IEC TS 62351-2-2008 Power systems management and associated information exchange - Data and communications security - Part 2 Glossary of terms《电力系统管理和相关信息交换.数据和通信安全.第2部分 术语表》.pdf
《IEC TS 62351-2-2008 Power systems management and associated information exchange - Data and communications security - Part 2 Glossary of terms《电力系统管理和相关信息交换.数据和通信安全.第2部分 术语表》.pdf》由会员分享,可在线阅读,更多相关《IEC TS 62351-2-2008 Power systems management and associated information exchange - Data and communications security - Part 2 Glossary of terms《电力系统管理和相关信息交换.数据和通信安全.第2部分 术语表》.pdf(56页珍藏版)》请在麦多课文档分享上搜索。
1、 IEC/TS 62351-2 Edition 1.0 2008-08 TECHNICAL SPECIFICATIONPower systems management and associated information exchange Data and communications security Part 2: Glossary of terms IEC/TS 62351-2:2008(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2008 IEC, Geneva, Switzerland All rights reserve
2、d. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or IECs member National Committee in the country of the requester. If yo
3、u have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or your local IEC member National Committee for further information. Droits de reproduction rservs. Sauf indication contraire, aucune partie de cette pu
4、blication ne peut tre reproduite ni utilise sous quelque forme que ce soit et par aucun procd, lectronique ou mcanique, y compris la photocopie et les microfilms, sans laccord crit de la CEI ou du Comit national de la CEI du pays du demandeur. Si vous avez des questions sur le copyright de la CEI ou
5、 si vous dsirez obtenir des droits supplmentaires sur cette publication, utilisez les coordonnes ci-aprs ou contactez le Comit national de la CEI de votre pays de rsidence. IEC Central Office 3, rue de Varemb CH-1211 Geneva 20 Switzerland Email: inmailiec.ch Web: www.iec.ch About IEC publications Th
6、e technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the latest edition, a corrigenda or an amendment might have been published. Catalogue of IEC publications: www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variet
7、y of criteria (reference number, text, technical committee,). It also gives information on projects, withdrawn and replaced publications. IEC Just Published: www.iec.ch/online_news/justpub Stay up to date on all new IEC publications. Just Published details twice a month all new publications released
8、. Available on-line and also by email. Electropedia: www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French, with equivalent terms in additional languages. Also known as the International El
9、ectrotechnical Vocabulary online. Customer Service Centre: www.iec.ch/webstore/custserv If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service Centre FAQ or contact us: Email: csciec.ch Tel.: +41 22 919 02 11 Fax: +41 22 919 03 00 IEC/T
10、S 62351-2 Edition 1.0 2008-08 TECHNICAL SPECIFICATIONPower systems management and associated information exchange Data and communications security Part 2: Glossary of terms INTERNATIONAL ELECTROTECHNICAL COMMISSION XA ICS 33.200 PRICE CODE ISBN 2-8318-9956-7 Registered trademark of the International
11、 Electrotechnical Commission 2 TS 62351-2 IEC:2008(E) CONTENTS FOREWORD.9 1 Scope and object11 2 Terms and definitions .11 2.1 Glossary references and permissions11 2.2 Glossary of security and related communication terms 13 2.2.1 Abstract Communication Service Interface (ACSI).13 2.2.2 Access13 2.2
12、.3 Access Authority .13 2.2.4 Access Control13 2.2.5 Access Control List (ACL) .13 2.2.6 Accountability .13 2.2.7 Adequate Security.13 2.2.8 Advanced Encryption Standard (AES) .14 2.2.9 Alarm14 2.2.10 Application Layer 14 2.2.11 Association .14 2.2.12 Assurance.14 2.2.13 Asymmetric Cipher14 2.2.14 A
13、symmetric Cryptography .14 2.2.15 Asymmetric Key Pair.14 2.2.16 Attack .14 2.2.17 Audit .15 2.2.18 Audit Log 15 2.2.19 Audit Record Field 15 2.2.20 Audit Trail .15 2.2.21 Authentic Signature.15 2.2.22 Authentication.15 2.2.23 Authorization.15 2.2.24 Authorization Process .15 2.2.25 Authorized User 1
14、6 2.2.26 Availability 16 2.2.27 Back Door.16 2.2.28 Bandwidth.16 2.2.29 Biometric 16 2.2.30 Block Cipher .16 2.2.31 Boundary Protection16 2.2.32 Buffer Overflow.16 2.2.33 Bump-in-the-Stack 17 2.2.34 Bump-in-the-Wire17 2.2.35 Call Back 17 2.2.36 Certificate .17 2.2.37 Certificate Management 17 2.2.38
15、 Certificate Revocation List (CRL) 17 2.2.39 Certification 17 2.2.40 Certification Authority (CA) .18 TS 62351-2 IEC:2008(E) 3 2.2.41 Chain of Custody 18 2.2.42 Challenge Handshake Authentication Protocol (CHAP) .18 2.2.43 Challenge-Response, Challenge-Response Protocol.18 2.2.44 Checksum.18 2.2.45
16、Cipher.18 2.2.46 Ciphertext .19 2.2.47 Cleartext .19 2.2.48 Client 19 2.2.49 Compromise19 2.2.50 Computer Emergency Response Team (CERT).19 2.2.51 Computer Virus.19 2.2.52 Confidentiality.19 2.2.53 Conformance Test.19 2.2.54 Control Network 20 2.2.55 Control System .20 2.2.56 Control System Operatio
17、ns .20 2.2.57 Cookie 20 2.2.58 Countermeasure .20 2.2.59 Cracker.20 2.2.60 Credential .21 2.2.61 Critical System Resource21 2.2.62 Crypto-algorithm .21 2.2.63 Cryptographic Hash 21 2.2.64 Cryptographic Key 21 2.2.65 Cryptography 21 2.2.66 Cyber21 2.2.67 Cyber Attack .21 2.2.68 Cyber Security 22 2.2.
