Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms

IEC 62351-2:2008 (E) covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined.
This publication is of core relevance for Smart Grid.

General Information

Status
Published
Publication Date
18-Aug-2008
Drafting Committee
WG 15 - TC 57/WG 15
Current Stage
PPUB - Publication issued
Start Date
19-Aug-2008
Completion Date
15-Aug-2008

Overview

IEC TS 62351-2:2008 - part of the IEC 62351 series - is a Technical Specification that provides a glossary of terms for data and communications security in power systems management. It lists and cross-references key cybersecurity, cryptography and communications terms used across the IEC 62351 family. The document clarifies vocabulary for Smart Grid and utility environments, and points readers to original definitions from other standards bodies where appropriate. It is not intended to be a definitive dictionary but a harmonized reference for the series.

Key topics

The glossary organizes and defines terminology that underpins power systems security. Major topic areas include:

  • Cryptography and keys: definitions for AES, DES, Diffie–Hellman, elliptic curve cryptography, block/stream ciphers, cryptographic hash, key pairs, key distribution, key update.
  • Authentication & authorization: terms such as authentication, authorization, digital certificate, certification authority (CA), certificate revocation list (CRL).
  • Data protection: confidentiality, integrity, encryption/decryption, data authentication, digital signature, non-repudiation.
  • Network & protocol security: IPsec, firewalls, gateways, Abstract Communication Service Interface (ACSI), Generic Upper Layer Security (GULS).
  • Operational security & threats: Denial of Service (DoS), malware, virus, man-in-the-middle, intrusion detection system (IDS), audit, accountability, chain of custody.
  • Control systems context: Intelligent Electronic Device (IED), control network, Manufacturing Message Specification (MMS), distributed control system (DCS).
  • Security management constructs: access control, access control list (ACL), assurance, certification, conformance test, defence in depth.

Applications / Who uses it

IEC TS 62351-2:2008 is a practical reference for:

  • Utility engineers and Smart Grid architects preparing secure system designs and documentation.
  • Cybersecurity teams and compliance officers aligning terminology across procurement, incident response, and auditing.
  • Device and software vendors implementing IEC 62351 family protocols who need consistent term usage.
  • Standards developers, testers and trainers creating interoperability test plans or educational materials. Using a consistent glossary reduces ambiguity in requirements, contracts, technical specifications, and incident reporting for critical power infrastructure.

Related standards

  • Part of the IEC 62351 series (data and communications security for power systems).
  • The glossary references original definitions from other standards organizations where formal definitions exist (see IEC TS 62351-2 for specific cross-references).

Keywords: IEC TS 62351-2, IEC 62351-2:2008, Smart Grid cybersecurity glossary, power systems security, data and communications security, IEC 62351 glossary.

Technical specification

IEC TS 62351-2:2008 - Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms

English language
52 pages
sale 15% off
Preview
sale 15% off
Preview
Technical specification

IEC TS 62351-2:2008 - Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms Released:8/19/2008 Isbn:2831899567

English language
52 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC TS 62351-2:2008 is a technical specification published by the International Electrotechnical Commission (IEC). Its full title is "Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms". This standard covers: IEC 62351-2:2008 (E) covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined. This publication is of core relevance for Smart Grid.

IEC 62351-2:2008 (E) covers the key terms used in the IEC 62351 series, and is not meant to be a definitive list. Most terms used for cyber security are formally defined by other standards organizations, and so are included here with references to where they were originally defined. This publication is of core relevance for Smart Grid.

IEC TS 62351-2:2008 is classified under the following ICS (International Classification for Standards) categories: 33.200 - Telecontrol. Telemetering. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase IEC TS 62351-2:2008 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
IEC/TS 62351-2:2008(E)
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by
any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or
IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de la CEI ou du Comité national de la CEI du pays du demandeur.
Si vous avez des questions sur le copyright de la CEI ou si vous désirez obtenir des droits supplémentaires sur cette
publication, utilisez les coordonnées ci-après ou contactez le Comité national de la CEI de votre pays de résidence.

IEC Central Office
3, rue de Varembé
CH-1211 Geneva 20
Switzerland
Email: inmail@iec.ch
Web: www.iec.ch
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.
ƒ Catalogue of IEC publications: www.iec.ch/searchpub
The IEC on-line Catalogue enables you to search by a variety of criteria (reference number, text, technical committee,…).
It also gives information on projects, withdrawn and replaced publications.
ƒ IEC Just Published: www.iec.ch/online_news/justpub
Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available
on-line and also by email.
ƒ Electropedia: www.electropedia.org
The world's leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions
in English and French, with equivalent terms in additional languages. Also known as the International Electrotechnical
Vocabulary online.
ƒ Customer Service Centre: www.iec.ch/webstore/custserv
If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service
Centre FAQ or contact us:
Email: csc@iec.ch
Tel.: +41 22 919 02 11
Fax: +41 22 919 03 00
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
PRICE CODE
XA
ICS 33.200 ISBN 2-8318-9956-7
– 2 – TS 62351-2 © IEC:2008(E)

