{"countrys":["African Union","Australia","Austria","Bangladesh","Belgium","Bolivia","Canada","Columbia","Czech Republic","Denmark","Ecuador","Estonia","EU","Finland","France","Georgia","Germany","Ghana","Hungary","IEEE","India","International Organization for Standardization","International Organization for Standardization and International Electrotechnical Commission","International Organization of Standartisation","International Telecommunication Union","International Telecommunications Union","ISO","Israel","Italy","Jamaica","Japan","Jordan","Kenya","Latvia","Lithuania","Montenegro","NATO","NATO CCD COE","New Zealand","New Zeland","Nigeria","NIST","Norway","OSCE","Oxford Dictionary","Pakistan","Poland","Qatar","Romania","Russia","SANS","Saudi Arabia","South Africa","South Korea","Spain","Switzerland","Tallinn Manual","The Netherlands","Trinidad and Tobago","Turkey","Uganda","UK","UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security","UN\/Canada","UN\/Cuba","UN\/Kazakhstan","UN\/Lebanon","UN\/Mali","UN\/Phillippines","UN\/Russia","UN\/Sweden","University of Oxford","US","US\/Russia","USA"],"(A culture of) cyber security":{"African Union":{"description":"\u003Cp\u003EEach Member State engaged has to undertake measures to make it a point to inculcate a culture of cyber security in all stakeholders, namely: Governments, enterprises and the civil scoiety, which develop, possess, manage, operationalize and use infromation systems and networks. The culture of cyber security shall place premium on security and information systems and networks development and on the adoption of new ways of thinking and behaving during the use of information systems as well as during communication or transactions across networks.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/au.int\/en\/sites\/default\/files\/AU%20Convention%20EN.%20%283-9-2012%29%20clean_0.pdf\u0022 target=\u0022_blank\u0022\u003EDraft African Union Convention on the Establishment of a Legal Framework Conducive to Cyber Security in Africa or Draft African Union Convention on Confidence and Security in Cyberspace (2012)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Active) Cyber Defense":{"NATO CCD COE":{"description":"\u003Cp\u003EA proactive measure for detecting or obtaining information as to a cyber intrusion, cyber attack, or impending cyber operation or for determining the origin of an operation that involves launching a preemptive, preventive, or cyber counter-operation against the source.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA proactive measure for detecting or obtaining information as to a cyber intrusion, cyber attack, or impending cyber operation or for determining the origin of an operation that involves launching a preemptive, preventive, or cyber counter-operation against the source.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA proactive measure for detecting or obtaining information as to a cyber intrusion, cyber attack, or impending cyber operation or for determining the origin of an operation that involves launching a preemptive, preventive, or cyber counter-operation against the source.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Culture of) Cybersecurity":{"Bangladesh":{"description":"\u003Cp\u003EThis Cybersecurity Strategy identifies the following major activities: Promotion of a national awareness programme to empower end users ? at home or general workforce ? to secure their own cyberspace-linked systems; Implementation of a cybersecurity awareness programme for government systems that contain classified data; Encouraging cybersecurity culture development in business enterprises; Engaging civil society in outreach to children and individual users; Promotion of private-sector support for professional cybersecurity certifications. Nations are increasingly dependent on complex systems and information technology. In many cases, information and communications technologies (ICT) vital to national and economic security are subject to disruption from a number of causes, either originating from within or outside the nation. Leaders in government and private industry are increasingly confronted with uncertainty about cyber risk and vulnerabilities. This uncertainty stems from the complexity and interconnectivity of evolving technology used to support critical systems. To ensure security and economic vitality, nations must manage cyber security in accordance with their own economic, social, and political considerations.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.dpp.gov.bd\/upload_file\/gazettes\/10041_41196.pdf\u0022\u003ENational cybersecurity strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Cyber) Civilian Space":{"Israel":{"description":"\u003Cp\u003ECybperspace that includes all the government and private bodies of the State of Israel, excluding special bodies\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022\u003EAdvancing National Cyberspace Capabilitities, Resolution No. 3611 of the Government of august 7, 2011 (2011)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECybperspace that includes all the government and private bodies of the State of Israel, excluding special bodies\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022\u003EAdvancing National Cyberspace Capabilitities, Resolution No. 3611 of the Government of august 7, 2011 (2011)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECybperspace that includes all the government and private bodies of the State of Israel, excluding special bodies\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022\u003EAdvancing National Cyberspace Capabilitities, Resolution No. 3611 of the Government of august 7, 2011 (2011)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECybperspace that includes all the government and private bodies of the State of Israel, excluding special bodies\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022\u003EAdvancing National Cyberspace Capabilitities, Resolution No. 3611 of the Government of august 7, 2011 (2011)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Cyber) Ecosystem":{"Qatar":{"description":"\u003Cp\u003EA variety of interconnected and interdependent organizations, systems, and devices that interact for multiple purposes using different processes\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Cyber) Exercise":{"Qatar":{"description":"\u003Cp\u003EAn interactive engagement (half-day to five days or more) that enables participants to react to a plausible scenario in a risk-free environment. Exercises provide an effective tool for testing incident response plans; validating policies, plans, and procedures; identifying vulnerabilities and reporting requirements; assessing risk and preparedness; discovering interdependencies and response gaps; creating a shared perspective and buy-in among diverse stakeholders; and building a common understanding of roles and responsibilities. An exercise may also be referred to as a simulation, seminar, tabletop, drill, or wargame.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn interactive engagement (half-day to five days or more) that enables participants to react to a plausible scenario in a risk-free environment. Exercises provide an effective tool for testing incident response plans; validating policies, plans, and procedures; identifying vulnerabilities and reporting requirements; assessing risk and preparedness; discovering interdependencies and response gaps; creating a shared perspective and buy-in among diverse stakeholders; and building a common understanding of roles and responsibilities. An exercise may also be referred to as a simulation, seminar, tabletop, drill, or wargame.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn interactive engagement (half-day to five days or more) that enables participants to react to a plausible scenario in a risk-free environment. Exercises provide an effective tool for testing incident response plans; validating policies, plans, and procedures; identifying vulnerabilities and reporting requirements; assessing risk and preparedness; discovering interdependencies and response gaps; creating a shared perspective and buy-in among diverse stakeholders; and building a common understanding of roles and responsibilities. An exercise may also be referred to as a simulation, seminar, tabletop, drill, or wargame.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn interactive engagement (half-day to five days or more) that enables participants to react to a plausible scenario in a risk-free environment. Exercises provide an effective tool for testing incident response plans; validating policies, plans, and procedures; identifying vulnerabilities and reporting requirements; assessing risk and preparedness; discovering interdependencies and response gaps; creating a shared perspective and buy-in among diverse stakeholders; and building a common understanding of roles and responsibilities. An exercise may also be referred to as a simulation, seminar, tabletop, drill, or wargame.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Cyber) Resilience":{"Qatar":{"description":"\u003Cp\u003EThe ability to prepare for, adapt to, withstand, and rapidly recover from disruptions resulting from deliberate attacks, accidents, or naturally occurring threats or incidents.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe ability to prepare for, adapt to, withstand, and rapidly recover from disruptions resulting from deliberate attacks, accidents, or naturally occurring threats or incidents.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe ability to prepare for, adapt to, withstand, and rapidly recover from disruptions resulting from deliberate attacks, accidents, or naturally occurring threats or incidents.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe ability to prepare for, adapt to, withstand, and rapidly recover from disruptions resulting from deliberate attacks, accidents, or naturally occurring threats or incidents.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"(Information) threats":{"Russia":{"description":"\u003Cp\u003E(Translation) The main threat in the field of international information security is the use of communication technologies as information weapons for political and military purposes, countering international law, national sovereignty of states, violate the territorial integrity of States and threaten international peace, security and strategic stability; the usage of information weapons for terrorist purposes; and for the intervention in the affairs of sovereign states, violation of public order, incitement of ethnic, racial and religious hatred, propaganda of racist and xenophobic ideas or theories to incite violence; commit crimes, including those related to unauthorized access to computer information, with the creation, use and distribution of malicious computer programs.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EBasic pinciples for State Policy of the Russian Federation in the field of International Information Security to 2020 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) The main threat in the field of international information security is the use of communication technologies as information weapons for political and military purposes, countering international law, national sovereignty of states, violate the territorial integrity of States and threaten international peace, security and strategic stability; the usage of information weapons for terrorist purposes; and for the intervention in the affairs of sovereign states, violation of public order, incitement of ethnic, racial and religious hatred, propaganda of racist and xenophobic ideas or theories to incite violence; commit crimes, including those related to unauthorized access to computer information, with the creation, use and distribution of malicious computer programs.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EBasic pinciples for State Policy of the Russian Federation in the field of International Information Security to 2020 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) The main threat in the field of international information security is the use of communication technologies as information weapons for political and military purposes, countering international law, national sovereignty of states, violate the territorial integrity of States and threaten international peace, security and strategic stability; the usage of information weapons for terrorist purposes; and for the intervention in the affairs of sovereign states, violation of public order, incitement of ethnic, racial and religious hatred, propaganda of racist and xenophobic ideas or theories to incite violence; commit crimes, including those related to unauthorized access to computer information, with the creation, use and distribution of malicious computer programs.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EBasic pinciples for State Policy of the Russian Federation in the field of International Information Security to 2020 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) The main threat in the field of international information security is the use of communication technologies as information weapons for political and military purposes, countering international law, national sovereignty of states, violate the territorial integrity of States and threaten international peace, security and strategic stability; the usage of information weapons for terrorist purposes; and for the intervention in the affairs of sovereign states, violation of public order, incitement of ethnic, racial and religious hatred, propaganda of racist and xenophobic ideas or theories to incite violence; commit crimes, including those related to unauthorized access to computer information, with the creation, use and distribution of malicious computer programs.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EBasic pinciples for State Policy of the Russian Federation in the field of International Information Security to 2020 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Active attack":{"US":{"description":"\u003Cp\u003EAn attack that alters a system or data\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 (2010)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 (2006)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America (2015 July)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Activities of the Armed Forces in information space":{"Russia":{"description":"\u003Cp\u003Euse by the Armed Forces of the information resources for solving the tasks of defence and security\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EConceputal Views Regarding the Activiites of the Armed Forces of the Russian Federation in the Informaiton Space (2011)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Advanced Persistent Threat":{"NIST":{"description":"\u003Cp\u003EAn adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future. The advanced persistent threat: (i) pursues its objectives repeatedly over an extended period of time; (ii) adapts to defenders\u2019 efforts to resist it; and (iii) is determined to maintain the level of interaction needed to execute its objectives.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003ENIST US Department of Commerce: Glossary of Key Information Security Terms (June 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EAn adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003EUnited States of America, Department of Homeland Security, National Initiative for Cybersecurity Careers and Studies, \u201cExplore Terms: A Glossary of Common Cybersecurity Terminology\u201d ND. http:\/\/niccs.us-cert.gov\/glossary\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n\u003Cp\u003EA group, such as a foreign government, with both the capability and intent to continually and effectively target a specific entity, often to conduct espionage or attack operations.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003EUnited States of America, Democratic Policy \u0026amp; Communications Center, \u201cGlossary of Cyber Related Terms\u201d\u003C\/a\u003E\u003C\/p\u003E\n"}},"Adversary":{"US":{"description":"\u003Cp\u003EIndividual, group, organization, or government that conducts or has the intent to conduct detrimental activities\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Attack":{"US":{"description":"\u003Cp\u003EAn attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAny kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2001\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. Extended Definition: The intentional act of attempting to bypass one or more security services or controls of an information system.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015 July\u003C\/a\u003E\u003C\/p\u003E\n"},"International Organization of Standartisation":{"description":"\u003Cp\u003EAttempts to destroy, expose, alter, or disable an Information System and\/or information within it or otherwise breach the security policy.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2006\u003C\/a\u003E\u003C\/p\u003E\n"},"International Telecommunications Union":{"description":"\u003Cp\u003EAn attack may either be a known attack or an unknown attack. The known attack means that the pattern or packet for attack is opened. Although the pattern or packet for attack is not opened for the unknown attack, it refers to the behaviour related to worsening network situation. [in force]\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2007\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe activities undertaken to bypass or exploit deficiencies in a system\u0027s security mechanisms. By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed when they bypass the mechanism, or when they make the system use the mechanism incorrectly. [in force]\/\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003ETranslation: An attack is an intentional form of threat, namely an undesirable or unauthorized action with the objective to gain advantages or harm a third party respectively. Attackers can also act on behalf of third parties that want to gain advantages.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Attacker":{"International Organization for Standardization":{"description":"\u003Cp\u003EAny person deliberately exploiting vulnerabilities in technical and non-technical security controls in order to steal or compromise information systems and networks, or to compromise availability to legitimate users of information system and network resources.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2005\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAny person deliberately exploiting vulnerabilities in technical and non-technical security controls in order to steal or compromise information systems and networks, or to compromise availability to legitimate users of information system and network resources\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2009\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EAn individual, group, organization, or government that executes an attack. Extended Definition: A party acting with malicious intent to compromise an information system.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015 July\u003C\/a\u003E\u003C\/p\u003E\n"}},"Close Action [Cyber] Operation":{"Tallinn Manual":{"description":"\u003Cp\u003EA cyber operation requiring physical proximity to the targeted system.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Network":{"Tallinn Manual":{"description":"\u003Cp\u003EAn Information Structure used to permit computers to exchange data.\u00a0 The infrastructure may be wired (e.g., Wi-Fi), or a combination of the two.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Network Attack":{"US":{"description":"\u003Cp\u003EActions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EActions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Also called CNA\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n"},"NATO":{"description":"\u003Cp\u003EAction taken to disrupt, deny, degrade or destroy information resident in a computer and\/or computer network, or the computer and\/or computer network itself. Note: A computer network attack is a type of cyber attack.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EActivities that are conducted in and through the cyberspace in order to manipulate, obstruct, deny, downgrade or destroy information stored in the ICT networks or in the computer systems, or the ICT networks or in the computer systems themselves.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Network Defense":{"US":{"description":"\u003Cp\u003EActions taken to defend against unauthorized activity within computer networks. CND includes monitoring, detection, analysis (such as trend and pattern analysis), and response and restoration activities.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EActions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the Department of Defense information systems and computer networks. Also called CND\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003ENational Initiative for Cybersecurity and Career and Studies, \u0022Explore Terms: A Glossary of Common Cybersecurity Terminology\u0022, http:\/\/niccs.us-cert.gov\/glossary - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EActions taken by using computer networks for protecting, monitoring, analyzing, detecting, and hindering non-authorized activities carried out against computer networks and IT systems\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Network Exploitation":{"US":{"description":"\u003Cp\u003EEnabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary information systems or networks.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003ENational Initiative for Cybersecurity and Career and Studies, \u0022Explore Terms: A Glossary of Common Cybersecurity Terminology\u0022, http:\/\/niccs.us-cert.gov\/glossary - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EEnabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. Also called CNE\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EOperations carried out in cyberspace in order to extract information from targeted ICT networks or computer systems. They are intelligence gathering activities, or actions preparing the execution of a cyber attack\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Network Operations":{"US":{"description":"\u003Cp\u003EComprised of computer network attack, computer network defense, and related computer network exploitation enabling operations.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EComprised of computer network attack, computer network defense, and related computer network exploitation enabling operations. Also called CNO.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: The complex process of planning, coordination, synchronization, harmonization, and development of action in cyberspace to protect, control, and use computer networks to obtain information superiority, while neutralizing enemy capabilities.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EThis term generally encompasses Computer Network Attack (CNA), Computer Network Defence (CND) and Computer Network Exploitation (CNE).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ENational Strategic Framework for Cyberspace Security - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Denmark":{"description":"\u003Cp\u003ELike other parts of modern society, the Danish Armed Forces will become increasingly vulnerable to, among other things, hacker attacks on their information and communication infrastructure. Likewise, the use of cyberspace in general is rapidly gaining increasing importance in connection with military operations. Cyberspace has, in other words, become a battlespace. This development places increasing demands on the ability of Danish Armed Forces to take defensive and offensive measures in cyberspace\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer Security":{"US":{"description":"\u003Cp\u003EMeasures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003EComputer security usually seeks to ensure availability and proper functioning of the computer and computer system. Information securty and computer security are often alternatively used, although they are related to slightly different aspects in the field of cyber security.