18、69 Cyclic Redundancy Check (CRC)22 2.2.70 Data Authentication.22 2.2.71 Data Corruption 22 2.2.72 Data Encryption Standard (DES).22 2.2.73 Data Integrity 22 2.2.74 Data Object (DO) 22 2.2.75 Data Security 22 2.2.76 Datagram22 2.2.77 Decode .23 2.2.78 Decrypt .23 2.2.79 Decryption 23 2.2.80 De-Facto
19、Standard23 2.2.81 Defence in Depth 23 2.2.82 Denial of Service (DoS).23 2.2.83 Designated Approving Authority (DAA)24 2.2.84 Device 24 2.2.85 Diffie-Hellman Key Exchange24 2.2.86 Digital Certificate 24 2.2.87 Digital Data.24 2.2.88 Digital Signature .24 2.2.89 Digital Signature Standard (DSS)25 4 TS
20、 62351-2 IEC:2008(E) 2.2.90 Distributed Control System (DCS).25 2.2.91 Dongle 25 2.2.92 Eavesdropping25 2.2.93 Electronic Deception .25 2.2.94 Elliptic Curve Cryptography.25 2.2.95 Encrypt .25 2.2.96 Encryption.25 2.2.97 Firewall.26 2.2.98 Flooding26 2.2.99 Flow Control .26 2.2.100 Functions26 2.2.1
21、01 Gateway .26 2.2.102 Generic Upper Layer Security (GULS).26 2.2.103 Hacker 26 2.2.104 Hash Function.27 2.2.105 Honey Pot.27 2.2.106 Identification .27 2.2.107 IEEE 802.11i.27 2.2.108 Information Security27 2.2.109 Instrumentation, Systems, and Automation Society (ISA) 27 2.2.110 Integrity 27 2.2.1
22、11 Intelligent Electronic Device (IED).28 2.2.112 Intercept .28 2.2.113 Interchangeability28 2.2.114 Interface .28 2.2.115 Internet Protocol security (IPsec) 28 2.2.116 Interoperability28 2.2.117 Intruder.28 2.2.118 Intrusion Detection System (IDS) 29 2.2.119 Key .29 2.2.120 Key Distribution 29 2.2.
23、121 Key Logger .29 2.2.122 Key Pair29 2.2.123 Key Update.29 2.2.124 Latency.29 2.2.125 Local Area Network (LAN).29 2.2.126 Malicious Code .29 2.2.127 Malware30 2.2.128 Management Information Base (MIB) 30 2.2.129 Man-in-the-Middle Attack 30 2.2.130 Manufacturing Message Specification (MMS)30 2.2.131
24、 Masquerade30 2.2.132 Mockingbird 31 2.2.133 Multicast .31 2.2.134 Network Layer Protocol.31 2.2.135 Network Management .31 2.2.136 Non-repudiation 31 2.2.137 Object Identifier (OID).31 2.2.138 Open Protocol.31 TS 62351-2 IEC:2008(E) 5 2.2.139 Open System 31 2.2.140 Open Systems Architecture.32 2.2.
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IECTS6235122008POWERSYSTEMSMANAGEMENTANDASSOCIATEDINFORMATIONEXCHANGEDATAANDCOMMUNICATIONSSECURITYPART2GLOSSARYOFTERMS

链接地址:http://www.mydoc123.com/p-1238273.html