CONTENTS
FOREWORD.9
1 Scope and object.11
2 Terms and definitions .11
2.1 Glossary references and permissions .11
2.2 Glossary of security and related communication terms .13
2.2.1 Abstract Communication Service Interface (ACSI).13
2.2.2 Access .13
2.2.3 Access Authority .13
2.2.4 Access Control.13
2.2.5 Access Control List (ACL) .13
2.2.6 Accountability .13
2.2.7 Adequate Security.13
2.2.8 Advanced Encryption Standard (AES) .14
2.2.9 Alarm .14
2.2.10 Application Layer .14
2.2.11 Association .14
2.2.12 Assurance.14
2.2.13 Asymmetric Cipher.14
2.2.14 Asymmetric Cryptography .14
2.2.15 Asymmetric Key Pair.14
2.2.16 Attack .14
2.2.17 Audit .15
2.2.18 Audit Log .15
2.2.19 Audit Record Field .15
2.2.20 Audit Trail .15
2.2.21 Authentic Signature.15
2.2.22 Authentication.15
2.2.23 Authorization.15
2.2.24 Authorization Process .15
2.2.25 Authorized User .16
2.2.26 Availability .16
2.2.27 Back Door .16
2.2.28 Bandwidth.16
2.2.29 Biometric .16
2.2.30 Block Cipher .16
2.2.31 Boundary Protection.16
2.2.32 Buffer Overflow .16
2.2.33 Bump-in-the-Stack .17
2.2.34 Bump-in-the-Wire.17
2.2.35 Call Back .17
2.2.36 Certificate .17
2.2.37 Certificate Management .17
2.2.38 Certificate Revocation List (CRL) .17
2.2.39 Certification .17
2.2.40 Certification Authority (CA) .18

TS 62351-2 © IEC:2008(E) – 3 –

2.2.41 Chain of Custody .18
2.2.42 Challenge Handshake Authentication Protocol (CHAP) .18
2.2.43 Challenge-Response, Challenge-Response Protocol.18
2.2.44 Checksum.18
2.2.45 Cipher.18
2.2.46 Ciphertext .19
2.2.47 Cleartext .19
2.2.48 Client .19
2.2.49 Compromise.19
2.2.50 Computer Emergency Response Team (CERT).19
2.2.51 Computer Virus .19
2.2.52 Confidentiality .19
2.2.53 Conformance Test.19
2.2.54 Control Network .20
2.2.55 Control System .20
2.2.56 Control System Operations .20
2.2.57 Cookie .20
2.2.58 Countermeasure .20
2.2.59 Cracker .20
2.2.60 Credential .21
2.2.61 Critical System Resource .21
2.2.62 Crypto-algorithm .21
2.2.63 Cryptographic Hash .21
2.2.64 Cryptographic Key .21
2.2.65 Cryptography .21
2.2.66 Cyber.21
2.2.67 Cyber Attack .21
2.2.68 Cyber Security .22
2.2.69 Cyclic Redundancy Check (CRC) .22
2.2.70 Data Authentication.22
2.2.71 Data Corruption .22
2.2.72 Data Encryption Standard (DES).22
2.2.73 Data Integrity .22
2.2.74 Data Object (DO) .22
2.2.75 Data Security .22
2.2.76 Datagram .22
2.2.77 Decode .23
2.2.78 Decrypt .23
2.2.79 Decryption .23
2.2.80 De-Facto Standard.23
2.2.81 Defence in Depth .23
2.2.82 Denial of Service (DoS).23
2.2.83 Designated Approving Authority (DAA).24
2.2.84 Device .24
2.2.85 Diffie-Hellman Key Exchange.24
2.2.86 Digital Certificate .24
2.2.87 Digital Data.24
2.2.88 Digital Signature .24
2.2.89 Digital Signature Standard (DSS).25

– 4 – TS 62351-2 © IEC:2008(E)

2.2.90 Distributed Control System (DCS) .25
2.2.91 Dongle .25
2.2.92 Eavesdropping .25
2.2.93 Electronic Deception .25
2.2.94 Elliptic Curve Cryptography.25
2.2.95 Encrypt .25
2.2.96 Encryption.25
2.2.97 Firewall .26
2.2.98 Flooding.26
2.2.99 Flow Control .26
2.2.100 Functions .26
2.2.101 Gateway .26
2.2.102 Generic Upper Layer Security (GULS).26
2.2.103 Hacker .26
2.2.104 Hash Function.27
2.2.105 Honey Pot.27
2.2.106 Identification .27
2.2.107 IEEE 802.11i.27
2.2.108 Information Security.27
2.2.109 Instrumentation, Systems, and Automation Society (ISA) .27
2.2.110 Integrity .27
2.2.111 Intelligent Electronic Device (IED).28
2.2.112 Intercept .28
2.2.113 Interchangeability.28
2.2.114 Interface .28
2.2.115 Internet Protocol security (IPsec) .28
2.2.116 Interoperability.28
2.2.117 Intruder .28
2.2.118 Intrusion Detection System (IDS) .29
2.2.119 Key .29
2.2.120 Key Distribution .29
2.2.121 Key Logger .29
2.2.122 Key Pair.29
2.2.123 Key Update .29
2.2.124 Latency.29
2.2.125 Local Area Network (LAN).29
2.2.126 Malicious Code .29
2.2.127 Malware .30
2.2.128 Management Information Base (MIB) .30
2.2.129 Man-in-the-Middle Attack .30
2.2.130 Manufacturing Message Specification (MMS) .30
2.2.131 Masquerade.30
2.2.132 Mockingbird .31
2.2.133 Multicast .31
2.2.134 Network Layer Protocol.31
2.2.135 Network Management .31
2.2.136 Non-repudiation .31
2.2.137 Object Identifier (OID).31
2.2.138 Open Protocol.31

