Conjunto de
actividades dirigidas a proteger el ciberespacio contra el uso indebido del
mismo, defendiendo su infraestructura tecnológica, los servicios que prestan y
la información que manejan
O.M. 10/2013,
de 19 de febrero, por la que se crea el Mando Conjunto de Ciberdefensa de las
Fuerzas Armadas
Conjunto de actuaciones
orientadas a asegurar, en la medida de lo posible, las redes y sistemas de que
constituyen el ciberespacio:
· detectando y enfrentándose a intrusiones,
· detectando, reaccionando y recuperándose de incidentes, y
· preservando la confidencialidad, disponibilidad e integridad de la información.
Sinónimo del
termino Ciberdefensa. Normalmente el término Ciberdefensa se suele utilizar en
el ámbito militar, y el termino Ciberseguridad en el ámbito civil, aunque en el
presente estudio se han utilizado indistintamente ambos términos. [ISDEFE-6:2009]
The desired
situation in which the protection of cyberspace is proportionate to the cyber
threat and the possible consequences of cyber-attacks. At Defence Cyber
Security comprises three pillars: Cyber Defence, Cyber Intelligence and cyber
counter-offensive.
NATO - Cyber
Security Strategy for Defence,- ACSTStrategy-CyberSecurity-001, 2014
The process of
protecting information by preventing, detecting, and responding to attacks.
Framework for
Improving Critical Infrastructure Cybersecurity, National Institute of
Standards and Technology, February 12, 2014
The protection of
information assets by addressing threats to information processed, stored, and
transported by internetworked information systems
ISACA,
Cybersecurity Glossary, 2014
Cyber-security
commonly refers to the safeguards and actions that can be used to protect the
cyber domain, both in the civilian and military fields, from those threats that
are associated with or that may harm its interdependent networks and
information infrastructure. Cyber-security strives to preserve the availability
and integrity of the networks and infrastructure and the confidentiality of the
information contained therein. [CSS EU:2013]
(A) In
general.--The term `cybersecurity purpose' means the purpose of ensuring the
integrity, confidentiality, or availability of, or safeguarding, a system or
network, including protecting a system or network from--
(i) a vulnerability of a system or network;
(ii) a threat to the integrity, confidentiality, or availability of a
system or network or any information stored on, processed on, or transiting
such a system or network;
(iii) efforts to deny access to or degrade, disrupt, or destroy a system
or network; or
(iv) efforts to gain unauthorized access to a system or network,
including to gain such unauthorized access for the purpose of exfiltrating
information stored on, processed on, or transiting a system or network.
(B)
Exclusion.--Such term does not include the purpose of protecting a system or
network from efforts to gain unauthorized access to such system or network that
solely involve violations of consumer terms of service or consumer licensing
agreements and do not otherwise constitute unauthorized access.
Cyber
Intelligence Sharing and Protection Act. H.R. 624. 2013.
(A) In
general.--The term `cybersecurity system' means a system designed or employed
to ensure the integrity, confidentiality, or availability of, or safeguard, a
system or network, including protecting a system or network from
(i) a vulnerability of a system or network;
(ii) a threat to the integrity, confidentiality, or availability of a
system or network or any information stored on, processed on, or transiting
such a system or network;
(iii) efforts to deny access to or degrade, disrupt, or destroy a system
or network; or
(iv) efforts to gain unauthorized access to a system or network,
including to gain such unauthorized access for the purpose of exfiltrating
information stored on, processed on, or transiting a system or network.
(B)
Exclusion.--Such term does not include a system designed or employed to protect
a system or network from efforts to gain unauthorized access to such system or
network that solely involve violations of consumer terms of service or consumer
licensing agreements and do not otherwise constitute unauthorized access.
Cyber
Intelligence Sharing and Protection Act. H.R. 624. 2013.
The ability to
protect or defend the use of cyberspace from cyber attacks. [CSS US:2012]
condition of
being protected against physical, social, spiritual, financial, political,
emotional, occupational, psychological, educational or other types or
consequences of failure, damage, error, accidents, harm or any other event in
the Cyberspace which could be considered non-desirable
NOTE 1 This can
take the form of being protected from the event or from exposure to something
that causes health or economic losses. It can include protection of people or
of assets.
NOTE 2 Safety in
general is also defined as the state of being certain that adverse effects will
not be caused by some agent under defined conditions.
[ISO-27032:2012]
Cyberspace
security
preservation of
confidentiality, integrity and availability of information in the Cyberspace
NOTE 1 In
addition, other properties, such as authenticity, accountability,
non-repudiation, and reliability can also be involved.
NOTE 2 Adapted
from the definition for information security in ISO/IEC 27000:2009.
[ISO-27032:2012]
The practice of
making the networks that constitute cyber space as secure as possible against
intrusions, maintaining confidentiality, availability and integrity of
information, detecting intrusions and incidents that do occur, and responding
to and recovering from them. [CSS NZ:2011]
(Global) cyber
security is the desired objective of the IT security situation in which the
risks of global cyberspace have been reduced to an acceptable minimum.
Hence, cyber
security in Germany is the desired objective of the IT security situation, in
which the risks of the German cyberspace have been reduced to an acceptable
minimum. Cyber security (in Germany) is the sum of suitable and appropriate
measures.
Civilian cyber
security focuses on all IT systems for civilian use in German cyberspace.
Military cyber security focuses on all IT systems for military use in German
cyberspace.
[CSS DE:2011]
is a property of
cyber space that is an ability to resist intentional and unintentional threats
and respond and recover.
Russia-U.S.
Bilateral On Cybersecurity Critical Terminology Foundations, Apr. 2011.
The ability to
protect or defend the use of cyberspace from cyber attacks. [CNSSI_4009:2010]
The Australian
Government defines cyber security as:
'Measures relating
to the confidentially, availability and integrity of information that is
processed, stored and communicated by electronic or similar means.'
http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Pages/default.aspx#h2strategy
Temas relacionados