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Computer System":{"Tallinn Manual":{"description":"\u003Cp\u003EOne or more interconnected computers assigned with associated software and peripheral devices.\u00a0 It can include sensors and\/or (programmable logic) controllers, connected over a computer network.\u00a0 Computer systems can be general purpose (for example, a laptop) or specialized (for example, the` blue force tracking system\u2019).\u003Cbr \/\u003E\u003Cem style=\u0022line-height: 1.6;\u0022\u003EPlease Note: Within the Tallinn Manual, the same definition is provided for the term Cyber System.\u003C\/em\u003E\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"African Union":{"description":"\u003Cp\u003Ean electornic, magnetic, optical, electrochemical, or other high speed processing device or a group of interconnecteed or related devices performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device or devices\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/au.int\/en\/sites\/default\/files\/AU%20Convention%20EN.%20%283-9-2012%29%20clean_0.pdf\u0022\u003EDraft African Union Convention on the Establishment of a Legal Framework Conducive to Cyber Security in Africa or Draft African Union Convention on Confidence and Security in Cyberspace - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Countermeasure":{"US":{"description":"\u003Cp\u003EActions, devices, procedures, or techniques that meet or oppose (i.e., counters) a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Countermeasures":{"US":{"description":"\u003Cp\u003EActions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system. Synonymous with security controls and safeguards.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2 - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThat form of military science that, by the employment of devices and\/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity. (JP 1-02)\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EJP 2-01.2 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Crisis Situation":{"Russia":{"description":"\u003Cp\u003Estage of conflict escalation characterised by the use of military force for its resolution\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EConceputal Views Regarding the Activiites of the Armed Forces of the Russian Federation in the Informaiton Space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Cyber Infrastructure":{"US\/Russia":{"description":"\u003Cp\u003Ethe cyber infrastructure that is essential to vital services for public safety, economic stability, national security, international stability and for the sustainability and restoration of critical cyberspace\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Cyber Services":{"US\/Russia":{"description":"\u003Cp\u003Ecyber services that are vital to preservation of public safety, economic stability, national security and international stability\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Cyberspace":{"US\/Russia":{"description":"\u003Cp\u003Ecyber infrastructure and cyber services that are vital to preservation of public safety, economic stability, national security and international stability\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Information Infrastructure":{"UK":{"description":"\u003Cp\u003ECritical information infrastructure (CII) may refer to any IT systems which support key assets and services within the national infrastructure\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Uganda":{"description":"\u003Cp\u003EThe ITU regards Critical Information Infrastructure as the virtual element of critical infrastructure. The information and communicaiton tehcnologies, that from CII, increasingly operatie and control critical national sectors such as health, water, transport, communicaitons, governmetn, energy, food, finance and emergency services, their physical assets and the activities of personnel.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.nita.go.ug\/sites\/default\/files\/publications\/Computer-Misuse-Act.pdf\u0022 target=\u0022_blank\u0022\u003EComputer Misuse Act - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003ECritical information infrastructure shall mean an electronic communications network, information system or a group of information systems where an incident that occurs causes or may cause grave damage to national security, national economy or social well-being.\/\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EApproval of the programme for the development of electronic information security (cyber-security) for 2011-2019 - 2010\u003C\/a\u003E\u003C\/p\u003E\n"},"Czech Republic":{"description":"\u003Cp\u003ECritical information infrastructure means an element or system of elements of the critical infrastructure in the sector of communication and information systems within the field of cybersecurity\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECritical information infrastructure means an element or system of elements of the critical infrastructure in the sector of communication and information systems2 within the field of cyber security\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Finland":{"description":"\u003Cp\u003ECritical information infrastructure refers to the structures and functions behind the information systems of the vital functions of society which electronically transmit, transfer, receive, store or otherwise process information (data).\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EFinland\u0027s Cyber Security Strategy - 2010\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Infrastructure":{"Tallinn Manual":{"description":"\u003Cp\u003EPhysical or virtual systems and assets under the jurisdiction of a State that are so vital that their incapacitation or destruction may debilitate a State\u2019s security, economy, public health\u00a0 or safety, or the environment.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"NIST":{"description":"\u003Cp\u003EIncludes electronic information and communications systems and services and the information contained in these systems and services. Information and communications systems and services are composed of all hardware and software that process, store, and communicate information, or any combination of all of these elements. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic, and all other media types. Communications include sharing and distribution of information. For example: computer systems; control systems (e.g., supervisory control and data acquisition\u2013SCADA); networks, such as the Internet; and cyber services (e.g., managed security services) are part of cyber infrastructure.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003ENIST US Department of Commerce: Glossary of Key Information Security Terms (June 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EAlthough governments administer only a minority of the Nation`s critical infrastructure computer systems, governments at all levels perform essential services that rely on each of the critical infrastructure sectors, which are agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, and postal and shipping.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2003\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ESystem and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. [Critical Infrastructures Protection Act of 2001, 42 U.S.C. 5195c(e)]\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, \u00a0- 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n"},"UN\/Canada":{"description":"\u003Cp\u003EInformation infrastructure is a key component of Canada`s critical infrastructure, which includes the following sectors: energy and utilities, communications and information technology, finance, health care, food, water, transportation, Government and manufacturing. The challenges of securing the information infrastructure are the same across all sectors, of which up to 90 per cent is estimated to be owned and operated privately.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2005\u003C\/a\u003E\u003C\/p\u003E\n"},"Uganda":{"description":"\u003Cp\u003Ethe collective term for all systems used directly in conncetion with or necessary for protected computer activities, the handling of official communications and personal data. This policy adopts the International Telecommunicaitons Union definition of critical infrastructure. Hence, in this policy, CI comprises of \u0022key systems, services and functions whose disruption or destruction would have adebilitating impact on public health and safety, commerce, and national security, or any combination of these\u0022.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ENational Information Security Strategy - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Trinidad and Tobago":{"description":"\u003Cp\u003Emeans computer systems, devices, networks, computer programs, computer data, so vital to the country that the incapa city or destruction of or interference with such systems and assets would have a debilitating impact on security, defence or international relations of the State, or provision of services directly related to national or economic security, banking and financial services, communications infrastructure, national public health and safety, public transportation, public key infrastructure or any combination of those matters\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.nationalsecurity.gov.tt\/Portals\/0\/Pdf%20Files\/National_Cyber_Security%20Strategy_Final.pdf\u0022 target=\u0022_blank\u0022\u003EGovernment of the Republic of Triniadad and Tobago, National Cyber Security Strategy - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Switzerland":{"description":"\u003Cp\u003ECritical infrastructure refers to infrastructure whose disruption, failure or destruction would have serious implications for society, the private sector and the state. It includes, for example, control and switchgear for energy supply or telecommunications. An inventory of critical infrastructure will be compiled by the national strategy for the protection of critical infrastructure\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Qatar":{"description":"\u003Cp\u003EPhysical assets, systems or installations, which if disrupted, compromised, or destroyed, would have a serious impact on the health, safety, security, or economic well-being of Qatar or the effective functioning of the Qatari government.1\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe information and communications technology systems, services, and data assets that are critical to Qatar based on the following classification criteria: 1)Identify the organization\u2019s key, core business processes and their dependency on assets\u003Cbr \/\u003E\nowned and managed by the organization (e.g., power plant, refinery, general ledger, etc.); Use impact severity table to determine an impact score for the loss\/non-functioning of\u00a0each key asset; and Classify all assets as critical when the criticality score is greater than twenty (20).\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Latvia":{"description":"\u003Cp\u003ECritical infrastructure is the objects, systems, or their parts in Latvia, which are important in providing the performance of funcitons essential to society, as well as for ensuring the protection of human health, security, economic or social welfare, whose destruction or malfuncitoning may significantly influence the performance of state funcitons. The critical infrastructure of information technology is protected in order to ensure the performance of basic funcitons essential to the state and society.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy of Latvia 2014-2018 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Kenya":{"description":"\u003Cp\u003EA term used to describe assets that are essential for the functioning of a society and economy. (e.g., electrical grid, telecommunications, water supply)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.icta.go.ke\/wp-content\/uploads\/2014\/03\/GOK-national-cybersecurity-strategy.pdf\u0022 target=\u0022_blank\u0022\u003EGovernmetn of Kenya, Cybersecurity Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Japan":{"description":"\u003Cp\u003ECritical infrastructures are formed by business entities providing highly irreplaceable services and are essential for people`s social lives and economic activities. If its function is suspended, reduced or unavailable, peoples social lives and economic activities will be greatly disrupted, and the same below\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2006\u003C\/a\u003E\u003C\/p\u003E\n"},"Jamaica":{"description":"\u003Cp\u003EIncludes systems and assets, whether physical or virtual, so critical that the incapacitation or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination thereof. This may include water and sewage networks, agriculture, health systems, emergency services, information technology and telecommunications, banking and finance, energy (electrical and wind generated), transportation (air, road, port), postal and shipping entities.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EJamaica National Cyber Security Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003ECritical infrastructures are organizations or institutions with major importance for the public good, whose failure or damage would lead to sustainable supply bottlenecks, considerable disturbance of public security or other dramatic consequences. At federal level, the following areas have been identified: Energy, information technology and telecommunication, transport, health, wather, food, finance and insurance sector, state and administration, media and culture\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Columbia":{"description":"\u003Cp\u003ETranslation: It is the set of computers, computer systems, communication networks, data and information, the destruction of or interference with which may weaken or impact the economic security, public health, or combination thereof, in a nation\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Australia":{"description":"\u003Cp\u003ECritical infrastructure is defined as those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended period, would adversely impact on the social or economic well-being of the nation or affect Australia\u00b4s ability to ensure national security\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"USA":{"description":"\u003Cp\u003EMeasures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 style=\u0022line-height: 1.6;\u0022\u003EUS Department of Defense Dictionary of Military and Assosicated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Critical Infrastructure Protection":{"US":{"description":"\u003Cp\u003EActions taken to prevent, remediate, or mitigate the risks resulting from vulnerabilities of critical infrastructure assets. Also called CIP. See also defense critical infrastructure.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 style=\u0022line-height: 1.6;\u0022\u003EUS Department of Defense Dictionary of Military and Assosicated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber":{"Finland":{"description":"\u003Cp\u003EThe word \u2018cyber\u2019 is almost invariably the prefix for a term or the modifier of a compound word, rather than a stand-alone word. Its inference usually relates to electronic information (data) processing, information technology, electronic communications (data transfer) or information and computer systems. Only the complete term of the compound word (modifier+head) itself can be considered to possess actual meaning. The word cyber is generally believed to originate from the Ancient Greek verb \u03ba\u03c5\u03b2\u03b5\u03c1\u03b5\u03c9 (kybereo) \u201dto steer, to guide, to control\u201d. Source: \u003Ca href=\u0022http:\/\/www.yhteiskunnanturvallisuus.fi\/en\/materials\/doc_download\/40-finlandas-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EFinland\u2019s Cyber Security Strategy Government Resolution 24 Jan 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003ERelating to or characteristic of the culture of computers, information technology, and virtual reality\u003C\/p\u003E\n"},"Tallinn Manual":{"description":"\u003Cp\u003EConnotes a relationship with information technology.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003Eanything relating to, or involving, computers or computer networks (such as Internet)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Asset":{"US\/Russia":{"description":"\u003Cp\u003Ea cyber entitiy with value\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Attack":{"Austria":{"description":"\u003Cp\u003EThe term \u201ccyber attack\u201d refers to an attack through IT in cyber space, which is directed against one or several IT system(s). Its aim is to undermine the objectives of ICT security protection (confidentiality, integrity and availability) partly or totally. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Canada":{"description":"\u003Cp\u003ECyber attacks include the unintentional or unauthorised access, use, manipulation, interruption or destruction (via electronic means) of electronic information and\/or the electronic and physical infrastructure used to process, communicate and\/or store that information. The severity of the cyber attack determines the appropriate level of response and\/or mitigation measures: i.e., cyber security. Source: \u003Ca href=\u0022http:\/\/www.publicsafety.gc.ca\/cnt\/rsrcs\/pblctns\/cbr-scrt-strtgy\/cbr-scrt-strtgy-eng.pdf\u0022 target=\u0022_blank\u0022\u003ECanada\u2019s Cyber Security Strategy (2010)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means= of electronic information and\/or the electronic and physical infrastructure used to process, communicade and\/or store that information. The severity of the cyber attack determines the appropriate levelof response nad\/or mitigaiton measures: i.e., cyber security.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003E- 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber attacks include the unintentional or unauthorized access, use, manipulation, interruption or destruction (via electronic means= of electronic information and\/or the electronic and physical infrastructure used to process, communicade and\/or store that information. The severity of the cyber attack determines the appropriate levelof response nad\/or mitigaiton measures: i.e., cyber security.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003E- 2010\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003EA cyber attack is an IT attack in cyberspace directed against one or several other IT systems and aimed at damaging IT security. The aims of IT security, confidentiality, integrity and availability may all or individually be compromised. Cyber attacks directed against the confidentiality of an IT system, which are launched or managed by foreign intelligence services, are called cyber espionage. Cyber attacks against the integrity and availability of IT systems are termed cyber sabotage. Source: \u003Ca href=\u0022http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Strategische-Themen\/css_engl_download.pdf;jsessionid=5B6636607CB58EFBB61431566F7E5B15.2_cid334?__blob=publicationFile\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy for Germany (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003E\u003Cstrong\u003EThe term \u201cIncident\u201d is used.\u003C\/strong\u003E\u003Cbr \/\u003E\nIncident shall mean an event, act or omission which gives rise or may give rise to an unauthorized access to an information system or electronic communications network, disruption or change of the operation (including takeover of control) of an information system or electronic communications network, destruction, damage, deletion or the change of electronic information, removal or limiting of the possibility to use electronic information and, also, which gives rise or may give rise to the appropriation, publication, dissemination or any other use of non-public electronic information by persons unauthorized to do so. Source: \u003Ca href=\u0022http:\/\/www.ird.lt\/doc\/teises_aktai_en\/EIS(KS)PP_796_2011-06-29_EN_PATAIS.pdf\u0022 target=\u0022_blank\u0022\u003EProgramme for the development electronic information security (Cyber security) for 2011-2019\u003C\/a\u003E\u003C\/p\u003E\n"},"NATO":{"description":"\u003Cp\u003EAction taken to disrupt, deny, degrade or destroy information resident in a computer and\/or computer network, or the computer and\/or computer network itself. Note: A computer network attack is a type of cyber attack.\u00a0Source: \u003Ca href=\u0022http:\/\/nsa.nato.int\/nsa\/zPublic\/ap\/aap6\/AAP-6.pdf\u0022 target=\u0022_blank\u0022\u003ENATO AAP-06 Edition 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zealand":{"description":"\u003Cp\u003EAn\u00a0 attempt to\u00a0undermine or\u00a0compromise the function\u00a0of\u00a0a\u00a0computer-based\u00a0 system,\u00a0access information, or attempt to track the online movements of individuals without their permission. Source: \u003Ca href=\u0022http:\/\/www.dpmc.govt.nz\/sites\/all\/files\/publications\/nz-cyber-security-strategy-june-2011_0.pdf\u0022 target=\u0022_blank\u0022\u003ENew Zealand\u0027s Cyber Security Strategy (June 2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"NIST":{"description":"\u003Cp\u003EAn attack, via cyberspace, targeting an enterprise\u2019s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment\/infrastructure; or destroying the integrity of the data or stealing controlled information.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003ENIST US Department of Commerce: Glossary of Key Information Security Terms (June 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cyberattack] An attempt by hackers to damage or destroy a computer network or system.\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EAn attack, via cyberspace, targeting an enterprise\u2019s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment\/infrastructure; or destroying the integrity of the data or stealing controlled information. Source: \u003Ca href=\u0022http:\/\/www.ncix.gov\/publications\/policy\/docs\/CNSSI_4009.pdf\u0022 target=\u0022_blank\u0022\u003ECNSS Instruction No. 4009\u00a0(26 Apr 2010)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn attack, via cyberspace, targeting an enterprise\u2019s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment\/infrastructure; or destroying the integrity of the data or stealing controlled information.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, \u00a0- 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n"},"Tallinn Manual":{"description":"\u003Cp\u003EA cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 30\u003C\/a\u003E\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ean offensive use of a cyber weapon intended to hard designated target\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003Ean offensive use of a cyber weapon intended to hard designated target\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Switzerland":{"description":"\u003Cp\u003ECyber-attacks are carried out on computers, networks and data. They are aimed at disrupting the integrity of the data or the functioning of the infrastructure and restricting or interrupting their availability. They also seek to compromise the confidentiality or authenticity of information by means of unauthorised reading, deletion or modification of data, connections or server services are overloaded, information channels spied upon or surveillance and processing systems are manipulated in a targeted manner.