TS 62351-2 © IEC:2008(E) – 5 –

2.2.139 Open System .31
2.2.140 Open Systems Architecture.32
2.2.141 Open Systems Interconnection – Reference Model (OSI-RM).32
2.2.142 Password.32
2.2.143 Personal Identification Number (PIN) .32
2.2.144 Phishing.32
2.2.145 Physical Layer Protocol.32
2.2.146 Plaintext.32
2.2.147 Point-to-Point Protocol (PPP).33
2.2.148 Port Scanning .33
2.2.149 Pretty Good Privacy (PGP) .33
2.2.150 Private Key .33
2.2.151 Protection Profile .33
2.2.152 Proxy, Proxy Server .33
2.2.153 Pseudorandom Number Generator (PRNG).34
2.2.154 Public Key.34
2.2.155 Public Key Asymmetric Cryptographic Algorithm .34
2.2.156 Public Key Certificate.34
2.2.157 Public Key Cryptography.34
2.2.158 Public Key Infrastructure (PKI) .35
2.2.159 Replay Attack.35
2.2.160 Repudiation .35
2.2.161 Risk .35
2.2.162 Risk Assessment .35
2.2.163 Risk Management .35
2.2.164 Rivest, Shamir and Adleman (RSA).36
2.2.165 Role Based Access Control (RBAC) .36
2.2.166 Secret Key .36
2.2.167 Secret Key Encryption.36
2.2.168 Secret Key Symmetric Cryptographic Algorithm .36
2.2.169 Secure Hash Algorithm (SHA) .36
2.2.170 Secure Shell (SSH) .36
2.2.171 Secure Sockets Layer (SSL) .36
2.2.172 Secure/ Multipurpose Internet Mail Extensions (S/MIME) .37
2.2.173 Security .37
2.2.174 Security Domain.37
2.2.175 Security Guidelines .37
2.2.176 Security Management .37
2.2.177 Security Performance.37
2.2.178 Security Perimeter .37
2.2.179 Security Policy .38
2.2.180 Security Risk Assessment.38
2.2.181 Security Services .38
2.2.182 Server.38
2.2.183 Session Key.38
2.2.184 Shoulder Surfing .38
2.2.185 Signature Certificate .38
2.2.186 Simple Network Management Protocol (SNMP).38
2.2.187 Smart Card .39

– 6 – TS 62351-2 © IEC:2008(E)

2.2.188 Smurf.39
2.2.189 Sniffing .39
2.2.190 Social Engineering .39
2.2.191 Spoof .39
2.2.192 Spyware.39
2.2.193 Strong Authentication.39
2.2.194 Strong Secret.39
2.2.195 Supervisory Control and Data Acquisition (SCADA) .39
2.2.196 Symmetric Cryptography.40
2.2.197 Symmetric Key.40
2.2.198 Symmetric Key Algorithm .40
2.2.199 SYN Flood .40
2.2.200 Tamper Detection .40
2.2.201 Tampering.40
2.2.202 TASE.2 .40
2.2.203 Threat .40
2.2.204 Throughput .40
2.2.205 Traffic Analysis .41
2.2.206 Transport Level Security (TLS) .41
2.2.207 Trap Door .41
2.2.208 Triple DES .41
2.2.209 Trojan Horse .41
2.2.210 Trust .41
2.2.211 Tunnel .42
2.2.212 Unforgeable .42
2.2.213 Update Key.42
2.2.214 Virtual Private Network (VPN) .42
2.2.215 Virus .43
2.2.216 Vulnerability.43
2.2.217 Vulnerability Assessment .43
2.2.218 Wide Area Network (WAN) .43
2.2.219 WiFi .43
2.2.220 Wired Equivalent Privacy (WEP) .43
2.2.221 Wireless Application Protocol (WAP).44
2.2.222 Wireless LAN (WLAN).44
2.2.223 Worm .44
2.2.224 X.509 .44
3 Abbreviations .45
3.1.1 3DES .45
3.1.2 ACL .45
3.1.3 ACSI .45
3.1.4 AES .45
3.1.5 AGA.45
3.1.6 ANSI .45
3.1.7 BIS .45
3.1.8 BSI .45
3.1.9 BTW .45
3.1.10 CA .45
3.1.11 CERT.45

