Below you will find our own Glossary for expression within our business.

A

Attack vector

The technique a hacker uses to gain access to a computer or network in order to achieve a malicious outcome.

B

BLACK/RED Installation

A data diode has two ”sides”; an incoming which can be seen as the insecure side, and an outgoing which can be seen as the secure side. The incoming insecure network is black and the secure entwork on the inside is red.

Bot

Programs that automatically execute tasks as ordered by the creator of the program that has infected them.

Botnet

A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.

Brute force attack

When an attacker inputs many passwords in the hope that it is eventually guessed correctly.

C

C37.94

C37.94 is a standard for optical communication within substations for teleprotection between relays and converters or digital multiplexers. Possible data rate of N × 64 kbps where N = 1, 2…12 is described in this standard. Fiber optical communication is ideal within electricity distribution because of very demanding environment.

CCTV

Closed-circuit television is a camera used for video surveillance CCTV is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.

Certificate Authority

CA is an entity that issues digital certificates. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.

Certificates

A certificate includes information about a key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate’s contents (called the issuer). A certificate (also called a witness) is a string that certifies the answer to a computation, or certifies the membership of some string in a language.

Company secret information

Trade secrets are secret practices and processes that give a company a competitive advantage over its competitors. Trade secrets may differ across jurisdictions but have three common traits: not being public, offering some economic benefit, and being actively protected.

Confidential information

Confidential Information means any information disclosed by either party to the other party, either directly or indirectly, in writing, orally or by inspection of tangible objects (including, without limitation, documents, prototypes, samples, plant and equipment), which is designated as “Confidential,” “Proprietary” or some similar designation.

Control- and ICS-systems (monitor and secure thresholds)

The Incident Command System (ICS) is a standardized approach to the command, control, and coordination of emergency response providing a common hierarchy within which responders from multiple agencies can be effective.

Corporate network

A corporate network is a set of enterprises maintaining formal relations between them in the form of contracts (franchises, concessions, etc.) between the business units and not financial links, which differentiates them from groups.

Credit card transaction data

Card transaction data is financial data generally collected through the transfer of funds between a card holder’s account and a business’s account. It consists of the use of either a debit card or a credit card to generate data on the transfer for the purchase of goods or services.

D

Data Diode

The characteristics of a data diode is that it can only transfer a signal in one direction. The data diode acts as an isolator in the opposite direction. It is used in security applications where the need of isolation is high.

Data filtering

Data filtering is the process of choosing a smaller part of your data set and using that subset for viewing or analysis.

Data log

Data logging is the process of collecting and storing data over a period of time in order to analyze specific trends or record the data-based events/actions of a system, network or IT environment.
A data logger (also datalogger or data recorder) is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and sensors.

Domain separation

Domain separation is the the separation between two information security zones with different levels of security. Domain is a zone. One domain/zone often handles only Open information and the other handles up to Secret information.

E

E-commerce

E-commerce is the buying and selling of goods and services over the internet. E-commerce can be a substitute for brick-and-mortar stores, though some businesses choose to maintain both.

EMSEC

EMSEC stands for Emission SECurity and is a construct that analyzes the risk if such electromagnetic signals gets picked up deliberately by special listening devices, or unintentionally between two devices.

Ethernet Data diode

A data diode withc connectors for the standard Ethernet interfaces such as RJ45.

F

Fiber optics

Fiber optics uses thin lines of glass core to transmit signals at high speed over long distance. The light in the fiber is reflected to keep it inside fiber cable. The fiber is made of silicon, nitrogen, argon, germanium, hydrogen, chlorine, iron, helium, oxygen and carbon.

Fiber optics converter

A fiber optics converter transfers signal from the fiber optic media to another media, such as copper, or air waves

Financial data

Financial data consists of pieces or sets of information related to the financial health of a business. The pieces of data are used by internal management to analyze business performance and determine whether tactics and strategies must be altered.

G

GDPR related data

These data include genetic, biometric and health data, as well as personal data revealing racial and ethnic origin, political opinions, religious or ideological convictions or trade union membership.

H

HDBaseT

HDBaseT is a standard for transmission of all video sources including uncompressed 4K video, audio, networking, Ethernet, USB, RS232, infrared and power over Cat5e cable or better (up to 100 meters).

I

J

K

L

Logging

In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software.

M

Media converter

A media converter takes a signal transmitted on one kind of media and transfers the signal to another kind of media. The medias can be of various materials such as copper, fiber optics, airwaves etc.

N

Network infrastructure

Network infrastructure is the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network.

O

OPC data

OPC Data Access is a group of client-server standards that provides specifications for communicating real-time data from data acquisition devices such as PLCs to display and interface devices like Human-Machine Interfaces (HMI), SCADA systems and also ERP/MES systems.

P

Personal data

Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data.

Photonic switch

A photonic switch is a switch able to switch light signals compared to the common meaning of a switch which is able to switch signals transmitted over copper.

Protect and secure

Security and protection system, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Secure is to make safe while protect is to keep safe.

Q

R

Rootkit

A kind of malware that allows intruders to remotely control your computer.

Remote controlled systems

A control system in which the issuing of the control command and its execution are separated by a relatively significant distance. The simplest remote-control systems are limited to switching-type functions. These systems operate basically in an open loop, that is, without relying on feedback.

RÖS

RÖS is a Swedish acronym and stands for Röjande Signal (in Swedish). It is an expression for the electromagnetic radiation electrical components emit. If the radiation is revealed there is a risk that the information carried by the radiaton leaks to unauthorizeds.

S

Scada

Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management.

Secure distribution and synchronization of NTP to secure networks

The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. By applying security zones, domain separation and galvanic separation by using data diodes, the synchronization can be secured

Secure file transfer into networks with higher security level

By applying the concept of security zones, domain separation and galvanic separation by using data diodes, the file transferring to/from zones and domains with higher security levels can be secured.

Sending alarms from open to secure networks

By applying the concept of security zones, domain separation and galvanic separation by using data diodes, the sending of alarms from open to to zones and domains with higher security levels can be secured.

Sending emails from open to secure networks

By applying the concept of security zones, domain separation and galvanic separation by using data diodes, the sending of emails from open to zones and domains with higher security levels can be secured.

Secure data TAP

A secure Data TAP enables duplication of network signals to transmit-only ports used to monitor the flow of data.

SyncE

SyncE stands for Synchronous Ethernet and is according to ITU-T, a standardized computer network with transference of clock signals over Ethernet physical layer. The aim of SyncE is to provide a synchronization signal to those network resources that may eventually require such a type of signal.

T

TEMPEST

Tempest is a NATO-certification that includes both protection against compromising emanations, and methods to eavesdrop upon others to disclose confidential information. Tempest as a form of protection is normally applied to environments and devices which are considered highly vulnerable. Thus, tempest-certified equipment come with the most severe protection against compromising emanations.

U

V

X

Y

Z