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber-attacks are carried out on computers, networks and data. They are aimed at disrupting the integrity of the data or the functioning of the infrastructure and restricting or interrupting their availability. They also seek to compromise the confidentiality or authenticity of information by means of unauthorised reading, deletion or modification of data, connections or server services are overloaded, information channels spied upon or surveillance and processing systems are manipulated in a targeted manner.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: Hostile action deployed to affect the cyberspace and cybersecurity.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ETranslation: Hostile action deployed to affect the cyberspace and cybersecurity.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Nigeria":{"description":"\u003Cp\u003EIt usually involves the use of malicious codes to alter digital codes, logic or data, resulting in disruptive consequences that can compromise the confidentiality, integrity, and availability of data and lead to manipulation of information systems and internetwork infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EIt usually involves the use of malicious codes to alter digital codes, logic or data, resulting in disruptive consequences that can compromise the confidentiality, integrity, and availability of data and lead to manipulation of information systems and internetwork infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003EThe term cyber attack can refer to anything from small-scale email scams through to sophisticated large-scale attacks with diverse political and economic motives. Large-scale attacks may have a number of interrelated aims such as: gaining unauthorised access to sensitive information; causing disruption to IT infrastructure; or causing physical disruption (e.g. to industrial systems).\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Attacks":{"Czech Republic":{"description":"\u003Cp\u003ECyber attacks directed against the public as well as private sectors are increasingly frequent and sophisticated. They can cause in particular failures of communication, energy and transport networks, transport processes and industrial and financial systems, resulting in considerable material damage. The armed forces\u00b4 dependence on information and communication systems may affect the defence capability of the state. Another problem closely associated with cyber attacks is political and economic espionage.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.army.cz\/images\/id_8001_9000\/8503\/15_02_Security_Strategy_2015.pdf\u0022\u003ESecurity Strategy of the Czech Republic - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Awareness":{"Austria":{"description":"\u003Cp\u003E[Cyber] Awareness refers to the security awareness of all persons sharing responsibility for information security. Understanding and motivation are necessary to ensure that security rules are observed and implemented on a continuous basis. To remind employees regularly of the importance of their activities for information security, they must be supported through targeted awareness-raising measures. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Conflict":{"US\/Russia":{"description":"\u003Cp\u003Ea tense situation between and\/or among nation-states and\/or organized groups where unwelcome cyber attacks result in retalition\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Counter-Attack":{"US\/Russia":{"description":"\u003Cp\u003Euse of a cyber weapon intended to harm a designated target in response to an attack\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Countermeasures":{"Czech Republic":{"description":"\u003Cp\u003ECountermeasures\u00a0 mean\u00a0 the\u00a0 acts\u00a0 of\u00a0 the\u00a0 National Security Agency\u00a0 needed\u00a0 to\u00a0 protect\u00a0 information systems or services and electronic communication networks from\u00a0 the\u00a0 threat in the cyber security\u00a0 field\u00a0 or from\u00a0 the\u00a0 cyber\u00a0 security\u00a0 incident\u00a0 or\u00a0 acts\u00a0 to solve already\u00a0 present\u00a0 cyber security incident.\u003C\/p\u003E\n\u003Cp\u003EProtective countermeasure by measure\u00a0 of general nature\u00a0 on the\u00a0 basis\u00a0 of\u00a0 an\u00a0 already\u00a0 solved\u00a0 cyber\u00a0 security\u00a0 incident\u00a0 analysis\u00a0 in\u00a0 order\u00a0 to\u00a0 increase protection of information systems or services or electronic communication networks. Source: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft\u00a0 Act on Cyber Security (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Crime":{"Australia":{"description":"\u003Cp\u003EThe Australian Government defines cyber crime as those computer offences under the Commonwealth Criminal Code Act 1995 (Part 10.7) which involve the unauthorised access to, modification or impairment of electronic communications. Source: \u003Ca href=\u0022http:\/\/www.dpmc.gov.au\/national_security\/docs\/national_security_strategy.pdf\u0022 target=\u0022_blank\u0022\u003EAustralian Government, Cyber Security Strategy (2009)\u003C\/a\u003E\u003C\/p\u003E\n"},"Austria":{"description":"\u003Cp\u003ECyber crime comprises illegal attacks from cyber space on or through ICT systems, which are defined in penal or administrative laws. The term therefore covers all criminal offences committed with the aid of information technologies and communications networks and also encompasses Internet crime. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EActs contravening international treaties and national laws, targeting networks or information systems, or using them to commit an offence or crime. Source:\u00a0\u003Ca href=\u0022http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf\u0022 target=\u0022_blank\u0022\u003EInformation Systems and Defence \u2013 France\u2019s Strategy (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zealand":{"description":"\u003Cp\u003EAny crime where information and communications technology is:\u003Cbr \/\u003E\n1. used as a tool in the commission of an offence\u003Cbr \/\u003E\n2. the target of an offence\u003Cbr \/\u003E\n3. a storage device in the commission of an offence.\u003Cbr \/\u003E\nIn New Zealand some of the most common examples of cyber crime include fraud, identity theft and organised crime. Source: \u003Ca href=\u0022http:\/\/www.dpmc.govt.nz\/sites\/all\/files\/publications\/nz-cyber-security-strategy-june-2011_0.pdf\u0022 target=\u0022_blank\u0022\u003ENew Zealand\u0027s Cyber Security Strategy (June 2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cybercrime] Crime conducted via the Internet or some other computer network.\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ethe use of cyberspace for criminal purposes as defined by national or international law\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Qatar":{"description":"\u003Cp\u003EMisconduct or crime committed using technology. Examples of cyber crime may include illegal access to systems or information, fraud, identity theft, or content-related offenses such as spam.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Defence":{"Austria":{"description":"\u003Cp\u003EThe term \u201ccyber defence\u201d refers to all measures to defend cyber space with military and appropriate means for achieving military-strategic goals. Cyber defence is an integrated system, comprising the implementation of all measures relating to ICT and information security, the capabilities of milCERT and CNO (Computer Network Operations) as well as the support of the physical capabilities of the army. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EThe set of all technical and non-technical measures allowing a State to defend in cyberspace information systems that it considers to be critical. Source: \u003Ca href=\u0022http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf\u0022 target=\u0022_blank\u0022\u003EInformation Systems and Defence \u2013 France\u2019s Strategy (2011) \u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003ECyber defence is mainly used in military context, but it may be also related to criminal and espionage activities. NATO uses the following definition when referring to cyber defence the ability to safeguard the delivery and management of services in an operational Communications and Information Systems (CIS) in response to potential and imminent as well as actual malicious actions that originate in cyberspace.\u0022\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Defense":{"US\/Russia":{"description":"\u003Cp\u003Eorganized capabilities to protect against, mitigate from and rapifly reciver frim the effects of cyber attack\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EThe set of all technical and non-technical measures allowing a State to defend in cyberspace information systems that it considers to be critical.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Columbia":{"description":"\u003Cp\u003ETranslation: State capacity to prevent and counter any threat or incident that is cybernetic in nature which affects national sovereignty.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003EThe application of effective protective measures to obtain an appropriate level of Cyber Security in order to guarantee Defence`s operation and functionalities. This is achieved by applying appropriate protective measures to reduce the security risk to an acceptable level. Cyber Defence consists of following duties: Protect, Detect, Respond, and Recover\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Defensive Capability":{"US\/Russia":{"description":"\u003Cp\u003Ecapability to effectively protect and repel against a cyber exploitation or cyber attack that may be used as a cyber deterrent\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Defensive Countermeasure":{"US\/Russia":{"description":"\u003Cp\u003Edeployment of a specific cyber defensive capability to defest or to redirect a cyber attack\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Deterrent":{"US\/Russia":{"description":"\u003Cp\u003Ea declared mechanism that is presumed effective in discouraging cyber conflict or a threatening activity in cyberspace\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Domain":{"Finland":{"description":"\u003Cp\u003ECyber domain means an electronic information (data) processing domain comprising of one or several information technology infrastructures.\u003Cbr \/\u003E\nNote 1: Representative to the environment is the utilisation of electronics and the electromagnetic spectrum for the purpose of storing, processing and transferring data and information via telecommunications networks.\u003Cbr \/\u003E\nNote 2: Information (data) processing means collecting, saving, organising, using, transferring, disclosing, storing, modifying, combining, protecting, removing, destroying and other similar actions on information (data).\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.yhteiskunnanturvallisuus.fi\/en\/materials\/doc_download\/40-finlandas-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EFinland\u2019s Cyber Security Strategy Government Resolution (24 Jan 2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Electromagnetic Activities":{"US":{"description":"\u003Cp\u003EActivities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EActivities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system. (ADRP 3-0)\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Emergency":{"Czech Republic":{"description":"\u003Cp\u003EState\u00a0 of\u00a0 cyber\u00a0 emergency\u00a0 means\u00a0 a\u00a0 state,\u00a0 during\u00a0 which\u00a0 information\u00a0 security\u00a0 in information\u00a0 systems\u00a0 or\u00a0 services\u00a0 or\u00a0 electronic\u00a0 communication\u00a0 networks security\u00a0 is seriously\u00a0 endangered\u00a0 and\u00a0 the\u00a0 interests\u00a0 of\u00a0 the\u00a0 Czech\u00a0 Republic\u00a0 may\u00a0 thus\u00a0 be\u00a0 violated\u00a0 or endangered.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft\u00a0Act on Cyber Security (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Entity":{"US\/Russia":{"description":"\u003Cp\u003Eany distinct thing or actor that exists within the cyber infrastructure\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Environment":{"International Telecommunication Union":{"description":"\u003Cp\u003EThis includes users, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.\u00a0Source: \u003Ca href=\u0022https:\/\/www.itu.int\/rec\/T-REC-X.1205-200804-I\u0022 target=\u0022_blank\u0022\u003EITU Publications X.1205 : Overview of cybersecurity (2008)\u00a0 \u003C\/a\u003E\u003C\/p\u003E\n"},"International Telecommunications Union":{"description":"\u003Cp\u003EThis includes users, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Espionage":{"Austria":{"description":"\u003Cp\u003ECyber attacks directed against the confidentiality of an IT system are referred to as \u201ccyber espionage\u201d, i.e. digital spying. Cyber attacks directed against the integrity and availability of an IT system are referred to as cyber sabotage. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003EA cyber attack is an IT attack in cyberspace directed against one or several other IT systems and aimed at damaging IT security. The aims of IT security, confidentiality, integrity and availability may all or individually be compromised. Cyber attacks directed against the confidentiality of an IT system, which are launched. or managed by foreign intelligence services, are called cyber espionage. Cyber attacks against the integrity and availability of IT systems are termed cyber sabotage. Source: \u003Ca href=\u0022http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Strategische-Themen\/css_engl_download.pdf;jsessionid=5B6636607CB58EFBB61431566F7E5B15.2_cid334?__blob=publicationFile\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy for Germany (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[cyberespionage] The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization.\u003C\/p\u003E\n"},"Tallinn Manual":{"description":"\u003Cp\u003EDefined narrowly as any act undertaken clandestinely or under false pretences that uses cyber capabilities to gather (or attempt to gather information with the intention of communicating it to the opposing party.\u00a0 The act must occur in a territory controlled by a party to the conflict. \u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 66\u003C\/a\u003E\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ea cyber operation to obtain unauthorized access to sensitive information throguh covert means\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003ECyber attacks have aimed to steal sensitive information and data from financial, government and utilities infrastructure targets. These attacks can target intellectual property or sensitive information about organisations or government\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECyber-espionage involving inter alia the silent gathering of information.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber espionage means the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitiors, rivals, groups, Governments and enemies for personal, economic, political or military advantage\u0022\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022 target=\u0022_blank\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: Actions carried out in cyberspace with the purpose of obtaining unauthorized, confidential information in the interest of state or non state entities.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"NATO CCD COE":{"description":"\u003Cp\u003ECyber espionage is defined narrowly as any act undertaken clandestinely or under false pretences that uses cyber capabilities to gather (or attempt to gather_ information with the intention of communicating it to the opposing party. The act must occur in territory controlled by a party to the conflict. \u0022\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003ECyber espionage is defined as the use of an agent in order to obtain information about plans or activities of foreign country or competitive company\u0022.\u0022\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber espionage is defined as the use of an agent in order to obtain information about plans or activities of foreign country or competitive company\u0022. It is not uncommon that companies or governments are faced with attempts of unauthorised access to their computer systems via Internet. Many countries use espionage tools to encourage their economic development based on advanced technologies of other nations. ICT present foundation of development and implementation of most other technologies both in civilian and military sectors, and thereupon they have become primary target of espionage\u0022\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy for Montenegro 2013-2017 - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Event":{"Czech Republic":{"description":"\u003Cp\u003ECyber security event means an event which may cause security of information breach in information systems or security of services or security and integrity of electronic communication networks breach. Source: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft\u00a0Act on Cyber Security (2014)\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EA cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation). National Institute of Standards and Technology.\u00a0Source: \u003Ca href=\u0022http:\/\/www.nist.gov\/cyberframework\/upload\/cybersecurity-framework-021214-final.pdf\u0022 target=\u0022_blank\u0022\u003EDraft Framework for Improving Critical Infrastructure Cybersecurity (2014)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Exercise":{"US":{"description":"\u003Cp\u003EA planned event during which an organization simulates a cyber disruption to develop or test capabilities such as preventing, detecting, mitigating, responding to or recovering from the disruption.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Exfiltration":{"US\/Russia":{"description":"\u003Cp\u003Ea type of cyber operation that involves copying or removing any data\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Exploitation":{"US\/Russia":{"description":"\u003Cp\u003Etaking advantage of an opportunity in cyberspace to achieve an objective\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Forces":{"US\/Russia":{"description":"\u003Cp\u003Ecyber assets orgtanized for conducting cyber operations\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Incident":{"US":{"description":"\u003Cp\u003EActions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and\/or the information residing therein.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2015 July\u003C\/a\u003E\u003C\/p\u003E\n"},"Czech Republic":{"description":"\u003Cp\u003ECyber\u00a0 security\u00a0 incident\u00a0 means\u00a0 a\u00a0 cyber security\u00a0 event\u00a0 during\u00a0 which\u00a0 security\u00a0 of information in information systems\u00a0 breach\u00a0 or security of services\u00a0 or security and integrity of electronic communication networks breach occurred. Source: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft\u00a0Act on Cyber Security (2014) \u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003EIncident shall mean an event, act or omission which gives rise or may give rise to an unauthorized access to an information system or electronic communications network, disruption or change of the operation (including takeover of control) of an information system or electronic communications network, destruction, damage, deletion or the change of electronic information, removal or limiting of the possibility to use electronic information and, also, which gives rise or may give rise to the appropriation, publication, dissemination or any other use of non-public electronic information by persons unauthorized to do so. Source: \u003Ca href=\u0022http:\/\/www.ird.lt\/doc\/teises_aktai_en\/EIS(KS)PP_796_2011-06-29_EN_PATAIS.pdf\u0022 target=\u0022_blank\u0022\u003E\u003Cfont color=\u0022#0066cc\u0022\u003EProgramme for the development electronic information security (Cyber security) for 2011-2019\u003C\/font\u003E\u003C\/a\u003E\u003C\/p\u003E\n"},"USA":{"description":"\u003Cp\u003EActions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and\/or the information residing therein.\u00a0Source: \u003Ca href=\u0022http:\/\/www.ncix.gov\/publications\/policy\/docs\/CNSSI_4009.pdf\u0022 target=\u0022_blank\u0022\u003ECNSS Instruction No. 4009 (26 Apr 2010)\u003C\/a\u003E\u003C\/p\u003E\n"},"NIST":{"description":"\u003Cp\u003EActions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and\/or the information residing therein.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003ENIST US Department of Commerce: Glossary of Key Information Security Terms (June 2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Infrastructure":{"US\/Russia":{"description":"\u003Cp\u003Ethe aggregation of people, processes and systems that contitute cyberspace\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EIncludes electronic information and communications systems and services and the information contained in these systems and services. Information and communications systems and services are composed of all hardware and software that process, store, and communicate information, or any combination of all of these elements. Processing includes the creation, access, modification, and destruction of information. Storage includes paper, magnetic, electronic, and all other media types. Communications include sharing and distribution of information. For example: computer systems; control systems (e.g., supervisory control and data acquisition\u2013SCADA); networks, such as the Internet; and cyber services (e.g., managed security services) are part of cyber infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, \u00a0- 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n"}},"Cyber Intelligence":{"Belgium":{"description":"\u003Cp\u003EActivities using all \u0022intelligence\u0022 sources in support of Cyber Security to map out the general cyber threat, to collect cyber intentions and possibilities of potential adversaries, to analyse and communicate, and to identify, locate, and allocate the source of cyber-attacks.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Offensive":{"Belgium":{"description":"\u003Cp\u003EThe offensive capacity includes the manipulation or disruption of networks and systems with the purpose of limiting or eliminating the adversary\u00b4s operational capability.This capability can be required to guaranteeone\u00b4s freedom of action in the cyber domain. Cyber-attackscan be launched to repel an attack (active defence) or to support the operational action.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Offensive Capabiltiy":{"US\/Russia":{"description":"\u003Cp\u003Ea capabiltiy to initiate a cyber attackthat may be used as a cyber deterrent\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Operation":{"US\/Russia":{"description":"\u003Cp\u003Eorganized activities in cyberspace to gather, prepare, disseminate, restrot or process information to achieve a goal\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Operations":{"Tallinn Manual":{"description":"\u003Cp\u003EThe employment of cyber capabilities with the primary purpose of achieving objectives in or by the use of cyberspace.\u003Cbr \/\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace. Such operations include computer network operations and activities to operate and defend the global information grid (GIG)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Penetration":{"US\/Russia":{"description":"\u003Cp\u003Eunauthorized entry into a cyber entity\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Reconnaissance":{"Tallinn Manual":{"description":"\u003Cp\u003EThe use of cyber capabilities to obtain information about activities, information resources, or system capabilities.