TS 62351-2 © IEC:2008(E) – 7 –

3.1.12 CHAP.45
3.1.13 CIP .45
3.1.14 CRC.45
3.1.15 CRL .45
3.1.16 DAA .45
3.1.17 DCS.45
3.1.18 DES .45
3.1.19 DO .45
3.1.20 DoS .45
3.1.21 DSS .45
3.1.22 ECC.45
3.1.23 EM/RF .45
3.1.24 EMS.45
3.1.25 FIPS .45
3.1.26 GULS.45
3.1.27 ICCP.45
3.1.28 IDS .46
3.1.29 IED .46
3.1.30 IEEE .46
3.1.31 IETF.46
3.1.32 IPS .46
3.1.33 IPsec .46
3.1.34 ISA .46
3.1.35 ISO .46
3.1.36 IT .46
3.1.37 LAN .46
3.1.38 MIB .46
3.1.39 MMS .46
3.1.40 NERC .46
3.1.41 NIST .46
3.1.42 OID .46
3.1.43 OSI-RM.46
3.1.44 PGP.46
3.1.45 PICS .46
3.1.46 PIN .46
3.1.47 PIXIT .46
3.1.48 PKI .46
3.1.49 PLC .46
3.1.50 PLC .47
3.1.51 PPP .47
3.1.52 PRNG .47
3.1.53 RA .47
3.1.54 RBAC.47
3.1.55 RSA .47
3.1.56 RTU .47
3.1.57 SCADA .47
3.1.58 SHA .47
3.1.59 SNMP .47
3.1.60 SSH .47

– 8 – TS 62351-2 © IEC:2008(E)

3.1.61 SSL.47
3.1.62 TASE.2 .47
3.1.63 TDEA .47
3.1.64 TDES .47
3.1.65 TLS.47
3.1.66 VPN .47
3.1.67 WAN .47
3.1.68 WEP .47
3.1.69 WiFi .47
3.1.70 WLAN .47
3.1.71 WPA .47
BIBLIOGRAPHY .48

TS 62351-2 © IEC:2008(E) – 9 –

INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
POWER SYSTEMS MANAGEMENT AND
ASSOCIATED INFORMATION EXCHANGE –
DATA AND COMMUNICATIONS SECURITY –

Part 2: Glossary of terms
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for any
equipment declared to be in conformity with an IEC Publication.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
The main task of IEC technical committees is to prepare International Standards. In
exceptional circumstances, a technical committee may propose the publication of a technical
specification when
• the required support cannot be obtained for the publication of an International Standard,
despite repeated efforts, or
• The subject is still under technical development or where, for any other reason, there is
the future but no immediate possibility of an agreement on an International Standard.
Technical specifications are subject to review within three years of publication to decide
whether they can be transformed into International Standards.
IEC 62351-2, which is a technical specification, has been prepared by IEC technical
committee 57: Power systems management and associated information exchange.

– 10 – TS 62351-2 © IEC:2008(E)

The text of this technical specification is based on the following documents:
Enquiry draft Report on voting
57/853/DTS 57/922/RVC
Full information on the voting for the approval of this technical specification can be found in
the report on voting indicated in the above table.
A list of all parts of the IEC 62351 series, under the general title Power systems management
and associated information exchange – Data and communications security, can be found on
the IEC website.
The committee has decided that the contents of this publication will remain unchanged until
the maintenance result date indicated on the IEC web site under "http://webstore.iec.ch" in
the data related to the specific publication. At this date, the publication will be
• transformed into an International standard,
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
A bilingual edition of this document may be issued at a later date.

TS 62351-2 © IEC:2008(E) – 11 –

POWER SYSTEMS MANAGEMENT AND
ASSOCIATED INFORMATION EXCHANGE –
DATA AND COMMUNICATIONS SECURITY –

Part 2: Glossary of terms
1 Scope and object
This part of IEC 62351 covers the key terms used in the IEC 62351 series, and is not meant
to be a definitive list. Most terms used for cyber security are formally defined by other
standards organizations, and so are included here with references to where they were
originally defined.
2 Terms and definitions
2.1 Glossary references and permissions
With permission granted by the appropriate organizations, the definitions in this glossary were
copied from the following sources:
• [API 1164] American Petroleum Institute. This standard on SCADA security
provides guidance to the operators of Oil and Gas liquid pipeline systems for
managing SCADA system integrity and security. The use of this document is not
limited to pipelines, but should be viewed as a listing of best practices to be
employed when reviewing and developing standards for a SCADA system. This
document embodies the "API Security Guidelines for the Petroleum Industry." This
guideline is specifically designed to provide the operators with a description of
industry practices in SCADA Security, and to provide the framework needed to
develop sound security practices within the operator's individual companies.
• [ATIS] ATIS Telecom Glossary 2007 at http://www.atis.org/glossary/. This web site
incorporates and supersedes T1.523-2001, the ATIS Telecom Glossary of 2000
which was an expansion of FS-1037C, the Federal Standard 1037, Glossary of
Telecommunication Terms initially published in 1980 .
• [FIPS-140-2] This is the US Federal Information Processing Standard Publication
140-2, titled “Security Requirements for Cryptographic Modules”.
• [ISA99] This ISA Technical Report provides a framework for developing an
electronic security program and provides a recommended organization and
structure f
...


IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
IEC/TS 62351-2:2008(E)
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by
any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or
IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de la CEI ou du Comité national de la CEI du pays du demandeur.
Si vous avez des questions sur le copyright de la CEI ou si vous désirez obtenir des droits supplémentaires sur cette
publication, utilisez les coordonnées ci-après ou contactez le Comité national de la CEI de votre pays de résidence.

IEC Central Office
3, rue de Varembé
CH-1211 Geneva 20
Switzerland
Email: inmail@iec.ch
Web: www.iec.ch
About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.
ƒ Catalogue of IEC publications: www.iec.ch/searchpub
The IEC on-line Catalogue enables you to search by a variety of criteria (reference number, text, technical committee,…).
It also gives information on projects, withdrawn and replaced publications.
ƒ IEC Just Published: www.iec.ch/online_news/justpub
Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available
on-line and also by email.
ƒ Electropedia: www.electropedia.org
The world's leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions
in English and French, with equivalent terms in additional languages. Also known as the International Electrotechnical
Vocabulary online.
ƒ Customer Service Centre: www.iec.ch/webstore/custserv
If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service
Centre FAQ or contact us:
Email: csc@iec.ch
Tel.: +41 22 919 02 11
Fax: +41 22 919 03 00
IEC/TS 62351-2
Edition 1.0 2008-08
TECHNICAL
SPECIFICATION
Power systems management and associated information exchange – Data and
communications security –
Part 2: Glossary of terms
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
PRICE CODE
XA
ICS 33.200 ISBN 2-8318-9956-7
– 2 – TS 62351-2 © IEC:2008(E)

CONTENTS
FOREWORD.9
1 Scope and object.11
2 Terms and definitions .11
2.1 Glossary references and permissions .11
2.2 Glossary of security and related communication terms .13
2.2.1 Abstract Communication Service Interface (ACSI).13
2.2.2 Access .13
2.2.3 Access Authority .13
2.2.4 Access Control.13
2.2.5 Access Control List (ACL) .13
2.2.6 Accountability .13
2.2.7 Adequate Security.13
2.2.8 Advanced Encryption Standard (AES) .14
2.2.9 Alarm .14
2.2.10 Application Layer .14
2.2.11 Association .14
2.2.12 Assurance.14
2.2.13 Asymmetric Cipher.14
2.2.14 Asymmetric Cryptography .14
2.2.15 Asymmetric Key Pair.14
2.2.16 Attack .14
2.2.17 Audit .15
2.2.18 Audit Log .15
2.2.19 Audit Record Field .15
2.2.20 Audit Trail .15
2.2.21 Authentic Signature.15
2.2.22 Authentication.15
2.2.23 Authorization.15
2.2.24 Authorization Process .15
2.2.25 Authorized User .16
2.2.26 Availability .16
2.2.27 Back Door .16
2.2.28 Bandwidth.16
2.2.29 Biometric .16
2.2.30 Block Cipher .16
2.2.31 Boundary Protection.16
2.2.32 Buffer Overflow .16
2.2.33 Bump-in-the-Stack .17
2.2.34 Bump-in-the-Wire.17
2.2.35 Call Back .17
2.2.36 Certificate .17
2.2.37 Certificate Management .17
2.2.38 Certificate Revocation List (CRL) .17
2.2.39 Certification .17
2.2.40 Certification Authority (CA) .18

TS 62351-2 © IEC:2008(E) – 3 –

2.2.41 Chain of Custody .18
2.2.42 Challenge Handshake Authentication Protocol (CHAP) .18
2.2.43 Challenge-Response, Challenge-Response Protocol.18
2.2.44 Checksum.18
2.2.45 Cipher.18
2.2.46 Ciphertext .19
2.2.47 Cleartext .19
2.2.48 Client .19
2.2.49 Compromise.19
2.2.50 Computer Emergency Response Team (CERT).19
2.2.51 Computer Virus .19
2.2.52 Confidentiality .19
2.2.53 Conformance Test.19
2.2.54 Control Network .20
2.2.55 Control System .20
2.2.56 Control System Operations .20
2.2.57 Cookie .20
2.2.58 Countermeasure .20
2.2.59 Cracker .20
2.2.60 Credential .21
2.2.61 Critical System Resource .21
2.2.62 Crypto-algorithm .21
2.2.63 Cryptographic Hash .21
2.2.64 Cryptographic Key .21
2.2.65 Cryptography .21
2.2.66 Cyber.21
2.2.67 Cyber Attack .21
2.2.68 Cyber Security .22
2.2.69 Cyclic Redundancy Check (CRC) .22
2.2.70 Data Authentication.22
2.2.71 Data Corruption .22
2.2.72 Data Encryption Standard (DES).22
2.2.73 Data Integrity .22
2.2.74 Data Object (DO) .22
2.2.75 Data Security .22
2.2.76 Datagram .22
2.2.77 Decode .23
2.2.78 Decrypt .23
2.2.79 Decryption .23
2.2.80 De-Facto Standard.23
2.2.81 Defence in Depth .23
2.2.82 Denial of Service (DoS).23
2.2.83 Designated Approving Authority (DAA).24
2.2.84 Device .24
2.2.85 Diffie-Hellman Key Exchange.24
2.2.86 Digital Certificate .24
2.2.87 Digital Data.24
2.2.88 Digital Signature .24
2.2.89 Digital Signature Standard (DSS).25

