03.07.2015 Views

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Document<br />

ECTF<br />

Encryption<br />

End-of-life<br />

EMV<br />

Exploit/exploit code<br />

File inclusion<br />

Fuzzing<br />

GPS<br />

GSM<br />

Hacker/Hacking<br />

HTML<br />

ICS/SCADA<br />

iDeal<br />

Identity fraud<br />

Incident<br />

This term covers letters, notes, memos, reports, presentations, drawings, photos, films, maps, sound<br />

recordings, text messages, digital carriers (CD-ROMs and USB) or any other physical medium that can<br />

contain information.<br />

The Electronic Crimes Taskforce (ECTF) is a partnership between the National Police, the Public<br />

Prosecution Service, the banks and CPNI.NL, also known as the ‘bank team’. The ECTF has a facilitating<br />

role in dealing with cyber crime targeted at the financial sector.<br />

Coding that locks information so that it cannot be read by unauthorised parties.<br />

In the software sector, the end of a product’s life is the moment when it is no longer considered current<br />

by the vendor. When software reaches end-of-life, the vendor will generally no longer release updates<br />

or provide support for it.<br />

Europay MasterCard Visa (EMV) is a standard for debit card systems using chip cards and chip card pay<br />

terminals. The chip card has replaced cards with an easy-to-copy magnetic strip.<br />

Software, data or a series of commands that exploit a hardware/software vulnerability for the purpose<br />

of creating unintended or unexpected behaviour in that software or hardware.<br />

Means of attack used primarily with web applications where a user can add a file with own code<br />

so as to influence the application’s operation.<br />

Providing deliberately incorrect (input) information to a system to determine how it handles incorrect<br />

input.<br />

The satellite-based, Global Positioning System (GPS) is precise to within several metres. GPS is used<br />

for applications such as navigation.<br />

Global System for Mobile Communications (GSM) is a standard for digital mobile telephony. GSM<br />

is considered a second-generation mobile phone technology (2G).<br />

The most conventional definition of a hacker, and the one used in this document, is someone who<br />

attempts to break into computer systems with malicious intent. Originally, the term hacker was used<br />

to denote someone using technology (including software) in unconventional ways, usually with the<br />

objective of circumventing limitations or achieving unexpected effects.<br />

Hypertext Mark-up Language (HTML) is used to define aspects of documents, mainly intended for<br />

building webpages.<br />

Industrial Control Systems (ICS)/Supervisory Control And Data Acquisition (SCADA) are measurement<br />

and control systems used to control industrial processes, for example, or building management systems.<br />

ICS and SCADA systems collect and process measurement and control signals from sensors in physical<br />

systems and steer the corresponding machines or devices.<br />

iDeal is an online payment service allowing users to pay online directly through their own bank’s internet<br />

banking web site.<br />

Deliberately creating the appearance of a different identity than one’s own with malicious intent.<br />

A (cyber) incident is a disruption of IT services where the expected availability of the service disappears<br />

completely or in part. It can also be the unlawful publication, obtaining and/or modification of<br />

information stored on IT services.<br />

107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!