\u003Cbr \/\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Related Incident of National Significance":{"India":{"description":"\u003Cp\u003ECyber related incident of national significance can take any form, an organized cyber attack, an uncontrolled exploit such as computer virus or worms or any malicious software code, a natural disaster with significant cyber consequences or other related incidents capable of causing extensive damage to the information infrastructure of key assets. Large-scale cyber indicent may overwhelm the government, public and private sector resources and services by disrupting fundtioning of cirical information systems. Complications from of such a magnitude may threaten lives, economy and national security.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/deity.gov.in\/sites\/upload_files\/dit\/files\/National%20Cyber%20Security%20Policy%20(1).pdf\u0022 target=\u0022_blank\u0022\u003EMinistry of Communication and Information Technology, Deparment of Electronics and Information Technolgy, Notificaiton on National Cyber Security Policy-2013 (NCSP-2013) - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Safety":{"Australia":{"description":"\u003Cp\u003ECyber safety is about helping to protect individuals, especially children, from online risks such as exposure to offensive content, cyber-bullying or grooming online. The Government\u2019s cyber-safety measures include law enforcement, filtering and education. Source: \u003Ca href=\u0022http:\/\/www.cybersmart.gov.au\u0022 target=\u0022_blank\u0022\u003Ewww.cybersmart.gov.au\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Security ":{"Australia":{"description":"\u003Cp\u003EMeasures relating to the confidentially, availability and integrity of information that is processed, stored and communicated by electronic or similar means. Source: \u003Ca href=\u0022http:\/\/www.ag.gov.au\/RightsAndProtections\/CyberSecurity\/Pages\/default.aspx\u0022 target=\u0022_blank\u0022\u003EAustralian Government\u003C\/a\u003E\u003C\/p\u003E\n"},"Austria":{"description":"\u003Cp\u003ECyber security describes the protection of a key legal asset through constitutional means against actor-related, technical, organisational and natural dangers posing a risk to the security of cyber space (including infrastructure and data security) as well as the security of the users in cyber space. Cyber security helps to identify, assess and follow up on threats as well as to strengthen the ability to cope with interferences in or from cyber space, to minimise the effects as well as to restore the capacity to act and functional capabilities of the respective stakeholders, infrastructures and services. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Czech Republic":{"description":"\u003Cp\u003ECyber security means a complex of legal, organizational, technical and educational means ensuring the protection of cyber space. Source: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft Act on Cyber Security (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber security means a complex of legal, organizational, technical and educational means ensuring the protection of cyber space.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Finland":{"description":"\u003Cp\u003ECyber security means the desired end state in which the cyber domain is reliable and in which its functioning is ensured.\u003Cbr \/\u003E\nNote 1: In the desired end state the cyber domain will not jeopardise, harm or disturb the operation of functions dependent on electronic information (data) processing.\u003Cbr \/\u003E\nNote 2: Reliance on the cyber domain depends on its actors implementing appropriate and sufficient information security procedures (\u2018communal data security\u2019). These procedures can prevent the materialisation of cyber threats and, should they still materialise, prevent, mitigate or help tolerate their consequences.\u003Cbr \/\u003E\nNote 3: Cyber security encompasses the measures on the functions vital to society and the critical infrastructure which aim to achieve the capability of predictive management and, if necessary, tolerance of cyber threats and their effects, which can cause significant harm or danger to Finland or its population.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.yhteiskunnanturvallisuus.fi\/en\/materials\/doc_download\/40-finlandas-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EFinland\u2019s Cyber Security Strategy Government Resolution (24 Jan 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EThe desired state of an information system in which it can resist events from cyberspace likely to compromise the availability, integrity or confidentiality of the data stored, processed or transmitted and of the related services that these systems offer or make accessible. Cybersecurity makes use of information systems security techniques and is based on fighting cybercrime and establishing cyber defence. Source: \u003Ca href=\u0022http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf\u0022 target=\u0022_blank\u0022\u003EInformation Systems and Defence \u2013 France\u2019s Strategy (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003ECyber security\u201d and \u201ccivilian and military cyber security\u201d (Global) cyber security is the desired objective of the IT security situation, in which the risks of global cyberspace have been reduced to an acceptable minimum. Hence, cyber security in Germany is the desired objective of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is the sum of suitable and appropriate measures. Civilian cyber security focuses on all IT systems for civilian use in German cyberspace. Military cyber security focuses on all IT systems for military use in German cyberspace. Source:\u00a0\u003Ca href=\u0022http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Strategische-Themen\/css_engl_download.pdf\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy for Germany (2011) \u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ETranslation: Cybersecurity expands the area of activity of classic IT security to cover the entire cyberspace. The latter encompasses all information technology connecting with the Internet or comparable networks including cyberspace-based communication, applications, processes, and processed information. Thereby, for all intents and purposes, the entire modern information and communications technology becomes part of cyberspace.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Hungary":{"description":"\u003Cp\u003ECyber security is the continuous and planned taking of political, legal, economic, educational, awareness-raising and\u00a0technical measures to manage risks in cyberspace that transforms\u00a0the\u00a0cyberspace\u00a0 into\u00a0a\u00a0reliable environment\u00a0for the smooth functioning and operation of societal and economic processes by ensuring an acceptable level of risks in cyberspace. Source: \u003Ca href=\u0022http:\/\/www.nbf.hu\/anyagok\/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy of Hungary (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"International Organization for Standardization and International Electrotechnical Commission":{"description":"\u003Cp\u003E\u201cCybersecurity\u201d or \u201cCyberspace security\u201d [is], defined as the \u201cpreservation of confidentiality, integrity and availability of information in the Cyberspace\u201d. Source: \u003Ca href=\u0022http:\/\/www.iso27001security.com\/html\/27032.html\u0022 target=\u0022_blank\u0022\u003EISO\/IEC 27032:2012\u00a0 Information technology \u2014 Security techniques \u2014 Guidelines for cybersecurity\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EPreservation of confidentiality, integrity and availability of information in the Cyberspace. Source: \u003Ca href=\u0022http:\/\/www.iso27001security.com\/html\/27032.html\u0022 target=\u0022_blank\u0022\u003EISO\/IEC 27032:2012\u00a0 Information technology \u2014 Security techniques \u2014 Guidelines for cybersecurity\u003C\/a\u003E\u003C\/p\u003E\n"},"International Telecommunication Union":{"description":"\u003Cp\u003ECybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user\u0027s assets. Organization and user\u0027s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and\/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user\u0027s assets against relevant security risks in the cyber environment. The general security objectives comprise the following:\u003Cbr \/\u003E\n\u2022 Availability\u003Cbr \/\u003E\n\u2022 Integrity, which may include authenticity and non-repudiation\u003Cbr \/\u003E\n\u2022 Confidentiality.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/www.itu.int\/rec\/T-REC-X.1205-200804-I\u0022 target=\u0022_blank\u0022\u003EITU Publications X.1205 : Overview of cybersecurity (2008)\u003C\/a\u003E\u003C\/p\u003E\n"},"The Netherlands":{"description":"\u003Cp\u003ECyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of the confidentiality and\/or integrity of information stored in the ICT systems. Source: \u003Ca href=\u0022http:\/\/english.nctv.nl\/images\/national-cyber-security-strategy-2_tcm92-520278.pdf\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy 2 - From Awareness to Capability (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zealand":{"description":"\u003Cp\u003EThe practice of making the networks that constitute cyber space as secure as possible against intrusions,\u00a0maintaining\u00a0confidentiality,\u00a0availability\u00a0and\u00a0integrity\u00a0of information,\u00a0detecting intrusions and incidents that do occur, and responding to and recovering from them. Source: \u003Ca href=\u0022http:\/\/www.dpmc.govt.nz\/sites\/all\/files\/publications\/nz-cyber-security-strategy-june-2011_0.pdf\u0022 target=\u0022_blank\u0022\u003ENew Zealand\u0027s Cyber Security Strategy (June 2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"NIST":{"description":"\u003Cp\u003E[Cybersecurity]\u00a0 The ability to protect or defend the use of cyberspace from cyber attacks.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003ENIST US Department of Commerce: Glossary of Key Information Security Terms (June 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Norway":{"description":"\u003Cp\u003EProtection of data and systems connected to the Internet. Source: \u003Ca href=\u0022http:\/\/www.regjeringen.no\/upload\/FAD\/Vedlegg\/IKT-politikk\/Cyber_Security_Strategy_Norway.pdf\u0022 target=\u0022_blank\u0022\u003ECyber Strategy for Norway (2012)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cybersecurity] The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.\u003C\/p\u003E\n"},"Saudi Arabia":{"description":"\u003Cp\u003EThe ability to protect or defend the use of cyberspace from cyber-attacks. Source: \u003Ca href=\u0022http:\/\/www.mcit.gov.sa\/Ar\/MediaCenter\/PubReqDocuments\/NISS_Draft_7_EN.pdf\u0022 target=\u0022_blank\u0022\u003EDrafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe ability to protect or defend the use of cyberspace from cyber-attacks\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003E\u201cCybersecurity\u201d is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and assets. Source: \u003Ca href=\u0022http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/national-cyber-security-strategies-ncsss\/southafricancss.pdf\u0022 target=\u0022_blank\u0022\u003ECyber Security Policy of South Africa (19 Feb 2010)\u003C\/a\u003E\u003C\/p\u003E\n"},"Turkey":{"description":"\u003Cp\u003ECyber security: Protection of information systems that make up the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents, putting into force the countermeasures against these incidents and then putting these systems back to their states previous to the cyber security incident.\u003Cbr \/\u003E\nNational Cyber Security: The cyber security of all services, processes and data \u2013and the systems involved in provisioning of these- provided by the information and communication technologies in the national cyber space.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.ccdcoe.org\/strategies\/TUR_CyberSecurity.pdf\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy and 2013-2014 Action Plan\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe process of protecting information by preventing, detecting, and responding to attacks. Source: \u003Ca href=\u0022http:\/\/www.nist.gov\/cyberframework\/upload\/cybersecurity-framework-021214-final.pdf\u0022 target=\u0022_blank\u0022\u003EDraft Strategy for Improving Critical Infrastructure Cybersecurity (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe ability to protect or defend the use of cyberspace from cyber attacks. Source:\u00a0\u003Ca href=\u0022http:\/\/www.ncix.gov\/publications\/policy\/docs\/CNSSI_4009.pdf\u0022 target=\u0022_blank\u0022\u003ECNSS Instruction No. 4009 (26 Apr 2010)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E1.The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and\/or defended against damage, unauthorized use or modification, or exploitation.\u003C\/p\u003E\n\u003Cp\u003E2. Strategy, policy, and standards regarding the security of and operations in cyberspace, and encompass[ing] the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/niccs.us-cert.gov\/glossary#letter_c\u0022 target=\u0022_blank\u0022\u003ENational Initiative for Cybersecurity Careers and Studies - A Glossary of Common Cybersecurity Terminology\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe process of protecting information by preventing, detecting, and responding to attacks. Source:\u00a0\u003Ca href=\u0022http:\/\/www.nist.gov\/cyberframework\/upload\/cybersecurity-framework-021214-final.pdf\u0022 target=\u0022_blank\u0022\u003ENational Institute of Standards and Technology. US Department of Homeland Security - Draft Framework for Improving Critical Infrastructure Cybersecurity (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe vulnerability of any computing system, software program, or critical infrastructure, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n"},"UN\/Sweden":{"description":"\u003Cp\u003ESweden will mainly use the term \u0022cybersecurity\u0022 and related concepts, signifying efforts aimed at the preservation of the confidentiality, availability and integrity of information in electronic communications networks and IT systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003ECyber security embraces both the protection of UK interests in cyber space and also the pursuit of wider UK security policy through exploitation of the many opportunities that cyber space offers. It is important to remember that cyber security is not an end in itself. It should not discourage the use of new technologies. The Government\u00b4s Digital Britain Strategy aims to make the UK the leading major economy for innovation, investment and quality in the digital and communications industries. The Government\u00b4s ultimate goal is to enable the full benefits of cyber space for the UK\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003ETranslation: A set of conditions under which all components of cyberspace are protected from the maximum number of threats and impacts with undesirable consequences.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: The state of normality resulting from the application of a set of proactive and reactive measures that ensure the confidentiality, integrity, availability, authenticity, and non-repudiation of information electronically for public and private resources and services in cyberspace. Proactive and reactive measures may include policies, concepts, standards and guidelines for security, risk management, training and awareness activities, implementing technical solutions to protect cyber infrastructure, identity management, and consequence management.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2007\u003C\/a\u003E\u003C\/p\u003E\n"},"Qatar":{"description":"\u003Cp\u003EThe collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the cyber environment and organization and user\u00b4s assets. Organization and user\u00b4s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and\/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user\u00b4s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: confidentiality, integrity (which may include authenticity and non-repudiation), and availability\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ESafeguards or counter measures to ensure the confidentiality, integrity, and availability of information assets, systems, or networks and mitigate the risk to those assets, systems, and networks\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Latvia":{"description":"\u003Cp\u003E\u003Cspan style=\u0022line-height: 18.9091px;\u0022\u003ECyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurances and technologies that can be used to protect the cyber environment and organizations and user\u0027s assets. Organisation and user\u0027s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and\/or stored information in teh cyber environment.\u003C\/span\u003E\u003Cbr style=\u0022line-height: 18.9091px;\u0022 \/\u003E\u003Cbr \/\u003E\u003Cbr style=\u0022line-height: 18.9091px;\u0022 \/\u003E\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 18.9091px;\u0022\u003ESource:\u00a0\u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 style=\u0022line-height: 18.9091px;\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy of Latvia 2014-2018 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003ECyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of the confidentiality and\/or integrity of information stored in the ICT systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber security seeks to ensure the attainment and maintenance of the security properties of the organisation and user\u2019s assets against relevant security risks in the cyber environment. General security objectives comprise the following: availability; integrity, which may include authenticity and non-repudiation; and confidentiality\u201d.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EInternational Standardisation Organisation (ISO) defines cyber security as \u201cpreservation of confidentiality, integrity and availability of information in cyberspace\u201d. The Netherlands have offered a little broader definition: \u201cfreedom from danger or damage caused by disruption, failure or abuse of ICT systems\u201d Danger or damage caused by disruption, failure or abuse may consist of a limitation in the availability or reliability of ICT systems, a breach of the confidentiality stored in them, or damage to the integrity of the information. ITU also defines broadly the cyber security: \u201ccollection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user\u2019s assets. Cyber security seeks to ensure the attainment and maintenance of the security properties of the organisation and user\u2019s assets against relevant security risks in the cyber environment. General security objectives comprise the following: availability; integrity, which may include authenticity and non-repudiation; and confidentiality\u201d\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003EElectronic information security (cyber security).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Kenya":{"description":"\u003Cp\u003EThe processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.icta.go.ke\/wp-content\/uploads\/2014\/03\/GOK-national-cybersecurity-strategy.pdf\u0022 target=\u0022_blank\u0022\u003EGovernmetn of Kenya, Cybersecurity Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Japan":{"description":"\u003Cp\u003EJapan aims to construct a \u0022world-leading,\u0022 \u0022resilient\u0022 and \u0022vigorous\u0022 cyberspace, and incorporate this cyberspace as a social system to realize a \u0022\u0022cybersecurity nation\u0022\u0022 as a society that is strong against cyber attacks, full of innovations and of which its people will be proud. \u0022\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Jamaica":{"description":"\u003Cp\u003Ethe implementation of measures to protect ICT infrastructure including critical infrastructure from intrusion, unauthorized access and includes the adoption of policies, protocols and good practices to better govern the use of cyberspace\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EJamaica National Cyber Security Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EThe present National Cybersecurity Strategic Framework and the related National Plan, both foreseen by the Prime minister\u0027s \u0022Decree Containing Strategic Guidelines for the National Cyber Protection and ICT Security\u0022 of the 24th January 2013, aim at enhancing the national preparedness to respond to present and future challenges affecting cyberspace, and are devoted to directing all national efforts toward common and agreed solutions, knowing that cybersecurity is a process rather than an end to itself, that technical innovations will always introduce new vulnerabilities in the strategic and operational horizon, and that the intrinsic nature of cyber threats makes our defence, at least for the time being, mostly - although not exclusively - reactive.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"International Organization for Standardization":{"description":"\u003Cp\u003ECybersecurity or \u0022Cyberspace security\u0022 [is], defined as the \u0022preservation of confidentiality, integrity and availability of information in the Cyberspace\u0022.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"India":{"description":"\u003Cp\u003EProtecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ETo build a secure and resilient cyberspace for citizens, businesses and Government. To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology and cooperation\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Ghana":{"description":"\u003Cp\u003EOur vision is to secure the Critical National Information Infrastructure (CNII) and make it resilient, and for Ghana to be self-reliant in securing its cyber space by infusing a culture of security to promote stability, social wellbeing and wealth creation of our people. All actors in law enforcement, national security, network security practitioners in government and business, and the public will take part in the vision\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Georgia":{"description":"\u003Cp\u003EThe security of cyber space and the protection of electronic information is very important for Georgia. As information technologies rapidly evolve, critical infrastructure is becoming more dependent on them. Therefore, combating cyber crime and protecting against cyber attacks is very important to the national interests of Georgia\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"EU":{"description":"\u003Cp\u003ECyber-security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber-security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Estonia":{"description":"\u003Cp\u003EIt is an essential precondition for the securing of cyberspace that every operator of a computer, computer network or information system realises the personal responsibility of using the data and instruments of communication at his or her disposal in a purposeful and appropriate manner. Estonia\u00b4s cyber security strategy seeks primarily to reduce the inherent vulnerabilities of cyberspace in the nation as a whole\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/;https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Columbia":{"description":"\u003Cp\u003ETranslation: Capacity of the state to minimize the risks they and their citizens are exposed to, in the face of threats and incidents of the cyber nature.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003ETranslation: Cybersecurity is the desired situation or protection of cyberspace and is proportional to the cyber threat and potential consequences of cyber attacks. In a situation of cyber security, disruption, attack, or misuese of ICT does not cause any danger or harm. The consequences of abuse, disruption or attack may include restricting availability and reliability of ICT, the violation of the confidentiality of information, or the damaging of the integrity of information (addition, deletion, or modification [of information] are illegal).