– 4 – TS 62351-2 © IEC:2008(E)

2.2.90 Distributed Control System (DCS) .25
2.2.91 Dongle .25
2.2.92 Eavesdropping .25
2.2.93 Electronic Deception .25
2.2.94 Elliptic Curve Cryptography.25
2.2.95 Encrypt .25
2.2.96 Encryption.25
2.2.97 Firewall .26
2.2.98 Flooding.26
2.2.99 Flow Control .26
2.2.100 Functions .26
2.2.101 Gateway .26
2.2.102 Generic Upper Layer Security (GULS).26
2.2.103 Hacker .26
2.2.104 Hash Function.27
2.2.105 Honey Pot.27
2.2.106 Identification .27
2.2.107 IEEE 802.11i.27
2.2.108 Information Security.27
2.2.109 Instrumentation, Systems, and Automation Society (ISA) .27
2.2.110 Integrity .27
2.2.111 Intelligent Electronic Device (IED).28
2.2.112 Intercept .28
2.2.113 Interchangeability.28
2.2.114 Interface .28
2.2.115 Internet Protocol security (IPsec) .28
2.2.116 Interoperability.28
2.2.117 Intruder .28
2.2.118 Intrusion Detection System (IDS) .29
2.2.119 Key .29
2.2.120 Key Distribution .29
2.2.121 Key Logger .29
2.2.122 Key Pair.29
2.2.123 Key Update .29
2.2.124 Latency.29
2.2.125 Local Area Network (LAN).29
2.2.126 Malicious Code .29
2.2.127 Malware .30
2.2.128 Management Information Base (MIB) .30
2.2.129 Man-in-the-Middle Attack .30
2.2.130 Manufacturing Message Specification (MMS) .30
2.2.131 Masquerade.30
2.2.132 Mockingbird .31
2.2.133 Multicast .31
2.2.134 Network Layer Protocol.31
2.2.135 Network Management .31
2.2.136 Non-repudiation .31
2.2.137 Object Identifier (OID).31
2.2.138 Open Protocol.31

TS 62351-2 © IEC:2008(E) – 5 –

2.2.139 Open System .31
2.2.140 Open Systems Architecture.32
2.2.141 Open Systems Interconnection – Reference Model (OSI-RM).32
2.2.142 Password.32
2.2.143 Personal Identification Number (PIN) .32
2.2.144 Phishing.32
2.2.145 Physical Layer Protocol.32
2.2.146 Plaintext.32
2.2.147 Point-to-Point Protocol (PPP).33
2.2.148 Port Scanning .33
2.2.149 Pretty Good Privacy (PGP) .33
2.2.150 Private Key .33
2.2.151 Protection Profile .33
2.2.152 Proxy, Proxy Server .33
2.2.153 Pseudorandom Number Generator (PRNG).34
2.2.154 Public Key.34
2.2.155 Public Key Asymmetric Cryptographic Algorithm .34
2.2.156 Public Key Certificate.34
2.2.157 Public Key Cryptography.34
2.2.158 Public Key Infrastructure (PKI) .35
2.2.159 Replay Attack.35
2.2.160 Repudiation .35
2.2.161 Risk .35
2.2.162 Risk Assessment .35
2.2.163 Risk Management .35
2.2.164 Rivest, Shamir and Adleman (RSA).36
2.2.165 Role Based Access Control (RBAC) .36
2.2.166 Secret Key .36
2.2.167 Secret Key Encryption.36
2.2.168 Secret Key Symmetric Cryptographic Algorithm .36
2.2.169 Secure Hash Algorithm (SHA) .36
2.2.170 Secure Shell (SSH) .36
2.2.171 Secure Sockets Layer (SSL) .36
2.2.172 Secure/ Multipurpose Internet Mail Extensions (S/MIME) .37
2.2.173 Security .37
2.2.174 Security Domain.37
2.2.175 Security Guidelines .37
2.2.176 Security Management .37
2.2.177 Security Performance.37
2.2.178 Security Perimeter .37
2.2.179 Security Policy .38
2.2.180 Security Risk Assessment.38
2.2.181 Security Services .38
2.2.182 Server.38
2.2.183 Session Key.38
2.2.184 Shoulder Surfing .38
2.2.185 Signature Certificate .38
2.2.186 Simple Network Management Protocol (SNMP).38
2.2.187 Smart Card .39

– 6 – TS 62351-2 © IEC:2008(E)

