Abbreviations

Results for area 1.3 Authentication and security

term
information security event
definition

identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that may be security relevant

standard (extract)
term
active threat
definition

threat of a deliberate unauthorized change to the state of the system

EXAMPLE Examples of security-relevant active threats may include modification of messages, replay of messages, and insertion of spurious messages, masquerading as an authorized entity and denial of service.

standard (extract)
term
threat analysis
definition

systematic detection, identification, and evaluation of threats

standard (extract)
term
anonymisation
definition

process by which personal information (PI) is irreversibly altered in such a way that an Individual or a legal entity can no longer be identified directly or indirectly either by the controller alone or in collaboration with any other party

standard (extract)
term
anonymised personal information
definition

personal information that has been subject to a process of anonymisation and that by any means can no longer be used to identify an Individual or legal entity

standard (extract)
term
authorization
definition

granting of rights, which includes the granting of access based on access rights

standard (extract)
term
information security
standard (extract)
term
security threat
definition

potential action or manner to violate security systems

standard (extract)
term
security safeguards
definition

safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data

standard (extract)
term
security policy
definition

set of rules that regulate how to handle security threats or define the appropriate security level

term
security profile
definition

characterization of security requirements

term
block cipher
definition

family of functions and their inverse functions that is parameterized by cryptographic keys

NOTE 1 to entry The functions map bit strings of a fixed length to bit strings of the same length.

standard (extract)
term
public key certificate
definition

certificate public key information of an entity signed by the certification authority and therefore rendered unforgeable

NOTE A public key certificate also specifies the role of the entity for which the public key information is provided, e.g. manufacturer or registration authority.

standard (extract)
term
security target (ST)
definition

ST set of security requirements and specifications to be used as the basis for evaluation of an identified TOE

standard (extract)
term
sensitive data
definition

any personal information related to a natural person revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health data or sex life; its processing is prohibited except for closing circumstances

standard (extract)
term
conformance test point (CTP)
definition

may be an actual instantiation of equipment performing a conformance test process ‘live’, using ‘live’ equipment or may be equipment/systems that simulate behaviour of equipment at the point being tested in order to stimulate or observe the behaviour resultant from the stimulation and note the result of that stimulation

standard (extract)
term
decryption
definition

decryption reversal of a corresponding reversible encipherment

standard (extract)
term
manipulation detection
definition

mechanism which is used to detect whether a data unit has been modified (either accidentally or intentionally)

standard (extract)
term
digital certificate
definition

electronic “identification card” that establishes user credentials when doing business or other transactions

NOTE 1 to entry This is issued by a certification authority: contains name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the

digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.

standard (extract)
term
digital signature
definition

signature data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient

NOTE See also cryptography.

standard (extract)
term
implementation extra information for testing
definition

statement made by the supplier or an implementor of a DUT which contains or references all of the information (in addition to that given in the implementation conformance statement) related to the DUT and its testing environment, which will enable the test laboratory to run an appropriate test suite against the DUT

standard (extract)
term
implementation extra information for testing pro forma
definition

document, in the form of a questionnaire, which when completed for an IUT becomes an implementation extra information for testing

standard (extract)
term
implementation conformance statement proforma
definition

document, in the form of a questionnaire, which when completed for an implementation or system becomes an implementation conformance statement

term
hash-code
definition

string of bits which is the output of a hash-function

standard (extract)
term
password
definition

confidential authentication information, usually composed of a string of characters

standard (extract)
term
misbehaviour report
definition

information from a system user identifying suspicious behaviour from another system user that can be

characterized as misbehaviour

standard (extract)
term
evaluation
definition

systematic process of determining how individuals, procedures, systems or programs have met formally agreed objectives and requirements

term
evaluation assurance level (EAL)
definition

assurance levels to evaluate securities for products and systems

term
threat
definition

potential cause of an unwanted information security incident, which may result in harm

standard (extract)
term
hash-function
definition

function which maps strings of bits to fixed-length strings of bits, satisfying the following two properties: a) for a given output, it is computationally infeasible to find an input which maps to this output; and b) for a given output, it is computationally infeasible to find a second input which maps to the same output

NOTE Computational feasibility depends on the specific security requirements and environment.

standard (extract)
term
identifiability
definition

conditions which result in a data subject being identified, directly or indirectly, on the basis of a given set of PI

standard (extract)
term
individual participation
definition

rights of an invididual to have access to personal data held about the individual and ability to challenge and correct such data

standard (extract)
term
misbehaviour information
definition

misbehaviour reports from system service recipients, as well as other improper system user acts, such as sending wrong message types, invalid logins, unauthorized access, incorrectly signed messages

and other inappropriate system user behaviour

standard (extract)
term
public key infrastructure (PKI)
definition

hierarchy of “certification authorities” to allow individuals and organizations to identify each other for the purpose of doing business electronically

standard (extract)
term
inspection
definition

conformity evaluation by observation and judgement accompanied, as appropriate, by measurement, testing, or gauging

standard (extract)
term
unilateral authentication
definition

entity authentication which provides one entity with the assurance of the other's identity but not vice versa