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe desired situation in which the protection of cyberspace is proportionate to the cyber threat and the possible consequences of cyber-attacks. At Defence Cyber Security comprises three pillars: Cyber Defence, Cyber Intelligence and cyber counter-offensive.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) a favorable situatoion where the protection of cyberspace is proportional to cyber threats and the possible conequences of cyber attacks. In a situation of cyber security, the disruption, an attack or abusive utilisation of information and communications will not provoque danger or damage. The consequences of abusing, distruption or an attack can provque inability to use, and untrustworhiness of information and communications systems, and the violantion of confidentiality of informations or damage the integrity of the information (illegal adding, deleting or modifiying of information).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy. Securing Cyberspace - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Pakistan":{"description":"\u003Cp\u003E\u201cCyber Security\u201d means the definition as may be developed by the National Cyber Security Council from time to time, given the fast moving dynamism in the subject fields and the need to respond with equivalent enhanced capacity, speed and effectiveness, to the emerging threats to Cyber Security, provided that at all times the definition so developed shall not be over reaching, arbitrary, inconsistent, unique or conflicting in any manner with the globally accepted international best practices, adopted by the leading developed nation states.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/www.senate.gov.pk\/uploads\/documents\/1397624997_197.pdf\u0022\u003EA Bill to provide for the stablishment of a National Cyber Security Council - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Security Incident":{"Czech Republic":{"description":"\u003Cp\u003ECyber security incident means information security breach in information systems or security of services breach or breach or integrity of electronic communication networks resulting from cyber security event.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Services":{"US\/Russia":{"description":"\u003Cp\u003Ea range of data exchanges in cyberspace for the direct or indirect benefit of humans\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Space":{"UN\/Lebanon":{"description":"\u003Cp\u003ECyberspace, as a network using the Transmission Control Protocol\/Internet Protocol (TCP\/IP) communications protocol, has shown itself to be a fragile and insecure environment which has allowed criminal groups to attack and, on occasion, destroy it, because priority has been given to commercial and marketing objectives.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2007\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003EAn informal word first thought to have been used by novelist William Gibson to refer to the total data on all computers on all the networks in the world. The word has passed into common use as a way of referring to any large collection of network-accessible computer-based data.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"},"Turkey":{"description":"\u003Cp\u003EThe environment which consists of information systems that span across the world including the networks that interconnect these systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"The Netherlands":{"description":"\u003Cp\u003EFor the purposes of this strategy, \u0022cyberspace\u0022 is understood to cover all entities that are or may potentially be connected digitally. The domain includes permanent connections as well as temporary or local connections, and in all cases relates in some way to the data (source code, information, etc) present in this domain.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Switzerland":{"description":"\u003Cp\u003EThe state, the private sector and society make use of information and communication infrastructure and access to cyberspace (Internet, mobile networks and applications, e-business, e-government, computer-based control programmes).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Spain":{"description":"\u003Cp\u003ECyberspace, the name given to the global and dynamic domain composed of the infrastructures of information technology - including the Internet - networks and information and telecommunications systems, has blurred borders, involving their users in an unprecedented globalisation that provides new opportunities but also entails new challenges, risks and threats.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003ETranslation: A sphere of activity within the information space, formed by a set of communication channels of the internet and other telecommunications networks, the technological infrastructure to ensure their functioning, and any form human activity on them (individual, organizational, state).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: Cyberspace is characterized by the absence of borders, dynamism, and autonomy, creating opportunities to develop both knowledge-based information society and risks to its operation.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Poland":{"description":"\u003Cp\u003EA space of processing and exchanging information created by the ICT systems, together with links between them and the relations with users.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zeland":{"description":"\u003Cp\u003EThe global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online communication takes place.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003ENational Security Strategy\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2007\u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003ECyberspace is a global space which has no national boundaries, hence, the rapid spread of threats across cyberspace\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Latvia":{"description":"\u003Cp\u003ECyber space is an interactive environment that includes users, networks, computing technology, software, processes, information in transit or storage, applications, services, and systems that can be connected directly or indirectly to the Internet, telecommunications and computer networks. Cyber space has no physical borders.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy of Latvia 2014-2018 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Kenya":{"description":"\u003Cp\u003EThe notional environment in which communication over computer networks occurs.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Japan":{"description":"\u003Cp\u003ECyberspace, a global domain comprised of information systems, telecommunications networks and others, provides a foundation for social, economic, military and other activities.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003ECyberspace is a man-made domain essentially composed of ICT nodes and networks, hosting and processing an ever-increasing wealth of data of strategic importance for States, firms, and citizens alike, and for all political, social and economic decision-makers.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"International Organization for Standardization":{"description":"\u003Cp\u003EThe complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"India":{"description":"\u003Cp\u003ECyberspace is a complex environment consisting of interactions between people, software, and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Hungary":{"description":"\u003Cp\u003ECyberspace means the combined phenomenon of globally interconnected, decentralised and ever-growing electronic information systems as well as the societal and economic processes appearing in and through these systems in the form of data and information.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Czech Republic":{"description":"\u003Cp\u003EThe cyber space is a very specific environment that has no geographic borders and in which the distance between the source of threat and the potential target becomes relative. Its asymmetric nature makes it possible for state as well as non-state actors to harm the Czech Republic\u00b4s strategic and important interests without using any conventional means.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/www.army.cz\/images\/id_8001_9000\/8503\/15_02_Security_Strategy_2015.pdf\u0022\u003ESecurity Strategy of the Czech Republic - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003ETranslation: Cyberspace is the global environment for the interconnection of information and communication systems. Cyberspace is wider than the computer world and also contains computer networks, computer systems, digital media and digital data, whether physical or virtual.\/\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe notional environment in which communication over computer networks occurs\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECyberspace means a physical and non-physical terrain created by and\/or composed of some or all of the following; computers, computer systems, networks, and their computer programs, computer data, content data, traffic data, and users.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber System":{"Tallinn Manual":{"description":"\u003Cp\u003EOne or more interconnected computers assigned with associated software and peripheral devices.\u00a0 It can include sensors and\/or (programmable logic) controllers, connected over a computer network.\u00a0 Computer systems can be general purpose (for example, a laptop) or specialized (for example, the` blue force tracking system\u2019).\u003Cbr \/\u003E\u003Cem style=\u0022line-height: 1.6;\u0022\u003EPlease Note: Within the Tallinn Manual, the same definition is provided for the term Computer System. \u003C\/em\u003E\u003Cbr \/\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Terrorism":{"Austria":{"description":"\u003Cp\u003ECyber terrorism is defined as a politically motivated crime of state and \/ or non-state actors against computers, networks and the information stored therein. Its aim is to provoke a severe or long-term disruption of public life or to cause serious damage to economic activity with the intention of severely intimidating the population, of forcing public authorities or an international organisation to carry out, tolerate or omit an act or of profoundly unsettling or destroying the political, constitutional, economic or social foundations of a state or an international organisation. These acts constitute organised cyber sabotage (attacks) caused by political-fundamentalist groups or individual perpetrators; they are directed against states, organisations or enterprises.\u00a0Source:\u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003E Austrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cyberterrorism] The politically motivated use of computers and information technology to cause severe disruption or widespread fear.\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ethe use of cyberspece of terrorist purposes as defined by national or international law\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"},"South Korea":{"description":"\u003Cp\u003EVarious forms of cyber terrorism: Hacking, DDoS attacks, denials of service, logic bombs, Trojan horses, Worm viruses, HERF guns etc.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECyber terrorism\u0022 means use of internet based attacks in terrorist activities by individuals and groups, including acts of deliberate large scale disruptions of computer networks, especially computers attached to the internet, by the means of tools such as computer viruses\u0022\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022 target=\u0022_blank\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Poland":{"description":"\u003Cp\u003EAn offence of a terrorist nature committed in cyberspace.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"OSCE":{"description":"\u003Cp\u003EWe define cyberterrorism as cyber-related terrorism and more specifically, for our purposes, as terrorist attacks on cyber infrastructure particularly on control systems for non-nuclear critical energy infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America -\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003Eis a criminal act in cyberspace that aims to intimidate governments or their citizens, with the aim to achieve political goals. NIPC (National Infrastructure Protection Center) defines cyber terrorism as \u201ca criminal act perpetrated through computers resulting in violence, death and\/or destruction, and creating terror for the purpose of coercing a government to change its policies\u201d.\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber terrorism is a criminal act in cyberspace that aims to intimidate governments or their citizens, with the aim to achieve political goals. NIPC (National Infrastructure Protection Center) defines cyber terrorism as \u0022a criminal act perpetrated through computers resulting in violence, death and\/or destruction, and creating terror for the purpose of coercing a government to change its policies\u0022.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EIdeologically motivated exploitations of systems\u0027 vulnerabilities with the intent of influencing a state or an international organization\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Canada":{"description":"\u003Cp\u003ETerrorist networks also are moving to incorporate cyber operations into their strategic doctrines. Among many activities, they are using the Internet to support their recruitment, fundraising and propaganda activities. Terrorists are aware of the potential for using the Western world\u2019s dependence on cyber systems as a vulnerability to be exploited. For example, there are now online resources providing advice to terrorists on how to defend their own websites while launching cyber attacks on their enemies. In addition, a number of terrorist groups, including Al-Qaeda, have expressed their intention to launch cyber attacks against Western states. Though experts doubt that terrorists currently have the ability to cause serious damage via cyber attacks, they recognize that this capacity will likely develop over time.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2005\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe politically motivated use of computers and information technology to cause severe disruption or widespread fear in society.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Threat":{"Finland":{"description":"\u003Cp\u003ECyber threat means the possibility of action or an incident in the cyber domain which, when materialised, jeopardises some operation dependent on the cyber world.\u00a0\u003Cbr \/\u003E\nNote: Cyber threats are information threats which, when materialised, jeopardise the correct or intended functioning of the information system.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.yhteiskunnanturvallisuus.fi\/en\/materials\/doc_download\/40-finlandas-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EFinland\u2019s Cyber Security Strategy (24 Jan 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cyberthreat] The possibility of a malicious attempt to damage or disrupt a computer network or system.\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ea danager, whether communicated or sensed, that can exercise a cyber vulnerablity\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Romania":{"description":"\u003Cp\u003ETranslation: Circumstance or event that constitutes a potential threat to cyber security.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2007\u003C\/a\u003E\u003C\/p\u003E\n"},"Italy":{"description":"\u003Cp\u003EThe complex of malicious conducts that can be exercised in and throughout cyberspace, or against cyberspace and its fundamental elements.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003ETranslation: (Realistic) possibility of an undesired incident consisting of harming a technical system, an individual, or an organization.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Georgia":{"description":"\u003Cp\u003EAs dependency of Georgia\u0027s critical infrastructure on information technologies increases, challenges related to the protection of Georgian cyberspace are growing. During the 2008 Russian-Georgian war, the Russian Federation conducted large-scale cyber-attacks, in parallel with the ground, air, and naval attacks. These attacks showed that the protection of cyberspace is as important for national security as land, maritime, and air defenses.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Denmark":{"description":"\u003Cp\u003EThe Danish Defence Intelligence Service assesses that Danish government institutions, businesses and private individuals are the targets of daily attempts of harmful activity from various agents via the Internet. While public authorities are rarely seriously compromised, the threat from harmful activities is increasing. The Danish Defence Intelligence Service believes that the most severe cyber threats against Denmark come from foreign statesponsored agents who seek to conduct espionage and steal Danish intellectual property and business secrets such as business plans, research results, technical knowhow, financial information and contracts.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/national-cyber-security-strategies-ncsss\/DK_NCSS.pdf\u0022\u003EDanish Cyber and Information Security Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Threats":{"India":{"description":"\u003Cp\u003ESome of the xamples of cyber threats to individuals, businesses and governmetn are identiy threft, phishing, social engineering, hacktivism, cyber terrorism, compound threats targeting mobile devices and smart phone, compromised digital certificates, advanced persisten threats, denial of service, bot nets, supply chain attacks, data leakage, etc. The protection of information infrastructure and preservation of the confidentiality, integrity and availability of information in cyberspace is the essence of a secure cyber space.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/deity.gov.in\/sites\/upload_files\/dit\/files\/National%20Cyber%20Security%20Policy%20(1).pdf\u0022 target=\u0022_blank\u0022\u003EMinistry of Communication and Information Technology, Deparment of Electronics and Information Technolgy, Notificaiton on National Cyber Security Policy-2013 (NCSP-2013) - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Vulnerability":{"US\/Russia":{"description":"\u003Cp\u003Eproperty of a cyber entity that is susceptible to exploitation\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber War":{"Austria":{"description":"\u003Cp\u003ECyber war refers to acts of war in and around virtual space with means which are predominantly associated with information technology. In a broader sense, this implies the support of military campaigns in traditional operational spaces \u2013 i.e. ground, sea, air and outer space \u2013 through measures taken in the virtual space. In general, the term also refers to high-tech warfare in the information age based on the extensive computerisation, electronisation and networking of almost all military sectors and issues. Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003E[Cyberwar] The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of communication systems by another state or organization.\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003Eunspecified and controversial term that has no official or generally accepted definition. More than 30 countries have accepted the doctrine and announced development of a special programme of cyber war offensive mechanisms\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber war is unspecified and controversial term that has no official or generally accepted definition. More than 30 countries have accepted the doctrine and announced development of a special programme of cyber war offensive mechanisms.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003Ean escalated stte of cyber conflict between or among states in which cyber attacks are carried out by state actors against cyber infrastructure as part of a military campaign. Cyber Wars can be declarad (formally declared by an authrority of one of the parties) or de facto ones (with the absence of a declaration).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003ETranslation: The use of cyber capabilities of a sufficient scale for a specific period and at high speed, in order to achieve certain objectives or effects in or through cyberspace; such actions are considered a threat to the national interests of state goals.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Warfare":{"US\/Russia":{"description":"\u003Cp\u003Ecyber attacks that are authorized by state actors against cyber infrastructure in conjuntion with governmetn campaign\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003E\u0022Cyber warfare\u0022 means actions by a nation\/state topenetrate another nation\u0027s computers and networks for purposes of causing damange or disruption\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Warrior":{"US\/Russia":{"description":"\u003Cp\u003Ea person skilled and directly engaging in cyber warfare\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber Weapon":{"US\/Russia":{"description":"\u003Cp\u003Esoftware, firmware or hardware designed or applied to cause damage through the cyber domain\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyber-attack (Consequences)":{"Jordan":{"description":"\u003Cp\u003ECyber-attacks increase the possibility of data disclosure, data manipulation, data loss, and systems sabotage.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nitc.gov.jo\/PDF\/NIACSS.pdf\u0022\u003EMinistry of Information and Communications Technology, National Information Assurance and Cyber Security Strategy (NIACSS) - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cybercrime":{"US":{"description":"\u003Cp\u003ECybercrime is criminal activity conducted using computers and the Internet, often financially motivated. Cybercrime includes identity theft, fraud, and internet scams, among other activities. Cybercrime is distinguished from other forms of malicious cyber activity, which have political, military, or espionage motivations.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015 July\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyberspace \u2013 Cyberspace is a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP1 02) [Cyberspace is a domain that requires man-made technology to enter and exploit. The only difference is that it is easier to see and sense the other domains. As with air and space, effects of cyberspace operations can occur simultaneously in many places. They can be precise, broad, enduring, and transitory.] (AFDD 3-12) {Definition in brackets applies only to the Air Force and is offered for clarity.}\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (JP 1-02)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003EFor the purposes of this study, we are using the term \u0022cyber crime\u0022 to mean the illegal activities undertaken by criminals for financial gain. Such activities exploit vulnerabilities in the use of the internet and other electronic systems to illicitly access or attack information and services used by citizens, business and the Government.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECyber-crime involving inter alia malware, viruses, identity theft and attacks on financial institutions.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECybercrime means cyber crimes as defined in chapter XIII of the ECT Act (no.25 of 2002\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2002\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u0022Cybercrime\u0022 means illegal acts, the commission of which involves the use of informaiton and communication technologies\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Poland":{"description":"\u003Cp\u003EAn offence committed in cyberspace\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003Eor e-crime, or high-tech crime includes criminal activities in which computers and other IT equipment and computer network are subject, tool, target or place of crime.