2.2.188 Smurf.39
2.2.189 Sniffing .39
2.2.190 Social Engineering .39
2.2.191 Spoof .39
2.2.192 Spyware.39
2.2.193 Strong Authentication.39
2.2.194 Strong Secret.39
2.2.195 Supervisory Control and Data Acquisition (SCADA) .39
2.2.196 Symmetric Cryptography.40
2.2.197 Symmetric Key.40
2.2.198 Symmetric Key Algorithm .40
2.2.199 SYN Flood .40
2.2.200 Tamper Detection .40
2.2.201 Tampering.40
2.2.202 TASE.2 .40
2.2.203 Threat .40
2.2.204 Throughput .40
2.2.205 Traffic Analysis .41
2.2.206 Transport Level Security (TLS) .41
2.2.207 Trap Door .41
2.2.208 Triple DES .41
2.2.209 Trojan Horse .41
2.2.210 Trust .41
2.2.211 Tunnel .42
2.2.212 Unforgeable .42
2.2.213 Update Key.42
2.2.214 Virtual Private Network (VPN) .42
2.2.215 Virus .43
2.2.216 Vulnerability.43
2.2.217 Vulnerability Assessment .43
2.2.218 Wide Area Network (WAN) .43
2.2.219 WiFi .43
2.2.220 Wired Equivalent Privacy (WEP) .43
2.2.221 Wireless Application Protocol (WAP).44
2.2.222 Wireless LAN (WLAN).44
2.2.223 Worm .44
2.2.224 X.509 .44
3 Abbreviations .45
3.1.1 3DES .45
3.1.2 ACL .45
3.1.3 ACSI .45
3.1.4 AES .45
3.1.5 AGA.45
3.1.6 ANSI .45
3.1.7 BIS .45
3.1.8 BSI .45
3.1.9 BTW .45
3.1.10 CA .45
3.1.11 CERT.45

TS 62351-2 © IEC:2008(E) – 7 –

3.1.12 CHAP.45
3.1.13 CIP .45
3.1.14 CRC.45
3.1.15 CRL .45
3.1.16 DAA .45
3.1.17 DCS.45
3.1.18 DES .45
3.1.19 DO .45
3.1.20 DoS .45
3.1.21 DSS .45
3.1.22 ECC.45
3.1.23 EM/RF .45
3.1.24 EMS.45
3.1.25 FIPS .45
3.1.26 GULS.45
3.1.27 ICCP.45
3.1.28 IDS .46
3.1.29 IED .46
3.1.30 IEEE .46
3.1.31 IETF.46
3.1.32 IPS .46
3.1.33 IPsec .46
3.1.34 ISA .46
3.1.35 ISO .46
3.1.36 IT .46
3.1.37 LAN .46
3.1.38 MIB .46
3.1.39 MMS .46
3.1.40 NERC .46
3.1.41 NIST .46
3.1.42 OID .46
3.1.43 OSI-RM.46
3.1.44 PGP.46
3.1.45 PICS .46
3.1.46 PIN .46
3.1.47 PIXIT .46
3.1.48 PKI .46
3.1.49 PLC .46
3.1.50 PLC .47
3.1.51 PPP .47
3.1.52 PRNG .47
3.1.53 RA .47
3.1.54 RBAC.47
3.1.55 RSA .47
3.1.56 RTU .47
3.1.57 SCADA .47
3.1.58 SHA .47
3.1.59 SNMP .47
3.1.60 SSH .47

– 8 – TS 62351-2 © IEC:2008(E)

3.1.61 SSL.47
3.1.62 TASE.2 .47
3.1.63 TDEA .47
3.1.64 TDES .47
3.1.65 TLS.47
3.1.66 VPN .47
3.1.67 WAN .47
3.1.68 WEP .47
3.1.69 WiFi .47
3.1.70 WLAN .47
3.1.71 WPA .47
BIBLIOGRAPHY .48

TS 62351-2 © IEC:2008(E) – 9 –

INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
POWER SYSTEMS MANAGEMENT AND
ASSOCIATED INFORMATION EXCHANGE –
DATA AND COMMUNICATIONS SECURITY –

Part 2: Glossary of terms
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for any
equipment declared to be in conformity with an IEC Publication.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
The main task of IEC technical committees is to prepare International Standards. In
exceptional circumstances, a technical committee may propose the publication of a technical
specification when
• the required support cannot be obtained for the publication of an International Standard,
despite repeated efforts, or
• The subject is still under technical development or where, for any other reason, there is
the future but no immediate possibility of an agreement on an International Standard.
Technical specifications are subject to review within three years of publication to decide
whether they can be transformed into International Standards.
IEC 62351-2, which is a technical specification, has been prepared by IEC technical
committee 57: Power systems management and associated information exchange.