standard (extract)
term
message authentication code (MAC)
definition

fixed-length string of bits used to verify the authenticity of a message, generated by the sender of the message, transmitted together with the message, and verified by the receiver of the message

term
end-to-end encipherment
definition

encipherment of data within or at the source end system, with the corresponding decipherment occurring only within or at the destination end system

standard (extract)
term
cryptomaterial
definition

cryptographic keys and associated material, either a secret key for a symmetric algorithm, or a private key for an asymmetric algorithm, and the associated public key or certificate

standard (extract)
term
cryptography
definition

principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorized use

standard (extract)
term
cross-verified (CV)
definition

verification flag indicating whether the data value has been cross verified from one or more additional sources

standard (extract)
term
laboratory tests
definition

tests which are performed in a laboratory under specified conditions

standard (extract)
term
masquerade
definition

pretence by an entity to be a different entity

standard (extract)
term
secure application module (SAM)
definition

physical module that securely executes cryptographic functions and stores keys

standard (extract)
term
misbehaviour
definition

act of providing false or misleading data, operating in such a fashion as to impede other service recipients, or to operate outside of their authorized scope

NOTE 1 to entry This includes suspicious behaviour as in wrong message types or frequencies, invalid logins and

unauthorized access, or incorrect signed or encrypted messages, etc., either purposeful or unintended.

standard (extract)
term
cleartext
definition

intelligible data, the semantic content of which is available

standard (extract)
term
data protection
definition

prevention of misuse of computer data: legal safeguards to prevent misuse of information stored on computers, particularly information about individual people

standard (extract)
term
data privacy
definition

právo a povinnosti jednotlivců a organizací týkající se sběru, užití, držení, prozrazení a disponování s osobními údaji+S377

standard (extract)
term
restricted use of data (RU)
definition

indicator whether the use of data is restricted or not

standard (extract)
term
use limitation
definition

limits to the purposes which personal data can be used

standard (extract)
term
permission
definition

authorization granted to do something (to the ‘Core System’), permissions are granted to system service recipients and operators determining what actions they are allowed to take when interacting with the ‘Core System’

standard (extract)
term
personal information; personal data (PI)
definition

any data or information related to an individual or legal entity or an association of person or individuals by which the individual or legal entity or association of persons could be identified

NOTE 1 to entry The EU-Dir 95/48/EC names in its Art 2 lit. (a) the personal information as “personal data” and defines it as: “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity”.

standard (extract)
term
openness
definition

policy of openness about developments, practices and policies with respect to personal data

standard (extract)
term
passive threat
definition

threat of unauthorized disclosure of information without changing the state of the system

standard (extract)
term
supporting token
definition

<WS-SecurityPolicy> collection of (one or more) claims

standard (extract)
term
cryptomaterial handle
definition

reference to Cryptomaterial allowing that Cryptomaterial to be used in cryptographic operations, i.e. sign, verify, encrypt, decrypt

standard (extract)
term
claim confirmation
definition

process of verifying that a claim applies to an entity

term
read only
definition

property that data content cannot be changed by a reader/interrogator

standard (extract)
term
requirement (RQ)
definition

statement of user need, typically expressed in a single-sentence form to assist with later verification of compliance

standard (extract)
term
assurance requirement
definition

security requirements to assure confidence in the implementation of functional requirements

standard (extract)
term
implementation conformance statement (ICS)
definition

statement made by the supplier of an implementation or system claimed to conform to a given specification, stating which capabilities have been implemented

term
target of evaluation (TOE)
definition
standard (extract)
term
acceptance test
definition

examination that a product, process, or service is in conformity with the system specification

standard (extract)
term
access
definition

admittance, entry, permit to use the road network and/or associated infrastructure (bridges, tunnels etc.)

term
system operator key
definition
standard (extract)
term
block cipher mode of operation
definition

algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity

standard (extract)
term
distraction
definition

something that draws the attention of a driver away from the driving task and/or divides or confuses the attention of the driver

standard (extract)
17427-10
term
access control
definition

prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner

standard (extract)
term
certificate revocation list (CRL)
definition

signed list indicating a set of certificates that are no longer considered valid by the certificate issuer

term
access control list (ACL)
definition

list of entities, together with their access right, which are authorized to have access to a resource

standard (extract)
term
compliance
definition

assurance that equipment or a service behaves within a set of predetermined, declared and accepted parameters

standard (extract)
17427-9
term
type approval
definition

certificate of conformity granted to a product that meets a minimum set of regulatory, technical and safety requirements, generally, by regulation required before certain products are allowed to be sold

