Glossary

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Old book bindings at the Merton College library. By Tom Murphy VII (CC-BY-SA 3.0 Unported).

This page contains a glossary of terms used across the Toolkit. It is based on and develops further the glossary from the Tallinn Manual 2.0, which appears here with the kind permission of Cambridge University Press.[1]


A[edit | edit source]

Active Cyber Defence
The taking of proactive defensive measures outside the defended cyber infrastructure. A hack-back is a type of active cyber defence.

B[edit | edit source]

Bandwidth
The capacity of a communication channel to pass data through the channel in a given amount of time, usually expressed in bits per second.
Botnet
A network of compromised computers, so-called ‘bots’, remotely controlled by an intruder, ‘the botherder’, used to conduct coordinated cyber operations, such as distributed denial of service operations. There is no practical limit on the number of bots that can be assimilated into a botnet.

C[edit | edit source]

Close Access Operation
A cyber operation requiring the actor’s physical proximity to the targeted system.
Cloud Computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing allows for efficient pooling of computer resources and the ability to scale resource to demand.[2]
Common Criteria
International standard for evaluating the security properties of IT products.
Computer Emergency Response Team (CERT)
A team that provides initial emergency response aid and triage services to the victims or potential victims of cyber operations or cyber crimes, usually in a manner that involves coordination between private sector and government entities. These teams also maintain situational awareness about malicious cyber activities and new developments in the design and use of malware, providing defenders of computer networks with advice on how to address security threats and vulnerabilities associated with those activities and malware.
Computer Network
An infrastructure of interconnected devices or nodes that enables the exchange of data. The data exchange medium may be wired (e.g., Ethernet over twisted pair, fibre-optic, etc.), wireless (e.g., Wi-Fi, Bluetooth), or a combination of the two.
Computer System
One or more interconnected computers with associated software and peripheral devices. It can include sensors and/or (programmable logic) controllers, connected over a computer network. Computer systems can be general purpose (e.g. a laptop) or specialised (e.g. the ‘blue force tracking system’).
Critical Infrastructure
Physical or virtual systems and assets of a State that are so vital that their incapacitation or destruction may debilitate a State’s security, economy, public health or safety, or the environment.
Cyber
Connotes a relationship with information technology.
Cyber Activity
Any activity that involves the use of cyber infrastructure or employs cyber means to affect the operation of such infrastructure. Such activities include, but are not limited to, cyber operations.
Cyber Infrastructure
The communications, storage, and computing devices upon which information systems are built and operate.
Cyber Operation
The employment of cyber capabilities to achieve objectives in or through cyberspace. In this Toolkit, the term is generally used in an operational context (see also cyber activity).
Cyber Reconnaissance
The use of cyber capabilities to obtain information about activities, information resources, or system capabilities.
Cyber System
See computer system.
Cyberspace
The environment formed by physical and non-physical components to store, modify, and exchange data using computer networks.

D[edit | edit source]

Data
The basic element that can be processed or produced by a computer to convey information. The fundamental digital data measurement is a byte.
Data Centre
A physical facility used for the storage and processing of large volumes of data. A data centre can be used solely by users belonging to a single enterprise or shared among multiple enterprises, as in cloud computing data centres. A data centre can be stationary or mobile (e.g., housed in a cargo container transported via ship, truck, or aircraft).
Database
A collection of interrelated data stored together in one or more computerised files.[3]
Deep Fake
A fabricated video created through the use of machine learning techniques and human image synthesis. A deep fake can contain statements and conduct by real persons that never occurred in reality.
Denial of Service (DoS)
The non-availability of computer system resources to their users. A denial of service can result from a cyber operation.
Distributed Denial of Service (DDoS)
A technique that employs multiple computing devices (e.g., computers or smartphones), such as the bots of a botnet, to cause a denial of service to a single or multiple targets.
Domain Name
A unique, alphanumeric, human-readable name for a computer. All computers that are addressable via the Internet have a unique globally routable Internet protocol (IP) address. IP addresses can be registered with a Domain Name System (DNS) service provider. A DNS server uses a structured zone file to translate domain names into IP addresses and vice versa. The Internet Assigned Numbers Authority (IANA) is the central authority for assigning top-level domain (TLD) names and IP addresses. The term top-level domain name refers to the highest level in the hierarchy of the Internet domain name system. Examples of such TLDs, also sometimes referred to as domain name extensions, include: ‘.org’, ‘.int’, and ‘.mil’.

