Conjunto de
actividades dirigidas a proteger el ciberespacio contra el uso indebido del
mismo, defendiendo su infraestructura tecnológica, los servicios que prestan y
la información que manejan
O.M. 10/2013,
de 19 de febrero, por la que se crea el Mando Conjunto de Ciberdefensa de las
Fuerzas Armadas
Conjunto de actuaciones
orientadas a asegurar, en la medida de lo posible, las redes y sistemas de que
constituyen el ciberespacio:
·
detectando y enfrentándose a
intrusiones,
·
detectando, reaccionando y
recuperándose de incidentes, y
·
preservando la confidencialidad, disponibilidad
e integridad de la información.
Sinónimo del
termino Ciberdefensa. Normalmente el término Ciberdefensa se suele utilizar en
el ámbito militar, y el termino Ciberseguridad en el ámbito civil, aunque en el
presente estudio se han utilizado indistintamente ambos términos. [ISDEFE-6:2009]
The desired situation in
which the protection of cyberspace is proportionate to the cyber threat and the
possible consequences of cyber-attacks. At Defence Cyber Security comprises three
pillars: Cyber Defence, Cyber Intelligence and cyber counter-offensive.
NATO - Cyber Security
Strategy for Defence,- ACST–Strategy-CyberSecurity-001, 2014
The process of protecting
information by preventing, detecting, and responding to attacks.
Framework for Improving
Critical Infrastructure Cybersecurity, National Institute of Standards and
Technology, February 12, 2014
The protection of
information assets by addressing threats to information processed, stored, and
transported by internetworked information systems
ISACA, Cybersecurity
Glossary, 2014
Cyber-security commonly
refers to the safeguards and actions that can be used to protect the cyber
domain, both in the civilian and military fields, from those threats that are
associated with or that may harm its interdependent networks and information
infrastructure. Cyber-security strives to preserve the availability and
integrity of the networks and infrastructure and the confidentiality of the
information contained therein. [CSS EU:2013]
(A) In general.--The term
`cybersecurity purpose' means the purpose of ensuring the integrity,
confidentiality, or availability of, or safeguarding, a system or network,
including protecting a system or network from--
(i)
a vulnerability of a system or network;
(ii)
a threat to the integrity, confidentiality, or availability of a system or
network or any information stored on, processed on, or transiting such a system
or network;
(iii)
efforts to deny access to or degrade, disrupt, or destroy a system or network;
or
(iv)
efforts to gain unauthorized access to a system or network, including to gain
such unauthorized access for the purpose of exfiltrating information stored on,
processed on, or transiting a system or network.
(B) Exclusion.--Such term
does not include the purpose of protecting a system or network from efforts to
gain unauthorized access to such system or network that solely involve
violations of consumer terms of service or consumer licensing agreements and do
not otherwise constitute unauthorized access.
Cyber Intelligence Sharing
and Protection Act. H.R. 624. 2013.
(A) In general.--The term
`cybersecurity system' means a system designed or employed to ensure the
integrity, confidentiality, or availability of, or safeguard, a system or
network, including protecting a system or network from
(i)
a vulnerability of a system or network;
(ii)
a threat to the integrity, confidentiality, or availability of a system or
network or any information stored on, processed on, or transiting such a system
or network;
(iii)
efforts to deny access to or degrade, disrupt, or destroy a system or network;
or
(iv)
efforts to gain unauthorized access to a system or network, including to gain
such unauthorized access for the purpose of exfiltrating information stored on,
processed on, or transiting a system or network.
(B) Exclusion.--Such term
does not include a system designed or employed to protect a system or network
from efforts to gain unauthorized access to such system or network that solely
involve violations of consumer terms of service or consumer licensing
agreements and do not otherwise constitute unauthorized access.
Cyber Intelligence Sharing
and Protection Act. H.R. 624. 2013.
The ability to protect or
defend the use of cyberspace from cyber attacks. [CSS US:2012]
condition of
being protected against physical, social, spiritual, financial, political,
emotional, occupational, psychological, educational or other types or
consequences of failure, damage, error, accidents, harm or any other event in
the Cyberspace which could be considered non-desirable
NOTE 1 This can
take the form of being protected from the event or from exposure to something
that causes health or economic losses. It can include protection of people or
of assets.
NOTE 2 Safety in
general is also defined as the state of being certain that adverse effects will
not be caused by some agent under defined conditions.
[ISO-27032:2012]
Cyberspace
security
preservation of
confidentiality, integrity and availability of information in the Cyberspace
NOTE 1 In
addition, other properties, such as authenticity, accountability,
non-repudiation, and reliability can also be involved.
NOTE 2 Adapted
from the definition for information security in ISO/IEC 27000:2009.
[ISO-27032:2012]
The practice of making the
networks that constitute cyber space as secure as possible against intrusions,
maintaining confidentiality, availability and integrity of information,
detecting intrusions and incidents that do occur, and responding to and
recovering from them. [CSS NZ:2011]
(Global) cyber security is
the desired objective of the IT security situation in which the risks of global
cyberspace have been reduced to an acceptable minimum.
Hence, cyber security in
Germany is the desired objective of the IT security situation, in which the
risks of the German cyberspace have been reduced to an acceptable minimum.
Cyber security (in Germany) is the sum of suitable and appropriate measures.
Civilian cyber security
focuses on all IT systems for civilian use in German cyberspace. Military cyber
security focuses on all IT systems for military use in German cyberspace.
[CSS DE:2011]
is a property of cyber space
that is an ability to resist intentional and unintentional threats and respond
and recover.
Russia-U.S. Bilateral On Cybersecurity
Critical Terminology Foundations, Apr. 2011.
The ability to protect or
defend the use of cyberspace from cyber attacks. [CNSSI_4009:2010]
The Australian Government
defines cyber security as:
'Measures relating to the
confidentially, availability and integrity of information that is processed,
stored and communicated by electronic or similar means.'
http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Pages/default.aspx#h2strategy