NOTE 1 to entry Often called ‘Homologation’ approval based on conformity testing on the basis of one or more specimens of a product representative of the production

standard (extract)
term
security service
definition

service provided by communicating systems which ensures adequate security of the systems or of data transfers

standard (extract)
term
data subject's consent
definition

any freely given specific and informed written indication of his wishes by which the data subject signifies his agreements to personal data relating to him being processed

standard (extract)
term
privacy
definition

right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

term
private decipherment key
definition

private key which defines the private decipherment transformation

standard (extract)
term
private signature key
definition

private key which defines the private signature transformation

standard (extract)
term
purpose specification
definition

purposes for which personal data are collected

standard (extract)
term
consent
definition

individual's or legal entity's (data subject) explicitly or implicitly freely given agreement to the processing of its PI in the course of which the data subject has been in advance completely informed about the purpose, the legal basis and the third parties, receiving data subject’s PI, and all these in a comprehensible form

standard (extract)
term
private key
definition

key of an entity's asymmetric key pair which should only be used by that entity

NOTE In the case of an asymmetric signature system the private key defines the signature transformation. In the case of an asymmetric encipherment system the private key defines the decipherment transformation.

standard (extract)
term
key management
definition

Encryption Key Control generation, distribution, storage, application and deletion of encryption keys

standard (extract)
term
test status
definition

nature of a test, either basic or conditional

NOTE 1 to entry A test labelled “conditional” is performed if, and only if, it is applicable to a feature identified in the specification of the system or component, whereas a test labelled “basic” indicates a highly recommended test as part of a foundation for meaningful evaluation.

standard (extract)
term
cooperative ITS credentials management system (CCMS)
definition

support system that enables trusted communications among ITS components and protects data from unauthorized access

standard (extract)
term
encryption
definition

process of encoding messages (or information) in such a way that only authorized parties can read it

standard (extract)
term
Rivest, Shamir and Adleman (RSA)
standard (extract)
term
classified information
definition

information which for reasons of national security is restricted to government authorized or approved persons

standard (extract)
term
secret key
definition

key that is used with a symmetric cryptographic algorithm

NOTE 1 Possession of a secret key is restricted (usually to two entities).

NOTE 2 For ERI, there can be only one entity or several entities, depending on the key management policy.

standard (extract)
term
field test
definition

test that is performed under real-life conditions

standard (extract)
term
test case
definition

description of test purpose, unique test case identifier, test inputs, test execution conditions, test steps, and the results required to pass the test

standard (extract)
term
test type
definition

kind of test, such as inspection, simulation, lab test, and field test

standard (extract)
term
token assertion
definition

<WS-SecurityPolicy> description of a token requirement

NOTE 1 to entry Token assertions defined within a security binding are used to satisfy protection requirements.

standard (extract)
term
attack
definition

attempt to destroy, expose, alter, disable, steal or gain unauthorised access to or make use of an asset

standard (extract)
term
replay attack
definition

masquerade which involves use of previous transmitted messages

standard (extract)
term
public key
definition

key of an entity's asymmetric key pair which can be made public

NOTE In the case of an asymmetric signature system the public key defines the verification transformation. In the case of an asymmetric encipherment system the public key defines the encipherment transformation. A key that is “publicly” known is not necessarily globally available. The key is only made available to all members of a pre-specified group.

cryptographic key that can be obtained and used by anyone to encrypt messages intended for a

particular recipient, such that the encrypted messages can be deciphered only by using a second key that is known only to the recipient (the private key)

standard (extract)
term
public verification key
definition

public key which defines the public verification transformation

standard (extract)
term
public encipherment key
definition

public key which defines the public encipherment transformation

standard (extract)
term
challenge
definition

data item chosen at random and sent by the verifier to the claimant, which is used by the claimant, in conjunction with secret information held by the claimant, to generate a response which is sent to the verifier

EXAMPLE In ISO 24534-4 the term challenge is also used in case an ERT does not have enabled encryption capabilities and the challenge is merely copied without any secret information applied.

standard (extract)
term
mutual authentication
definition

entity authentication which provides both entities with assurance of each other’s identity

standard (extract)
term
security domain (SD)
definition

set of elements, security policy, security authority and set of security-relevant activities in which the set of elements are subject to the security policy for the specified activities, and the security policy is administered by the security authority for the security domain

standard (extract)
term
secure session
definition

functional entity providing confidentiality, integrity, authentication, guaranteed in-order delivery, and replay protection on the datagrams that are passed over it

standard (extract)
term
secure data interface (SDI)
definition

gateway providing bidirectional means for security and access control

standard (extract)
term
access control policy
definition

data source governing what access to resources is permissible by peer Applications

standard (extract)
term
ciphertext
definition

data produced, through the use of encipherment; the semantic content of the resulting data is not available

standard (extract)
term
rationale; verification
definition

verification process determining that a product of each phase of the system life cycle development process fulfils all the requirements specified in the previous phase

standard (extract)
term
implementation under test (IUT)
definition

implementation of one or more OS1 protocols in an adjacent user/provider relationship, being that part of a real open system which is to be studied by testing

term
conformance testing
definition

testing the extent to which an IUT is a conforming implementation

term
test
definition

procedure designed to measure characteristics of a component or system in specified conditions

standard (extract)
term
test procedure
definition

instructions for the setup, execution, and evaluation of results for a given test case

standard (extract)
term
test house
definition

third party that carries out the test

standard (extract)
term
tester
definition

a combination of equipment and processes which is able to perform conformance tests according to ISO/TS 13143-1

standard (extract)
term
processing of personal data
definition

operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction

term
data quality
definition

acceptable standard of accuracy of personal data

standard (extract)