E[edit | edit source]

Electronic Warfare
The use of electromagnetic (EM) or directed energy to exploit the electromagnetic spectrum. It may include interception or identification of EM emissions (e.g., SIGINT), employment of EM energy, prevention of hostile use of the EM spectrum by an adversary, and actions to ensure efficient employment of that spectrum by the user-State. An example of electronic warfare is radio frequency jamming.

F[edit | edit source]

Firmware
Low level programming that acts as an interface between hardware and software.

H[edit | edit source]

Hack-back
A type of active cyber defence, the main purpose of which is to take action against an identified source of a malicious cyber operation. Typically, a hack-back is designed to mitigate the effects of, or stop, the malicious activity, or to gather technical evidence that can be used for attribution purposes.
Hacktivist
A private citizen who on his or her own initiative engages in hacking for, inter alia, ideological, political, religious, or patriotic reasons.
Hardware
See cyber infrastructure.
Honeynet
A virtual environment consisting of multiple honeypots, designed to deceive an intruder into assuming that he or she has located a network of computing devices of targeting value.
Honeypot
A deception technique in which a person seeking to defend computer systems against malicious cyber operations uses a physical or virtual environment designed to lure the attention of intruders with the aim of: deceiving the intruders about the nature of the environment; having the intruders waste resources on the decoy environment; and gathering counter-intelligence about the intruder’s intent, identity, and means and methods of cyber operation. Typically, the honeypot is co-resident with the actual systems the intruder wishes to target.

I[edit | edit source]

Industrial Control System (ICS)
A general term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) often found in the industrial sectors and critical infrastructures. An ICS consists of combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy).[4]
Internet
A global system of interconnected computer networks that use the Internet Protocol suite and a clearly defined routing policy.
Internet Protocol (IP)
A protocol for addressing hosts and routing datagrams (i.e., packets) from a source host to the destination host across one or more IP networks.
Internet Protocol (IP) Address
A unique identifier for a device on an IP network, including the Internet.[5]
Internet Service Provider (ISP)
An organisation that provides the network connectivity that enables computer network users to access the Internet.

J[edit | edit source]

Jamming
See electronic warfare.

L[edit | edit source]

Logic Bomb
Malware that is designed to initiate a malicious sequence of actions if specified conditions are met.

M[edit | edit source]

Malware
Software that may be stored and executed in other software, firmware, or hardware that is designed adversely to affect the performance of a computer system. Examples of malware include Trojan horses, rootkits, viruses, and worms.
Metadata
Data that provides information about other data, such as its time of creation and origin. Metadata is essential when categorising, searching, storing, and understanding information.

N[edit | edit source]

Network Sniffer
Software used to observe and record network traffic.
Network Throttling
A technique to limit the availability of bandwidth to users of communications networks, also known as ‘bandwidth throttling’ and ‘network bandwidth throttling’.

P[edit | edit source]

Passive Cyber Defence
The taking of measures for detecting and mitigating cyber intrusions and the effects of cyber operations that does not involve launching a preventive, pre-emptive, or counter-operation against the source. Examples of passive cyber defence measures are firewalls, patches, anti-virus software, and digital forensics tools.[6]
Phishing
A type of social engineering attack most commonly executed by the use of email, social networks, or instant messaging. The perpetrator attempts to lure unsuspecting victims into visiting a malicious website, opening an infected document, or executing actions on behalf of the attacker. The purpose of a phishing operation is generally to acquire sensitive information, such as user credentials, personal data, or credit card details.
Programmable logic controller (PLC)
An electronic device, which carries out the control functions of various automatized processes in a broad range of industries, including manufacturing, travel, and agriculture. A PLC may be further networked to other PLCs and SCADA systems.