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Jamaica":{"description":"\u003Cp\u003ECybercrime - is a crime in which a computer is the object of the crime or is used as a tool to commit an offence.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EJamaica National Cyber Security Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"ISO":{"description":"\u003Cp\u003ECriminal activity where services or applications in the Cyberspace are used for or are the target of crime, or where the Cyberspace is the source, tool, target, or place of a crime.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003ETranslation: Criminal activity through which services or applications in cyberspace are being used to carry out crime or are targets of crime. In the process, cyberspace can be origin, target or the environment of the attack.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EThe process of decryptActs contravening international treaties and national laws, targeting networks or information systems, or using them to commit an offence or crime.ing encrypted data, without the encryption keys.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"EU":{"description":"\u003Cp\u003ECybercrime commonly refers to a broad range of different criminal activities where computers and information systems are involved either as a primary tool or as a primary target. Cybercrime comprises traditional offences (e.g. fraud, forgery, and identity theft), content-related offences (e.g. on-line distribution of child pornography or incitement to racial hatred) and offences unique to computers and information systems (e.g. attacks against information systems, denial of service and malware).\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Columbia":{"description":"\u003Cp\u003ETranslation: Criminal or abusive activities on computers or communication networks, either because the computer is used as the tool of the crime, or because the computer system (or data) is the objective of the crime. (Ministry of Defense of Colombia)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"Canada":{"description":"\u003Cp\u003EIn much the same way as states have expanded their operations into cyberspace, so too have organized criminals. The more sophisticated among them are turning to skilled cyber attackers to pursue many of their traditional activities, such as identity theft, money laundering and extortion. Criminals now sell information stolen online, such as credit and debit card numbers, login passwords for computer servers, and malicious software designed to infiltrate and damage targeted systems. Even those of us who are diligent in protecting our personal information online are at risk of having our personal data stolen from the third parties we share it with.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECanada\u0027s Cyber Security Strategy for a stronger and more prosperous Canada - 2010\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003EThe global environment that is created through the interconnection of communication and information systems. The cyberspace includes the physical and virtual computer networks, computer systems, digital media and data.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Austria":{"description":"\u003Cp\u003ECyber crime comprises illegal attacks from cyber space on or through ICT systems, which are defined in penal or administrative laws. The term therefore covers all criminal offences committed with the aid of information technologies and communications networks and also encompasses Internet crime.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Australia":{"description":"\u003Cp\u003EThe Australian Government defines cyber crime as those computer offences under the Commonwealth Criminal Code Act 1995 (Part 10.7) which involve the unauthorised access to, modification or impairment of electronic communications.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"UN\/Kazakhstan":{"description":"\u003Cp\u003EThese offences can be roughly divided into three categories: \u00a0(a) Universal, State and public offences, which represent a threat to national and public security (including calls to overthrow the existing order, attempts to devalue sovereignty or to undermine independence and national interests, terrorist propaganda, chauvinism, xenophobia, all forms of extremism, and discrimination on ethnic, racial, religious, gender and other grounds); (b) Universal civil offences, which constitute a threat to individual rights and freedoms (including violations of individual rights and freedoms, the use of compromising material, the exertion of pressure on individuals, the discrediting of individuals, the dissemination of confidential information, the use of another person\u2019s Internet services, the forgery of documents and copyright infringement); (c) Traditional offences, which threaten the foundations of morality and decency (including pornography, paedophilia, other forms of sexual perversion, drug addiction and alcoholism).\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zealand":{"description":"\u003Cp\u003EAny crime where information and communications technology is: 1. used as a tool in the commission of an offence; 2. the target of an offence; 3. a storage device in the commission of an offence.\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Ecuador":{"description":"\u003Cp\u003EInformation and communication technologies have been widely adopted in societies and are considered to be the foundations that support the current globalized world; however, this widespread usage, among other things, has exposed the information generated, published and stored using information and communication technologies to a wide range of threats, known as cybercrime, that can have a serious impact on such areas as the confidentiality, integrity and availability of the information.\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cybercriminality\/cybercrime":{"Belgium":{"description":"\u003Cp\u003E(Translation) an offence of abusive usage of automation or automated given to threaten information systems or registered information\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ECyber Security Strategy. Securing Cyberspace - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cybersecurity":{"US\/Russia":{"description":"\u003Cp\u003Ea property of cyberspace that is an ability to resiste international and \/or unintentional threats and respond and recover\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EThe ability to protect or defend the use of cyberspace from cyber attacks.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2010\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECybersecurity is the collection tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user asstes,\u0022\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Israel":{"description":"\u003Cp\u003Epolicies, security arrangements, actions, guidelines, risk management protocols and techynological tools designated to protect cyberspace and allow actions to be taken therein\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022\u003EAdvancing National Cyberspace Capabilitities, Resolution No. 3611 of the Government of august 7, 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace":{"Tallinn Manual":{"description":"\u003Cp\u003EThe environment formed by physical and non-physical components, characterized by the use of computers and electro-magnetic spectrum, to store, modify and exchange data using computer networks.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Australia":{"description":"\u003Cp\u003ECyberspace is a term used generally to describe the different experiences available and generated via the global online world of computer networks. For example, one might describe sending an email to their friend as sending it \u2018through cyberspace\u2019.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.cybersmart.gov.au\/Glossary.aspx\u0022\u003EAustralian Communications and Media Authority, Cybersmart Glossary\u003C\/a\u003E\u003C\/p\u003E\n"},"Austria":{"description":"\u003Cp\u003ECyber space is the virtual space of all IT systems interconnected at data level on a global scale. The basis for cyber space is the Internet as a universal and publicly accessible connection and transport network, which may be supplemented and expanded through other data networks. In common parlance, cyber space also refers to the global network of different independent IC infrastructures, telecommunication networks and computer systems. In the social sphere the use of this global network allows individuals to interact, exchange ideas, disseminate information, give social support, engage in business, control action, create art and media works, play games, participate in political discussions and a lot more. Cyber space has become an umbrella term for all things related to the Internet and for different Internet cultures. Many countries regard networked ICT and independent networks operating through this medium as components of their \u201cnational critical infrastructures\u201c.\u00a0 Source: \u003Ca href=\u0022https:\/\/www.bka.gv.at\/DocView.axd?CobId=50999\u0022 target=\u0022_blank\u0022\u003EAustrian Cyber Security Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"Canada":{"description":"\u003Cp\u003ECyberspace is the electronic world created by interconnected networks of information technology and the information on those networks. It is a global commons where more than 1.7 billion people are linked together to exchange ideas, services and friendship. Source: \u003Ca href=\u0022http:\/\/www.publicsafety.gc.ca\/cnt\/rsrcs\/pblctns\/cbr-scrt-strtgy\/cbr-scrt-strtgy-eng.pdf\u0022 target=\u0022_blank\u0022\u003ECanada\u2019s Cyber Security Strategy (2010)\u003C\/a\u003E\u003C\/p\u003E\n"},"Czech Republic":{"description":"\u003Cp\u003ECyber space means digital environment, enabling to create, process and exchange information, created by information systems and services and electronic communication networks. Source: \u003Ca href=\u0022http:\/\/www.govcert.cz\/download\/nodeid-1246\/\u0022 target=\u0022_blank\u0022\u003ECzech Republic Draft\u00a0Act on Cyber Security (2014)\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECyber space means digital environment, enabling to create, process and exchange information, created by information systems and services and electronic communication networks\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Finland":{"description":"\u003Cp\u003E\u003Cstrong\u003EThe term Cyber Domain is used.\u003C\/strong\u003E\u003Cbr \/\u003E\nCyber domain means an electronic information (data) processing domain comprising of one or several information technology infrastructures.\u003Cbr \/\u003E\nNote 1:\u00a0 Representative to the environment is the utilisation of electronics and the\u00a0 electromagnetic\u00a0 spectrum\u00a0 for\u00a0 the\u00a0 purpose\u00a0 of\u00a0 storing,\u00a0 processing and\u00a0 transferring\u00a0 data\u00a0 and\u00a0 information\u00a0 via\u00a0 telecommunications\u00a0 networks.\u003Cbr \/\u003E\nNote 2:\u00a0 Information\u00a0 (data)\u00a0 processing\u00a0 means\u00a0 collecting,\u00a0 saving,\u00a0 organising, using,\u00a0 transferring,\u00a0 disclosing,\u00a0 storing,\u00a0 modifying,\u00a0 combining,\u00a0 protecting,\u00a0 removing,\u00a0 destroying\u00a0 and\u00a0 other\u00a0 similar\u00a0 actions\u00a0 on\u00a0 information (data).\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.yhteiskunnanturvallisuus.fi\/en\/materials\/doc_download\/40-finlandas-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EFinland\u2019s Cyber Security Strategy Government Resolution (24 Jan 2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"France":{"description":"\u003Cp\u003EThe communication space created by the worldwide interconnection of automated digital data processing equipment. Source: \u003Ca href=\u0022http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf\u0022 target=\u0022_blank\u0022\u003EInformation Systems and Defence \u2013 France\u2019s Strategy (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Germany":{"description":"\u003Cp\u003EThe virtual space of all IT systems linked at data level on a global scale. The basis for cyberspace is the Internet as a universal and publicly accessible connection and transport network which can be complemented and further expanded by any number of additional data networks. IT systems in an isolated virtual space are not part of cyberspace. Source: \u003Ca href=\u0022http:\/\/www.cio.bund.de\/SharedDocs\/Publikationen\/DE\/Strategische-Themen\/css_engl_download.pdf;jsessionid=5B6636607CB58EFBB61431566F7E5B15.2_cid334?__blob=publicationFile\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy for Germany (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Hungary":{"description":"\u003Cp\u003ECyberspace\u00a0 means\u00a0 the\u00a0 combined\u00a0 phenomenon\u00a0 of\u00a0 globally\u00a0 interconnected, decentralised\u00a0 and\u00a0 ever-growing\u00a0 electronic\u00a0 information\u00a0 systems\u00a0 as\u00a0 well\u00a0 as\u00a0 the societal\u00a0 and\u00a0 economic\u00a0 processes\u00a0 appearing\u00a0 in\u00a0 and\u00a0 through\u00a0 these\u00a0 systems\u00a0 in\u00a0 the form of data and information. Source: \u003Ca href=\u0022http:\/\/www.nbf.hu\/anyagok\/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy of Hungary (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"India":{"description":"\u003Cp\u003ECyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology devices and networks. Source:\u00a0\u003Ca href=\u0022http:\/\/deity.gov.in\/sites\/upload_files\/dit\/files\/National Cyber Security Policy (1).pdf\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"International Organization for Standardization and International Electrotechnical Commission":{"description":"\u003Cp\u003E[the Cyberspace] The complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form. Source: \u003Ca href=\u0022http:\/\/www.iso27001security.com\/html\/27032.html\u0022 target=\u0022_blank\u0022\u003EISO\/IEC 27032:2012\u00a0 Information technology \u2014 Security techniques \u2014 Guidelines for cybersecurity\u003C\/a\u003E\u003C\/p\u003E\n"},"International Telecommunication Union":{"description":"\u003Cp\u003E\u003Cstrong\u003EThe term Cyber Environment is used.\u003C\/strong\u003E\u003Cbr \/\u003E\nThis includes users, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks. Source: \u003Ca href=\u0022http:\/\/www.itu.int\/ITU-R\/index.asp?redirect=true\u0026amp;category=information\u0026amp;rlink=terminology-database\u0026amp;lang=en\u0026amp;adsearch=\u0026amp;SearchTerminology=cyber\u0026amp;collection=normative\u0026amp;sector=all\u0026amp;language=all\u0026amp;part=abbreviationterm\u0026amp;kind=anywhere\u0026amp;StartRecord=1\u0026amp;NumberRecords=50\u0022 target=\u0022_blank\u0022\u003EITU Terms and Definitions Database\u003C\/a\u003E\u003C\/p\u003E\n"},"Japan":{"description":"\u003Cp\u003EGlobal virtual spaces such as the internet composed of information systems, information communications networks and similar systems and which circulate large quantities of a large variety of information. Source: \u003Ca href=\u0022http:\/\/www.nisc.go.jp\/active\/kihon\/pdf\/cybersecuritystrategy-en.pdf\u0022 target=\u0022_blank\u0022\u003ECybersecurity Strategy (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"New Zealand":{"description":"\u003Cp\u003EThe global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online communication takes place. Source:\u00a0\u003Ca href=\u0022http:\/\/www.dpmc.govt.nz\/sites\/all\/files\/publications\/nz-cyber-security-strategy-june-2011_0.pdf\u0022 target=\u0022_blank\u0022\u003ENew Zealand\u0027s Cyber Security Strategy (June 2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Oxford Dictionary":{"description":"\u003Cp\u003EThe notional environment in which communication over computer networks occurs.\u003C\/p\u003E\n"},"Saudi Arabia":{"description":"\u003Cp\u003EA global domain within the information environment consisting of the interdependent networks of information systems infrastructures including the internet, telecommunications networks, computer systems, embedded processors and controllers. Source: \u003Ca href=\u0022http:\/\/www.mcit.gov.sa\/Ar\/MediaCenter\/PubReqDocuments\/NISS_Draft_7_EN.pdf\u0022 target=\u0022_blank\u0022\u003EDrafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7-2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"Spain":{"description":"\u003Cp\u003ECyber space is the set of means and procedures based on Information and Communications Technology which is configured for the provision of services. Cyber space consists of hardware, software, the Internet, information services and systems of control that ensure the provision of services that are essential for the socio-economic activity of any nation, especially those that are connected to its critical infrastructure. Source: \u003Ca href=\u0022https:\/\/www.ismsforum.es\/ficheros\/descargas\/a-national-cyber-security-strategy-.pdf\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security a Commitment for Everybody (2012)\u003C\/a\u003E\u003C\/p\u003E\n"},"The Netherlands":{"description":"\u003Cp\u003EThere is currently no international agreement on the definition of the term \u201ccyberspace\u201d. For the purposes of this strategy, \u201ccyberspace\u201d is understood to cover all entities that are or may potentially be connected digitally. The domain includes permanent connections as well as temporary or local connections, and in all cases relates in some way to the data (source code, information, etc) present in this domain. Source: \u003Ca href=\u0022http:\/\/www.ccdcoe.org\/strategies\/Defence_Cyber_Strategy_NDL.pdf\u0022 target=\u0022_blank\u0022\u003EThe Defence Cyber Strategy (2012)\u003C\/a\u003E\u003C\/p\u003E\n"},"Turkey":{"description":"\u003Cp\u003ECyberspace: The environment which consists of information systems that span across the world including the networks that interconnect these systems.\u003Cbr \/\u003E\nNational cyber space: The environment which consists of the information systems that belong to public organizations, natural and legal persons. Source: \u003Ca href=\u0022http:\/\/www.ccdcoe.org\/strategies\/TUR_CyberSecurity.pdf\u0022 target=\u0022_blank\u0022\u003ENational Cyber Security Strategy and 2013-2014 Action Plan\u003C\/a\u003E\u003C\/p\u003E\n"},"UK":{"description":"\u003Cp\u003EAn interactive domain made up of digital networks that is used to store, modify and communicate information.\u00a0 It includes the internet but also other information systems that support our businesses, infrastructure and services. Source:\u00a0\u003Ca href=\u0022http:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/60961\/uk-cyber-security-strategy-final.pdf\u0022 target=\u0022_blank\u0022\u003EUK Cyber Security Strategy (2011)\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003ENational Security Presidential Directive 54\/Homeland Security Presidential Directive 23 (NSPD-54\/HSPD23) defines cyberspace as the interdependent network of information technology infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries. Common usage of the term also refers to the virtual environment of information and interactions between people. Source: \u003Ca href=\u0022http:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Cyberspace_Policy_Review_final_0.pdf\u0022 target=\u0022_blank\u0022\u003ECyberspace Policy Review 2009\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. Source: \u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 target=\u0022_blank\u0022\u003EDepartment of Defense Dictionary of Military and Associated Terms\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe interdependent network of information technology infrastructures, that includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/niccs.us-cert.gov\/glossary#letter_c\u0022 target=\u0022_blank\u0022\u003ENational Initiative for Cybersecurity Careers and Studies - A Glossary of Common Cybersecurity Terminology\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.\u00a0Source: \u003Ca href=\u0022http:\/\/www.ncix.gov\/publications\/policy\/docs\/CNSSI_4009.pdf\u0022 target=\u0022_blank\u0022\u003ECNSS Instruction No. 4009 - 26 Apr 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EA global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2010\u003C\/a\u003E\u003C\/p\u003E\n"},"US\/Russia":{"description":"\u003Cp\u003EAn electronic medium through which information is created, transmitted, received, stored, processes and deleted\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Trinidad and Tobago":{"description":"\u003Cp\u003ECyberspace integrates a number of capabilities, such as sensors, signals, connections, transmissions, processors and controllers, and generates a virtual interactive experience accessed for the purpose of communication and control regardless of a geographic location. Cyberspace allows the interdependent network of information technology infrastructure\u00b4s telecommunication networks, such as the Internet, computer systems, integrated sensors, system control networks and embedded processors and controllers common to global control and communications.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource:\u00a0\u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.nationalsecurity.gov.tt\/Portals\/0\/Pdf%20Files\/National_Cyber_Security%20Strategy_Final.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003EGovernment of the Republic of Trinidad and Tobago, National Cyber Security Strategy - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"South Africa":{"description":"\u003Cp\u003ECyberspace means a physical and non-physical terrain created by and\/or composed of some or all of the following: computers, computer systems, networks, and their computer programs, computer data, content data, traffic data, and users\u0022\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022 target=\u0022_blank\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Qatar":{"description":"\u003Cp\u003EA virtual or electronic environment that results from the interdependent network of information and communications technology (e.g., the Internet, telecommunications networks, computer systems, and embedded processors and controllers) that links people with services and information\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022 target=\u0022_blank\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Nigeria":{"description":"\u003Cp\u003Eas a domain for non-critical and critical national functions such as economic development, trade and commerce, social interactions, communication, medical and health, government operations, national security and defence.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn interdependent network of critical and non-critical national information infrastructures, convergence of interconnected information and communication resources through the use of information and communication technologies. It encompasses all forms of digital engagements, interactions, socializations and transactional activities; contents, contacts and resources deployed through interconnected networks.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource:\u00a0\u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"},"Kenya":{"description":"\u003Cp\u003EThe notional environment in which communication over computer networks occurs\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.icta.go.ke\/wp-content\/uploads\/2014\/03\/GOK-national-cybersecurity-strategy.pdf\u0022 target=\u0022_blank\u0022\u003EGovernment of Kenya, Cybersecurity Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Israel":{"description":"\u003Cp\u003Ethe physical and non-physical domain that is created or composed of part or all of the following components: mechanized and computerized systems, computer and communications networks, rpgroams, computerized information, content conveyed by computer, traffic and supervisory data and those who use such data\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022http:\/\/www.pmo.gov.il\/English\/PrimeMinistersOffice\/DivisionsAndAuthorities\/cyber\/Documents\/Advancing%20National%20Cyberspace%20Capabilities.pdf\u0022 target=\u0022_blank\u0022\u003EAdvancing National Cyberspace Capabilities, Resolution No. 3611 of the Government of august 7, 2011 - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Belgium":{"description":"\u003Cp\u003E(Translation) cyberspace is the global environment, born from the interconnections of information and communications systems. Cyberspace is bigger than the computer world and contains computer networks, computer systems, medias and numeric givens, physical or virtual ones.