Terms: Difference between revisions
Jump to navigation
Jump to search
(One intermediate revision by the same user not shown) | |||
Line 2: | Line 2: | ||
== Key Terms == | == Key Terms == | ||
* | * Advanced Vulnerability Grading Tool (AVGT) | ||
* | * Artificial Intelligence (AI) | ||
* Asset Management | |||
* Backup and Recovery | |||
* Bulk Electric System (BES) | |||
* Cloud Computing | |||
* Computer-Based Training (CBT) | |||
* Configuration Management | |||
* Confidentiality, Integrity, and Availability (CIA) | |||
* Critical Infrastructure Protection (CIP) | |||
* Cyber Security | |||
* Cyber Security Incident Response Team (CSIRT) | |||
* Cyber-Physical Systems | |||
* Data Acquisition | |||
* Data Classification | |||
* Data Management | |||
* Digital Worker (DW) | |||
* Disaster Recovery Plan (DRP) | |||
* Distributed Control System (DCS) | |||
* Distributed Energy Resources (DER) | |||
* Electronic Security Perimeter (ESP) | |||
* Governance, Risk, and Compliance (GRC) | |||
* Hardening | |||
* Identity and Access Management (IAM) | |||
* Incident Response | |||
* Industrial Internet of Things (IIoT) | |||
* Industry 4.0 | |||
* Information Technology (IT) | |||
* Integrated Security Operations Center (ISOC) | |||
* Internet of Things (IoT) | |||
* Machine Learning (ML) | |||
* Monitoring and Diagnostics (M&D) | |||
* National Institute of Standards and Technology (NIST) | |||
* National Initiative for Cybersecurity Education (NICE) | |||
* Natural Language Processing (NLP) | |||
* North American Electric Reliability Corporation (NERC) | |||
* Operational Technology (OT) | |||
* Operations Security (OPSEC) | |||
* Position, Navigation, and Timing (PNT) | |||
* Quantum Computing | |||
* Risk Assessment | |||
* Risk Management | |||
* Security Architectures | |||
* Security Event Monitoring | |||
* Security Information and Event Management (SIEM) | |||
* Security Operations Center (SOC) | |||
* Software Bill of Materials (SBOM) | |||
* Supply Chain | |||
* Tamper Indicating Device (TID) | |||
* Transient Cyber Assets | |||
* Vulnerability Management | |||
* Wireless Technology | |||
== Industry External Glossaries == | == Industry External Glossaries == |
Latest revision as of 18:39, 30 October 2024
Definitions and Terms
Key Terms
- Advanced Vulnerability Grading Tool (AVGT)
- Artificial Intelligence (AI)
- Asset Management
- Backup and Recovery
- Bulk Electric System (BES)
- Cloud Computing
- Computer-Based Training (CBT)
- Configuration Management
- Confidentiality, Integrity, and Availability (CIA)
- Critical Infrastructure Protection (CIP)
- Cyber Security
- Cyber Security Incident Response Team (CSIRT)
- Cyber-Physical Systems
- Data Acquisition
- Data Classification
- Data Management
- Digital Worker (DW)
- Disaster Recovery Plan (DRP)
- Distributed Control System (DCS)
- Distributed Energy Resources (DER)
- Electronic Security Perimeter (ESP)
- Governance, Risk, and Compliance (GRC)
- Hardening
- Identity and Access Management (IAM)
- Incident Response
- Industrial Internet of Things (IIoT)
- Industry 4.0
- Information Technology (IT)
- Integrated Security Operations Center (ISOC)
- Internet of Things (IoT)
- Machine Learning (ML)
- Monitoring and Diagnostics (M&D)
- National Institute of Standards and Technology (NIST)
- National Initiative for Cybersecurity Education (NICE)
- Natural Language Processing (NLP)
- North American Electric Reliability Corporation (NERC)
- Operational Technology (OT)
- Operations Security (OPSEC)
- Position, Navigation, and Timing (PNT)
- Quantum Computing
- Risk Assessment
- Risk Management
- Security Architectures
- Security Event Monitoring
- Security Information and Event Management (SIEM)
- Security Operations Center (SOC)
- Software Bill of Materials (SBOM)
- Supply Chain
- Tamper Indicating Device (TID)
- Transient Cyber Assets
- Vulnerability Management
- Wireless Technology