– 10 – TS 62351-2 © IEC:2008(E)

The text of this technical specification is based on the following documents:
Enquiry draft Report on voting
57/853/DTS 57/922/RVC
Full information on the voting for the approval of this technical specification can be found in
the report on voting indicated in the above table.
A list of all parts of the IEC 62351 series, under the general title Power systems management
and associated information exchange – Data and communications security, can be found on
the IEC website.
The committee has decided that the contents of this publication will remain unchanged until
the maintenance result date indicated on the IEC web site under "http://webstore.iec.ch" in
the data related to the specific publication. At this date, the publication will be
• transformed into an International standard,
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
A bilingual edition of this document may be issued at a later date.

TS 62351-2 © IEC:2008(E) – 11 –

POWER SYSTEMS MANAGEMENT AND
ASSOCIATED INFORMATION EXCHANGE –
DATA AND COMMUNICATIONS SECURITY –

Part 2: Glossary of terms
1 Scope and object
This part of IEC 62351 covers the key terms used in the IEC 62351 series, and is not meant
to be a definitive list. Most terms used for cyber security are formally defined by other
standards organizations, and so are included here with references to where they were
originally defined.
2 Terms and definitions
2.1 Glossary references and permissions
With permission granted by the appropriate organizations, the definitions in this glossary were
copied from the following sources:
• [API 1164] American Petroleum Institute. This standard on SCADA security
provides guidance to the operators of Oil and Gas liquid pipeline systems for
managing SCADA system integrity and security. The use of this document is not
limited to pipelines, but should be viewed as a listing of best practices to be
employed when reviewing and developing standards for a SCADA system. This
document embodies the "API Security Guidelines for the Petroleum Industry." This
guideline is specifically designed to provide the operators with a description of
industry practices in SCADA Security, and to provide the framework needed to
develop sound security practices within the operator's individual companies.
• [ATIS] ATIS Telecom Glossary 2007 at http://www.atis.org/glossary/. This web site
incorporates and supersedes T1.523-2001, the ATIS Telecom Glossary of 2000
which was an expansion of FS-1037C, the Federal Standard 1037, Glossary of
Telecommunication Terms initially published in 1980 .
• [FIPS-140-2] This is the US Federal Information Processing Standard Publication
140-2, titled “Security Requirements for Cryptographic Modules”.
• [ISA99] This ISA Technical Report provides a framework for developing an
electronic security program and provides a recommended organization and
structure f
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

記事タイトル:IEC TS 62351-2:2008 - 電力システムの管理及び関連する情報交換-データおよび通信セキュリティ- 第2部:用語集 記事内容:IEC 62351-2:2008(E)は、IEC 62351シリーズで使用される主要な用語をカバーしており、確定的なリストではないことを明示しています。サイバーセキュリティに関連するほとんどの用語は、他の標準化団体によって正式に定義されているため、元の定義が示されています。 この出版物はスマートグリッドに核心的な関連性を持っています。

기사 제목: IEC TS 62351-2:2008 - 전력 시스템 관리 및 관련 정보 교환 - 데이터 및 통신 보안 - 제2부: 용어집 기사 내용: IEC 62351-2:2008 (E)은 IEC 62351 시리즈에서 사용되는 주요 용어들을 다루며, 확정적인 목록이 아닌 것을 명시한다. 사이버 보안에 대한 대부분의 용어는 다른 국제 표준 기관에서 공식적으로 정의되어 있으며, 따라서 원래 정의된 곳에 대한 참조와 함께 여기에 포함되어 있다. 이 개정판은 스마트 그리드에 중요한 내용이다.

제목: IEC TS 62351-2:2008 - 전력 시스템 관리 및 관련 정보 교환 - 데이터 및 통신 보안 - 파트 2: 용어집 내용: IEC 62351-2:2008 (E)은 IEC 62351 시리즈에서 사용되는 주요 용어를 다루며, 최종 목록이 아닙니다. 사이버 보안을 위해 사용되는 대부분의 용어는 다른 표준 기관에서 공식적으로 정의되었으며, 원래 정의된 곳으로의 참조가 여기에 포함되어 있습니다. 이 출판물은 스마트 그리드에 근본적으로 관련이 있습니다.

The article discusses the importance of IEC TS 62351-2:2008 in managing power systems and exchanging information, specifically in terms of data and communication security. The article emphasizes that this document does not provide an exhaustive list of terms but rather includes key terms used in the IEC 62351 series. The terms included in the document are mainly defined by other standards organizations, with references to where they were originally defined. The article concludes by stating that this publication is highly relevant for the Smart Grid industry.

The article is about IEC TS 62351-2:2008, which is a document that covers the key terms used in the IEC 62351 series. It is not meant to be a definitive list, but rather a reference for the smart grid. The document includes terms related to cyber security, which are formally defined by other standards organizations.

記事のタイトル:IEC TS 62351-2:2008 - 電力システムの管理と関連情報交換 - データと通信のセキュリティ - 第2部:用語集 記事の内容:IEC 62351-2:2008(E)は、IEC 62351シリーズで使用される主要な用語をカバーしており、究極的なリストではありません。サイバーセキュリティに関連するほとんどの用語は他の標準機関によって公式に定義されており、元の定義が含まれています。 この出版物は、スマートグリッドにとって重要です。