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy. Securing Cyberspace - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace Defense":{"US":{"description":"\u003Cp\u003EThe passive, active and dynamic employment of capabilities to respond to imminent or on-going actions against AF or AF- protected networks, AF\u0027s portion of the Global Information Grid (GIG) or expeditionary communications assigned to the AF. (AFDD 3-12)\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EActions normally created within DoD cyberspace for securing, operating, and defending the DoD information networks. Specific actions include protect, detect, characterize, counter, and mitigate.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ECombat operations in, through, and from cyberspace to achieve military objectives and influence the course and outcome of conflict by taking decisive actions against approved targets.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace. (JP 3-0)\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace Intelligence ":{"US":{"description":"\u003Cp\u003EMeasures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. Source: \u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 target=\u0022_blank\u0022\u003EUS Department of Defense Dictionary of Military and Associated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace Operations":{"US":{"description":"\u003Cp\u003EThe employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace. Source: \u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 target=\u0022_blank\u0022\u003EUS Department of Defense Dictionary of Military and Associated Terms\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference. (AFDD 3-12)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace Superiority":{"USA":{"description":"\u003Cp\u003EThe degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 style=\u0022line-height: 1.6;\u0022\u003EUS Department of Defense Dictionary of Military and Assosicated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberspace Superiority ":{"US":{"description":"\u003Cp\u003EThe degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary. Source: \u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 target=\u0022_blank\u0022\u003EUS Department of Defense Dictionary of Military and Associated Terms\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe operational advantage in, through, and from cyberspace to conduct operations at a given time and in a given domain without prohibitive interference.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe degree of dominance in cyberspace by one force that permits the secure, reliable conduct of operations by that force, and its related land, air, maritime, and space forces at a given time and place without prohibitive interference by an adversary. (JP 3-12)\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Cyberwarfare":{"Belgium":{"description":"\u003Cp\u003E(Translation) usage of cybercapacity of a sufficient scale, during a determined period in high speed, to reach certain objectives in or through cyberspace, these actions being considered as a menace for the targeted state.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Defensive Cyberspace Operation":{"USA":{"description":"\u003Cp\u003EPassive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 style=\u0022line-height: 1.6;\u0022\u003EUS Department of Defense Dictionary of Military and Assosicated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Defensive Cyberspace Operations":{"US":{"description":"\u003Cp\u003EDeliberate, authorized defensive measures or activities taken outside of the defended network to protect and defend Department of Defense cyberspace capabilities or other designated systems.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Electronic Attack":{"US":{"description":"\u003Cp\u003EDivision of electronic warfare involving the use of electromagnetic energy, directed energy, or antiradiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability and is considered a form of fires. Also called EA. See also electronic protection; electronic warfare; electronic warfare support.\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n"}},"Electronic Communication Network":{"Latvia":{"description":"\u003Cp\u003ETransmission systems, commutation and routing devices including elements of the network that are no used= and other resources that allow to transmit signals in the network with the help of cables, radio waves, optical or other electromagnetic means irrespective of the information transmitted.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003ECyber Security Strategy of Latvia 2014-2018 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Electronic Information Infrastructure":{"Hungary":{"description":"\u003Cp\u003EA condition of an electronic information system in which its protection is closed, comprehensive, continuous and commensurate with risks in terms of the confidentiality, integrity and availability of the data managed in such electronic information system, as well as of the integrity and availability of the electronic information system elements.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Electronic Warfare":{"Tallinn Manual":{"description":"\u003Cp\u003EThe use of electromagnetic (EM) or directed energy to exploit the electromagnetic spectrum.\u00a0 It may include interception or identification of EM emissions, employment of EM energy, prevention of the hostile use of the EM spectrum by an adversary, and actions to ensure efficient employment of that EM spectrum by the user-State.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"US":{"description":"\u003Cp\u003EAny military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Also called EW.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EMilitary action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Also called EW. See also directed energy; electromagnetic spectrum; electronic attack; electronic protection; electronic warfare support. (JP 3-13.1)\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u00a0\u003C\/p\u003E\n"}},"Electronic Warfare Incident":{"NATO":{"description":"\u003Cp\u003EMilitary action that exploits electromagnetic energy to provide situational\u00a0\u003Cspan style=\u0022line-height: 1.6;\u0022\u003Eawareness and achieve offensive and defensive effects.\u003C\/span\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/doctrine\/other\/aap6.pdf\u0022 style=\u0022line-height: 1.6;\u0022\u003ESource: NATO Allied Administrative Publication 06 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"},"SANS":{"description":"\u003Cp\u003EAn incident as an adverse network event in an information system or network or the threat of the occurrence of such an event.\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.sans.org\/security-resources\/glossary-of-terms\/?pass=c\u0022 style=\u0022line-height: 1.6;\u0022\u003ESource: SANS Glossary of Security Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Environment of Operation":{"US":{"description":"\u003Cp\u003EThe physical surroundings in which an information system processes, stores, and transmits information.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2010\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe physical, technical, and organizational setting in which an information system operates, including but not limited to: missions\/business functions; mission\/business processes; threat space; vulnerabilities; enterprise and information security architectures; personnel; facilities; supply chain relationships; information technologies; organizational governance and culture; acquisition and procurement processes; organizational policies and procedures; organizational assumptions, constraints, risk tolerance, and priorities\/trade-offs).\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, \u00a0- 2010\u003C\/a\u003E\u003C\/p\u003E\n"}},"Global Information Grid":{"US":{"description":"\u003Cp\u003EThe globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2010\u003C\/a\u003E\u003C\/p\u003E\n"}},"Global Information infrastructure":{"US":{"description":"\u003Cp\u003EWorldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2015 July\u003C\/a\u003E\u003C\/p\u003E\n"}},"ICT":{"South Africa":{"description":"\u003Cp\u003EICT mean any communications device or application including radio, television, cellular phones, satellite systems, computers, network hardware and software and other services such as videoconferencing\u0022\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003Erefer to technologies people use to share, distribute, gather information and to communicate through computers and computer networks\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EGovernment of the Republic of Trinidad and Tobago, National Cyber Security Strategy - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Kenya":{"description":"\u003Cp\u003EThe applications of computers and telecommunications equipment to store, retrieve, transmit and manipulate data\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.icta.go.ke\/wp-content\/uploads\/2014\/03\/GOK-national-cybersecurity-strategy.pdf\u0022\u003EGovernment of Kenya, Cybersecurity Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"ICT Threats":{"UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security":{"description":"\u003Cp\u003EThe sources of these threats comprise both State and non-State actors. In addition, individuals, groups, or organizations, including criminal organizations, may act as proxies for States in the conduct of malicious ICT actions. The potential for the development and the spread of A\/68\/98 13-37166 7 sophisticated malicious tools and techniques, such as bot-nets, by States or non-State actors may further increase the risk of mistaken attribution and unintended escalation. The absence of common understandings on acceptable State behaviour with regard to the use of ICTs increases the risk to international peace and security. Terrorist groups use ICTs to communicate, collect information, recruit, organize, plan and coordinate attacks, promote their ideas and actions and solicit funding. If\u003Cbr \/\u003E\nsuch groups acquire attack tools, they could carry out disruptive ICT activities. States are concerned that embedding harmful hidden functions in ICTs could be used in ways that would affect secure and reliable ICT use and the ICT supply chain\u003Cbr \/\u003E\nfor products and services, erode trust in commerce and damage national security.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/sites\/default\/files\/documents\/UN-130624-GGEReport2013_0.pdf\u0022\u003E68th session, UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Important Information System":{"Czech Republic":{"description":"\u003Cp\u003EImportant information system means an information system administrated by a public authority, that is not critical information infrastructure and which may endanger or noticeably limit the performance of public administration in case of information security breach\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Important Network":{"Czech Republic":{"description":"\u003Cp\u003EImportant network means electronic communication network1 providing direct international interconnection to public communication networks or providing direct connection to critical information infrastructure.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Incident":{"Lithuania":{"description":"\u003Cp\u003EIncident shall mean an event, act or omission which gives rise or may give rise to an unauthorized access to an information system or electronic communications network, disruption or change of the operation (including takeover of control) of an information system or electronic communications network, destruction, damage, deletion or the change of\u003Cbr \/\u003E\nelectronic information, removal or limiting of the possibility to use electronic information\u003Cbr \/\u003E\nand, also, which gives rise or may give rise to the appropriation, publication, dissemination or\u003Cbr \/\u003E\nany other use of non-public electronic information by persons unauthorized to do so.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ird.lt\/doc\/teises_aktai_en\/EIS(KS)PP_796_2011-06-29_EN_PATAIS.pdf\u0022\u003EResolution No 796, on the Approval of the Programme for the Development of Electornic Information Security (Cyber-Security= for 2011-2019 - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information":{"US":{"description":"\u003Cp\u003EAn instance of an information type.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAny communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E1. Facts, data, or instructions in any medium or form. 2. The meaning that a human assigns to data by means of the known conventions used in their representation.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"Trinidad and Tobago":{"description":"\u003Cp\u003Eincludes data text, images, sounds, codes, computer programs, software and databases\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/www.nationalsecurity.gov.tt\/Portals\/0\/Pdf%20Files\/National_Cyber_Security%20Strategy_Final.pdf\u0022 target=\u0022_blank\u0022\u003EGovernment of the Republic of Triniadad and Tobago, National Cyber Security Strategy - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"International Telecommunications Union":{"description":"\u003Cp\u003EIntelligence or knowledge capable of being represented in forms suitable for communication, storage or processing. Note - Information may be represented for example by signs, symbols, pictures or sounds\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAny kind of knowledge, that is exchangeable amongst users, about things, facts, concepts and so on, in a universe of discourse. Although information will necessarily have a representation form to make it communicable, it is the interpretation of this representation (the meaning) that is relevant in the first place.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 1995\u003C\/a\u003E\u003C\/p\u003E\n"},"India":{"description":"\u003Cp\u003EInformation includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or micro film or computer generated micro fiche.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n"},"Bolivia":{"description":"\u003Cp\u003EWhen we speak of information we are referring, directly or indirectly, to information technology and telecommunication systems (new technologies, new software, new hardware, new ways of elaborating ever more consistent, reliable and speedy information) and, in particular, the risk and security of such systems.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2003\u003C\/a\u003E\u003C\/p\u003E\n"},"African Union":{"description":"\u003Cp\u003Erefers to any element of knowledge likely to be represented with the aid of devices and to be used, conserved, processed or communicated. Information may be expressed in writter, visual, audio, digital or other forms\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/au.int\/en\/sites\/default\/files\/AU%20Convention%20EN.%20%283-9-2012%29%20clean_0.pdf\u0022 target=\u0022_blank\u0022\u003EDraft African Union Convention on the Establishment of a Legal Framework Conducive to Cyber Security in Africa or Draft African Union Convention on Confidence and Security in Cyberspace - 2012\u003C\/a\u003E\u003C\/p\u003E\n"},"University of Oxford":{"description":"\u003Cp\u003EGenerally, information is whatever is capable of causing a human mind to change its opinion about the current state of the real world. Formally,, and especially in science and engineering, information is whatever contributes to a reduction in the uncertainty of the state of a system; \u00a0in this case, uncertainty is usually expressed in an objectively measurable form. Commonly, this is done by means of Shannon\u2019s entropy. Nevertheless, this formula for uncertainty involves probabilities, and these may well have to be subjective. If that is so, the formal measurement must be qualified as depending on subjective probabilities, and \u201cuncertainty\u201d must be replaced by \u201copinion, or personal estimate, of uncertainty\u201d. \u00a0Information must be distinguished from any medium that is capable of carrying it. A physical medium (such as a magnetic disk) may carry a logical medium (data, such as binary or text symbols). The information content of any physical objects, or logical data, cannot be measured or discussed until it is known what range of possibilities existed before and after they were received. The information lies in the reduction in uncertainty resulting from the receipt of the objects or the data, and not in the size or complexity of the objects or data themselves. Questions of the form, function, and semantic import of data are only relevant to information inasmuch as they contribute to the reduction of uncertainty. If an identical memorandum is received twice, it does not convey twice the information that its first occurrence conveyed: the second occurrence conveys no information at all, unless, by prior agreement, the number of occurrences is itself to be regarded as significant. \u00a0Information has ramifications in security, politics, culture, and the economy, as well as in science and engineering. The extent to which information is used as an economic commodity is one of the defining characteristics of the \u201cpost-industrial\u201d society, hence the phrase \u201cthe information society\u201d.\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2008\u003C\/a\u003E\u003C\/p\u003E\n"},"IEEE":{"description":"\u003Cp\u003EContent of communication; data and metadata describing data. The material basis is raw data, which is processed into relevant information. Distributed resource device information categories include source information (e.g., analogue and state information) and derived information (e.g., statistical and historical information).\u00a0\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2010\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Assurance":{"US":{"description":"\u003Cp\u003EMeasures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Conflict":{"US\/Russia":{"description":"\u003Cp\u003Ea tense situation between or among nation-states or organized groups where information operations result in retaliation\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Domain":{"US":{"description":"\u003Cp\u003EA three-part concept for information sharing, independent of, and across information systems and security domains that 1) identifies information sharing participants as individual members, 2) contains shared information objects, and 3) provides a security policy that identifies the roles and privileges of the members and the protections required for the information objects\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022 target=\u0022_blank\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Environment":{"US":{"description":"\u003Cp\u003EAggregate of individuals, organizations, and\/or systems that collect, process, or disseminate information, also included is the information itself\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Infrastructure":{"Russia":{"description":"\u003Cp\u003Ea set of technical tools and systems of formation, creation, transformation, transmission, use and storage of information\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Operation":{"US\/Russia":{"description":"\u003Cp\u003Eorganized activities to gather, prepare, disseminate, restrict or process information to achieve a goal\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003Eorganized activities to gather, prepare, disseminate, restrict or process information to achieve a goal\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Operations Dominance":{"US\/Russia":{"description":"\u003Cp\u003Eoverwhelming capability in information operations, leading to a position of control\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Resources":{"Russia":{"description":"\u003Cp\u003Einformation infrastructure, as well as proper information and its flows\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"Lithuania":{"description":"\u003Cp\u003EInformation resources shall mean an aggregate of information which is managed by members of the information society and processed by means of information technology as well as the information technology means used to process the said information.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ird.lt\/doc\/teises_aktai_en\/EIS(KS)PP_796_2011-06-29_EN_PATAIS.pdf\u0022\u003EResolution No 796, on the Approval of the Programme for the Development of Electornic Information Security (Cyber-Security= for 2011-2019 - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Security":{"US\/Russia":{"description":"\u003Cp\u003Eproperty of information space that is an ability to resist threats and respond and recover\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003Eas a condition of security of its national interests in the informational space, determined by a balanced combination of the interests of the individual, society and the state,\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EInformation Security Doctrine of the Russian Federation - 2000\u003C\/a\u003E\u003C\/p\u003E\n"},"Montenegro":{"description":"\u003Cp\u003EInformation security includes the state of confidentiality, integrity and availability of information. Information security is focused on data regardless of their form: electronic, printed and other forms of data.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Security (culture)":{"Czech Republic":{"description":"\u003Cp\u003EThe Czech Republic shall encourage development of an information society culture through awareness raising among its citizens and private sector subjects. They shall have free access to information society services and to information on responsible behaviour and use of information technologies. The citizens shall be protected from malicious impacts of cyber attacks that could negatively affect quality of their lives and their trust in the state.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ENational Security Authority, National cyber Security Centre, \u0022National Cyber Security Strategy of the Czech Republic for the Period from 2015 to 2020\u0022 - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Security Architecture":{"US":{"description":"\u003Cp\u003EAn embedded, integral part of the enterprise architecture that describes the structure and behaviour for an enterprise\u00b4s security processes, information security systems, personnel and organizational sub-units, showing their alignment with the enterprise\u00b4s mission and strategic plans\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, \u00a0- 2006\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Security of the Armed Forces":{"Russia":{"description":"\u003Cp\u003Ea condition of security of information resources belonging to the armed forces from the impact of an attack of information resources of the counterpart\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Space":{"US\/Russia":{"description":"\u003Cp\u003EAny medium, through which information is created, transmitted, received, stored, processed or deleted\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022 target=\u0022_blank\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003EThe activities associated with the formation, creation, transformation, transmission, use, storage of information have an impact, including individual and social consciousness, information infrastructure and information itself\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EArea of activity related to the formation, creation, transformation, transmission, use and storage of the information affecting inter alia the individual and social consciousness, information infrastructure and the information per se\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EConceptual Views Regarding the Activites of the Armed Forces of the Russian Federation in the Information Space - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) \u201cInformation space\u201d represents an assemblage of information, information infrastructure; entities engaged in the collection, formation, dissemination sand the use of information, and a system governing public relations arising of these communications.