O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

APPENDIX B

GLOSSARY OF TERMINOLOGY

Access Control List (ACL)   A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resources. (SOURCE: RFC 4949)

accreditation   The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. (SOURCE: NIST SP 800-53)

Active Security Test   Security testing that involves direct interaction with a target, such as sending packets to a target. (SOURCE: NIST ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required