Horse
-
A computer program with an apparently or actually useful function that contains
additional (hidden) functions that surreptitiously exploit the legitimate
authorisation of the invoking process to the detriment of security.
- Trusted Computing Base (TCB)
-
The totality of protection mechanisms within a computer system - including
hardware, firmware, and software - the combination of which is responsible for
enforcing a security policy. It creates a basic protection environment and provides
additional user services required for a trusted computer system. The ability of a
trusted computing base to correctly enforce a security policy depends solely on
the mechanisms within the TCB and on the correct input by system administrative
personnel of parameters (e.g., a user's clearance) related to the security policy.
- User
-
Any person who interacts directly with a computer system.
- User Identity (UID)
-
In computing, a user identification code enabling a computer to recognise an
individual uniquely.
- Vendor
-
An individual or company who supplies generic components used in the
construction of systems.
- Verification (Validation)
-
The process of comparing two levels of system specification for proper
correspondence (e.g., security policy model with Top-Level Specification. TLS
with source code, or source code with object code). This process may or may not
be automated.
- virus
- A program segment that can 'infect' other programs by modifying them to indude
a possibly evolved copy of itself With the infection property, a virus can spread
throughout a computer system or network using the authorisations of every user
using it to infect their programs. Every program that gets infected may also act as
a virus and thus the infection grows.
- Vulnerability
-
A design, implementation, or operation flaw that may be exploited by a threat; the
flaw causes the computer system or application to operate in a fashion different
from its published specifications, and to result in destruction or misuse of
equipment or data.
- Wide Area Network
-
Two types of WAN have to be distinguished. The first type connects different
networks and the second type connects distant located devices of any kind.
- Wire Tapping
-
To cut or tap a communication channel to intercept a message.
- Worm
-
A program segment that can propagate throughout a computer system or network,
using the authorisation of the user using it, to delete other programs and data. The
name of the threat is caused by the ability of the worms to change host program,
thereby propagating.
- X.25
-
The CCITT standard interface protocol for packet switching networks that defines
the message structure required by data terminal equipment (DTE) to interface to
a public packet network conforming to CClTT standards. The X25 standard layer,
the link layer, and the network (or packet) layer. Iese three levels conform to
the lower three layers of the ISO seven-layer reference model for open system
interconnection.