Appendix BGlossary

800-82-r2, “Guide to Industrial Control System (ICS) Security”
International guidelines for implementing cybersecurity in Industrial Control Systems.
800-61-r2, “Computer Security Incident Handling Guide”
A NIST Special Publication designed to guide organizations in the process of incident response using a four-phase lifecycle approach.
800-115, “Technical Guide to Information Security Testing and Assessment”
A NIST Special Publication designed to assist organizations in planning and conducting penetration tests, analyzing findings, and developing mitigation strategies.
800-137, “Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations”
A NIST Special Publication designed to guide organizations in their efforts to conduct continuous security monitoring operations.
800-161, “Supply Chain Risk Management Practices for Federal Information Systems and Organizations”
A NIST Special Publication designed to guide organizations in their efforts to identify, assess, and mitigate their IT/OT supply chain risks.

A

AAA protocol
Authentication, authorization, and accounting that uses different link layer protocols such as PPP and authenticates using PAP or CHAP.
acceptable use policy (AUP)
A documented policy that defines employee roles and limitations when using their organization's computer and network equipment.
access control
Security precautions that ensure resources are granted only to those users who are entitled ...

Get Practical Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.