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EInformation Security Doctrine of the Russian Federation - 2000\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Sphere":{"Russia":{"description":"\u003Cp\u003E(Translation) a system-forming factor if societal life and it actively influences the state if political, economic, defense, and other components of its security\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EInformation Security Doctrine of the Russian Federation - 2000\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Superiority":{"US\/Russia":{"description":"\u003Cp\u003Ehaving a better or more information\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information System":{"US":{"description":"\u003Cp\u003EA discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Systems Security":{"US":{"description":"\u003Cp\u003EProtection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Deparment of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Technology":{"India":{"description":"\u003Cp\u003EInformation technology is one of the critical sectors that rides on and resides in cyberspace. It has emerged as one of the most significant growth catalysts for the Indian economy. In addition to fuelling India\u00b4s economy, this secotr is also positively influencing the lives of its people through direct and indirect contribution ti the variuous socio-economic paramenets such as employment, standard of living and diversity among others. The sector has played a significant role in transforming India\u0027s image to that of a global player in providing world-class technology solutions and IT business services. The governmetn has been a key dirver for increased adoption of IT-based products and IT enabled services in Public services (governmetn to citizen services, citizen identification, public distribution systems), Healthcare (telemedicine, remote consultation, mobile clinics), Education )e-learning, virtual classrooms, etc) and financial services (mobile banking\/payment gateways), etc. Such initiatives have enabled increased IT adoption in the country through sectoral reforms and National programmes which have led to cretaion of large scale IT infrastructure with corporate\/private particiption.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022http:\/\/deity.gov.in\/sites\/upload_files\/dit\/files\/National%20Cyber%20Security%20Policy%20(1).pdf\u0022\u003EMinistry of Communication and Information Technology, Deparment of Electronics and Information Technolgy, Notificaiton on National Cyber Security Policy-2013 (NCSP-2013) - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Technology Security Incident":{"Latvia":{"description":"\u003Cp\u003EA harmful event or offence, as a result of which the integrity, availability or confidentiality of information technology is endangered.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ECyber Security Strategy of Latvia 2014-2018 - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Tools":{"Russia":{"description":"\u003Cp\u003Einformation technologies, tools and methods used for the purpose of information war\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information War":{"US\/Russia":{"description":"\u003Cp\u003Eis an escalated state of information conflict between or among states in which information operations are carried out by state actors for politico-military purposes\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/dl.dropboxusercontent.com\/u\/164629289\/terminology2.pdf\u0022\u003EEast-West Institute, Critical Terminology Foundations 2, Russia-US Bilateral on Cybersecurity, Eds. Habes B. Godwin III, Andrey Kulpin, Kal Frederick Rauscher and Valery Yaschenko, Policy Report 2\/2014, - 2014\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003Econfrontation between two or more governments in the information space with a goal to damage the systems, processes and resources, critical to the counterpart\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Warfare":{"South Africa":{"description":"\u003Cp\u003EAlthough the terms cyber-warfare, cyber-defence or cyber-attack are often used in everyday speak, the broad military concept used in this goal is Information Warfare, a term which covers a broad range of operations to be carried out within the Information Sphere (commonly also known as the InfoSphere).\u003C\/p\u003E\n"},"UN\/Phillippines":{"description":"\u003Cp\u003E(i) Actions aimed at achieving information superiority by executing measures to exploit, corrupt, destroy, destabilize or damage the enemy\u2019s information and its functions; (ii) actions taken to protect one\u2019s information resources and telecommunication systems; (iii) acts of exploiting one\u2019s information resources and telecommunications systems to achieve goals and interests, for example, cyber warfare (information warfare in the defence and military context) or \u201cInternet war\u201d (information warfare in the larger societal context).\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2001\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Weapon":{"UN\/Russia":{"description":"\u003Cp\u003EWays and means used for the purpose of damaging the information resources, processes and systems of a State, exerting an adverse influence, through information, on the defence, administrative, political, social, economic and other vital systems of a State, as well as the massive psychological manipulation of a population in order to destabilize society and the State.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EMeans and methods used with a view to damaging another State\u2019s information resources, processes and systems; use of information to the detriment of a State\u2019s defence, administrative, political, social, economic or other vital systems, and the mass manipulation of a State\u2019s population with a view to destabilizing society and the State.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n"},"UN\/Phillippines":{"description":"\u003Cp\u003EInformation resources strategically developed or created for information warfare or to cause damage, confusion or disadvantage and with any other forms of malicious intent.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2001\u003C\/a\u003E\u003C\/p\u003E\n"},"Russia":{"description":"\u003Cp\u003ETranslation: Information technology, tools, and methods used for the purpose of information warfare.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n"},"UN\/Cuba":{"description":"\u003Cp\u003EInformation and telecommunication systems can become weapons when they are designed and\/or used to inflict damage on a State\u2019s infrastructure. Examples include attacks on national networks with foreign software or from internal sources within the State itself that are planned or conceived abroad; radio or television broadcasts through unauthorized means or without the consent of the State attacked; and influencing the conduct of persons with a view to destabilizing societies, overthrowing governments or altering the political and social order of countries.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2002\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EInformation and telecommunication systems can become weapons when they are designed or used to cause harm to a State\u2019s infrastructure. For example, attacking national networks with foreign software or from sources within the State, but promoted or conceived from abroad; radio and television broadcasts intended to disrupt the social order and the institutional framework deriving from the Constitution of another State to which these signals are sent; activities intended to interfere with, damage or paralyse the broadcasting services of other States, etc.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2002\u003C\/a\u003E\u003C\/p\u003E\n"}},"Information Weapons":{"Russia":{"description":"\u003Cp\u003Einformation technologies, means and methods used for the purposes of waging information war\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual Views Regarding the Activites of the Armed Forces of the Russian Federation in the Informaiton Space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Insider Threat":{"Denmark":{"description":"\u003Cp\u003EThe so-called insider threats also pose a significant challenge. Insider threats include staff will fully or negligently breaching workplace security procedures. In this context, the threat of negligence poses a particular challenge - employees may inadvertently let unauthorized persons into the workplace by holding the door for strangers, or they may download programs with dubious contents. If the employees fail to observe security procedures, this increases the risk of unauthorized access to internal networks and therefore to sensitive information.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/national-cyber-security-strategies-ncsss\/DK_NCSS.pdf\u0022 target=\u0022_blank\u0022\u003EDanish Cyber and Information Security Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"International Information Security":{"Russia":{"description":"\u003Cp\u003Estate of international relations, which excludes violation of global stability and endangering the security of nations and the world community in the information space\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ETranslation: The state of international relations in which global stability is not disturbed nor is the security of the world community endangered in the information space.\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022 target=\u0022_blank\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E(Translation) a set of national and international institutions to regulate the activities of the different actors of the global information space. This system is designed to counter threats to strategic stability and equal strategic partnership to promote the global information space\u003C\/p\u003E\n\u003Cp\u003ESource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022 target=\u0022_blank\u0022\u003EBasic principles for State Policy of the Russian Federation in the field of International Information Security to 2020 - 2013\u003C\/a\u003E\u003C\/p\u003E\n"},"UN\/Mali":{"description":"\u003Cp\u003EInternational information security should be based on existing international law (jus ad bellum), which defines how to counter threats to international peace and security, and international humanitarian law (jus in bello), which relates to the means and methods of warfare; the protection of States that are not party to the conflict; and persons and property that are or could be affected by the conflict.\u003C\/p\u003E\n\u003Cp\u003ESource:\u00a0\u003Ca href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2009\u003C\/a\u003E\u003C\/p\u003E\n"}},"International Information Terrorism":{"UN\/Russia":{"description":"\u003Cp\u003EThe use of telecommunications and information systems and resources and exerting influence on such systems or resources in the international information area for terrorist purposes.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2000\u003C\/a\u003E\u003C\/p\u003E\n"}},"Internet Security":{"Montenegro":{"description":"\u003Cp\u003EInternet security in technical context, refers to protection of Internet service and related ICT systems and networks as extension of network security in organisations and homes, and to ensure the security purpose\u0022. Internet security also provides availability and reliability of Internet service. However, in political context, Internet security is often equated with what is also known as safe use of the Internet. According to some definitions, Internet security includes a global regime dealing with stability of Internet code and hardware, as well as with agreements on prosecuting illegal content. \u0022\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Interoperability":{"US":{"description":"\u003Cp\u003EFor the purposes of this standard, interoperability allows any government facility or information system, regardless of the PIV Issuer, to verify a cardholder\u0027s identity using the credentials on the PIV Card.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2\u003C\/a\u003E\u003C\/p\u003E\n"}},"Means of Cyber Warfare":{"Tallinn Manual":{"description":"\u003Cp\u003ECyber weapons and their associated cyber systems.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 40\u003C\/a\u003E\u003C\/p\u003E\n"}},"Methods of Cyber Warfare":{"Tallinn Manual":{"description":"\u003Cp\u003ECyber tactics, techniques, and procedures by which hostilities are conducted.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 40\u003C\/a\u003E\u003C\/p\u003E\n"}},"Military Conflict in Information Space":{"Russia":{"description":"\u003Cp\u003Ea form of interstate or intra-state conflict, using information weapons\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003Ea form of interstate or intra-state conflict, using information weapons\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EConceptual views regarding the activities of armed forces of the Russian Federation in Information space - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"National Critical Information Infrastructure":{"South Africa":{"description":"\u003Cp\u003E\u0022National critical information infrastructure\u0022 means all ICT systems, data systems, data bases, networks (including people, buildings, facilities and processes), that are fundamental to the effective operation of the Republic\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003ENational critical information infrastructure\u0022 means all ICT systems, data systems, data bases, networks (including people, buildings, facilities and processes), that are fundamental to the effective operation of the Republic\u0022\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.cyanre.co.za\/national-cybersecurity-policy.pdf\u0022\u003EA national cybersecurity policy framework for South Africa - 2011\u003C\/a\u003E\u003C\/p\u003E\n"}},"Network Operations":{"US":{"description":"\u003Cp\u003EAn organization of stations capable of intercommunications, but not necessarily on the same channel.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn organization of stations capable of intercommunications, but not necessarily on the same channel.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Definitions, Open Technology Institute New America - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Network Security":{"Montenegro":{"description":"\u003Cp\u003ENetwork security is also important for critical infrastructures that are often not directly connected to the Internet.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EStrategy on Cyber Security of Montenegro to 2017 (2013)\u003C\/a\u003E\u003C\/p\u003E\n"}},"Non-State Actors":{"Nigeria":{"description":"\u003Cp\u003EOrganized and unorganized criminals operating in the underground economy exploiting weakness in individual, corporate and government systems and information infrastructure. They used different technology and psychology method to manipulate users and engage highly sophisticated cyber tools to infect, hijack, control and extract value information for criminal purpose. Financial motivation is usually the driven force of this particular nonstate actor. They inflict huge financial damage on their victims. Their action damage country reputation and inflict huge collateral damage on the country financial system.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Offensive Cyberspace Operations":{"US":{"description":"\u003Cp\u003ECyberspace operations intended to project power by the application of force in or through cyberspace.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022http:\/\/www.dtic.mil\/doctrine\/dod_dictionary\/\u0022 style=\u0022line-height: 1.6;\u0022\u003EUS Department of Defense Dictionary of Military and Assosicated Terms\u003C\/a\u003E\u003C\/p\u003E\n"}},"Online Attack":{"US":{"description":"\u003Cp\u003EAn attack against an authentication protocol where the Attacker either assumes the role of a Claimant with a genuine Verifier or actively alters the authentication channel. The goal of the attack may be to gain authenticated access or learn authentication secrets.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Passive Attack":{"US":{"description":"\u003Cp\u003EAn attack against an authentication protocol where the Attacker intercepts data travelling along the network between the Claimant and Verifier, but does not alter the data (i.e., eavesdropping).\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAn attack that does not alter systems or data.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Passive Cyber Defence":{"Tallinn Manual":{"description":"\u003Cp\u003EA measure for detecting and mitigating cyber intrusions and the effects of cyber attacks that does not involve launching a preventive, pre-emptive or countering operation against the source. Example of passive cyber defence measures are firewalls, patches, anti-virus software and digital forensic tools.\u003Cbr \/\u003E\nSource: \u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Passive Security Testing":{"US":{"description":"\u003Cp\u003ESecurity testing that does not involve any direct interaction with the targets, such as sending packets to a target.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Security Challenges in Cyberspace":{"Georgia":{"description":"\u003Cp\u003ESecurity challenges for Georgia include categories of cybercrime directed against critical information systems of Georgia and\/or for the purpose of obtaining secret information, economic sabotage and other politically motivated means. Also lower-level acts against information\/cyber security that jeopardize access to information and proper operation of information systems.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.dea.gov.ge\/uploads\/National%20Cyber%20Security%20Strategy%20of%20Georgia_ENG.pdf\u0022\u003ECyber Security Strategy of Georgia 2012-2015 - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Security of Information":{"Czech Republic":{"description":"\u003Cp\u003ESecurity of information means ensuring confidentiality, integrity and availability of information\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003EOn Cyber Security and Change of Related Acts (Act on Cyber Security) - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"State Actors":{"Nigeria":{"description":"\u003Cp\u003EThe State Actors are established and well organised to carry out the most sophisticated threat in the cyberspace with the goal of exploiting computers and information and communication networks to gather intelligence on government, military, industrial and economic targets, and opponents of their Regimes. They gathered intelligence data and information which can be used for spreading falsehood and disrupting critical services. Sometimes they install hidden malicious software on a system can be adapted to suit an attacker\u0027s changing objectives, lying hidden within the system in readiness for exploitation during times of increased tension or conflict.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/ccdcoe.org\/strategies-policies.html\u0022\u003ENational Cybersecurity Policy and Strategy - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Terrorism":{"South Korea":{"description":"\u003Cp\u003EVarious forms of cyber terrorism: Hacking, DDoS attacks, denials of service, logic bombs, Trojan horses, Worm viruses, HERF guns etc.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.newamerica.org\/cyber-global\/compilation-of-existing-cybersecurity-and-information-security-related-definitions\/\u0022\u003ECompilation of Existing Cybersecurity and Information Security Related Defintions, Open Technology Institute New America - 2012\u003C\/a\u003E\u003C\/p\u003E\n"}},"Terrorist Use of the Internet":{"Denmark":{"description":"\u003Cp\u003ETerrorist networks also are moving to incorporate cyber operations into their strategic doctrines. Among many activities, they are using the Internet to support their recruitment, fundraising and propaganda activities. Terrorists are aware of the potential for using the Western world\u0027s dependence on cyber systems as a vulnerability to be exploited. For example, there are now online resources providing advice to terrorists on how to defend their own websites while launching cyber attacks on their enemies. In addition, a number of terrorist groups, including Al-Qaeda, have expressed their intention to launch cyber attacks against Western states. Though experts doubt that terrorists currently have the ability to cause serious damage via cyber attacks, they recognize that this capacity will likely develop over time.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/national-cyber-security-strategies-ncsss\/DK_NCSS.pdf\u0022\u003ECanada\u0027s Cyber Security Strategy for a stronger and more prosperous Canada - 2015\u003C\/a\u003E\u003C\/p\u003E\n"}},"Threat":{"US":{"description":"\u003Cp\u003EAny circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and\/or denial of service\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EThe potential source of an adverse event.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003EAny circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and\/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2013\/NIST.IR.7298r2.pdf\u0022\u003EGlossary of Key Information Security Terms, eds. Richard Kissel, National Institute for Standards and Technology, US Department of Commerce, NISTIR 7298, Revision 2, - 2013\u003C\/a\u003E\u003C\/p\u003E\n"}},"Threat of Force [Cyber]":{"Tallinn Manual":{"description":"\u003Cp\u003EA cyber operation, or threatened cyber operation\u00a0 constitutes an unlawful threat of force when the threatened action, if carried out,\u00a0 would be an unlawful use of force.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 12\u003C\/a\u003E\u003C\/p\u003E\n"}},"Unintentional Insiders":{"Qatar":{"description":"\u003Cp\u003EThose with authorized access to an organization\u0027s network, system, or information. Unintentional insiders can represent a threat due to non-malicious action or inaction that causes harm or impacts the confidentiality, integrity, or availability of networks, systems, or information.\u003Cbr \/\u003E\u003Cbr \/\u003E Source: \u003Ca target=\u0022_blank\u0022 href=\u0022http:\/\/www.ictqatar.qa\/en\/documents\/document\/national-cyber-security-strategy\u0022\u003EQatar National Cyber Security Strategy - 2014\u003C\/a\u003E\u003C\/p\u003E\n"}},"Use of Force [Cyber]":{"Tallinn Manual":{"description":"\u003Cp\u003EA cyber operation constitutes a use of force when its scale and effects are comparable to non-cyber operations rising to the level of a use of force.\u003Cbr \/\u003E\u003Cspan style=\u0022line-height: 1.6;\u0022\u003ESource: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/ccdcoe.org\/tallinn-manual.html\u0022 style=\u0022line-height: 1.6;\u0022\u003ETallinn Manual on the International Law Applicable to Cyber Warfare \u2013 2013, Rule 11\u003C\/a\u003E\u003C\/p\u003E\n"}}}