R[edit | edit source]

Rootkit
Malware installed on a compromised computer that allows a perpetrator to maintain privileged access to that computer and to conceal his or her activities therein from the operating system and the legitimate users of that computer.

S[edit | edit source]

Server
A physical or virtual computer dedicated to running one or more computing services. Examples include network and database servers.
Server Farm
A form of cluster computing in which a large number of servers are collocated in a data centre.
Software
The non-physical components of a computer system and cyber infrastructure. These components encompass programs, including operating systems, applications, and related configuration and run-time data.
Software Agent
A computer process, managed by a computer operating system, which performs one or more tasks on behalf of a human user. It is possible for software agents to operate autonomously or to communicate and coordinate their actions with other software agents in a distributed computing environment. For instance, software agents are used for executing queries across distributed repositories of information available via the World Wide Web (WWW).
Spear-phishing
A phishing operation that targets particular individuals and involves a higher level of sophistication and tailored content. Many malicious cyber operations begin with a spear-phishing campaign.
Spoofing
Impersonating a legitimate resource or user to gain unauthorised entry into an information system or to make it appear that some other organisation or individual has initiated or undertaken certain cyber activity.
Steganography
The technique of hiding content within other content. For example, there are computer-based steganographic techniques and tools for embedding the contents of a computer file containing engineering diagrams and text into an image file (e.g., a JPG document) such that the existence of the engineering data in the image file is difficult for the observer to detect.
Stuxnet
A computer worm that was designed to target Supervisory Control and Data Acquisition (SCADA) systems developed by Siemens Corporation. The payload of the Stuxnet malware included a programmable logic controller rootkit. Stuxnet was used to target centrifuges involved in the enrichment of uranium in Iran. For further information, see Stuxnet (2010).
Supervisory Control and Data Acquisition (SCADA)
Computer systems and instrumentation that provide for monitoring and controlling industrial, infrastructure, and facility-based processes, such as the operation of power plants, water treatment facilities, electrical distribution systems, oil and gas pipelines, airports, and factories.

V[edit | edit source]

Virus
A type of malware with self-replicating capability that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence.[7]
Very Small Aperture Terminal (VSAT)
A portable satellite ground station used for two-way communications. VSATs are commonly used for broadband satellite communications at remote locations, for instance by emergency rescue teams and vessels at sea.

W[edit | edit source]

Website
A set of related web pages containing information. A website is hosted on one or more web servers. The World Wide Web (WWW) is comprised of all of the publicly accessible websites.
Whaling
Also known as whale phishing, is a type of spear-phishing attack that specifically targets an organisation’s senior management, executives, and other high profile individuals.
Wi-Fi
A type of high-speed wireless networking.
Worm
A type of malware that is able to self-replicate and autonomously spread across computer networks, unlike a virus that relies on embedding in another application in order to propagate to other computer systems.

X[edit | edit source]

XML Tag
A markup construct that is part of the open standard known as the Extensible Markup Language (XML). The tag is both human- and machine-readable and used to encode the syntactic parts of the content of a document. For example, references in this Toolkit are delimited by the opening and closing tags <ref> and </ref>.

Notes and references[edit | edit source]

  1. Michael N Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (CUP 2017), 563–68. This text cannot be reproduced, shared, altered, or exploited commercially in any way without the permission of Cambridge University Press, as it is copyrighted material and therefore not subject to the allowances permitted by a CC BY-SA licence.
  2. Drawn from The National Institute of Standards in Technology, US Department of Commerce, definition of Cloud Computing, Special Publication 800-145, September 2011.
  3. Glossary of Software Engineering Technology, Institute of Electrical and Electronics Engineers (IEEE) Std 610.12 (28 September 1990).
  4. NIST, Guide to Industrial Control Systems (ICS) Security (May 2015), SP 800-82 Rev. 2.
  5. Internet Assigned Numbers Authority, Glossary of terms.
  6. This term should be distinguished from the legal term of art ‘passive precautions’, which refers to precautions against the effects of attacks in time of armed conflict. See further Article 58 AP I; and, in the cyber context, Tallinn Manual 2.0, Rule 121.
  7. NIA Glossary.