third Cyber Security Assessment Netherlands - NCSC
third Cyber Security Assessment Netherlands - NCSC
third Cyber Security Assessment Netherlands - NCSC
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Document<br />
ECTF<br />
Encryption<br />
End-of-life<br />
EMV<br />
Exploit/exploit code<br />
File inclusion<br />
Fuzzing<br />
GPS<br />
GSM<br />
Hacker/Hacking<br />
HTML<br />
ICS/SCADA<br />
iDeal<br />
Identity fraud<br />
Incident<br />
This term covers letters, notes, memos, reports, presentations, drawings, photos, films, maps, sound<br />
recordings, text messages, digital carriers (CD-ROMs and USB) or any other physical medium that can<br />
contain information.<br />
The Electronic Crimes Taskforce (ECTF) is a partnership between the National Police, the Public<br />
Prosecution Service, the banks and CPNI.NL, also known as the ‘bank team’. The ECTF has a facilitating<br />
role in dealing with cyber crime targeted at the financial sector.<br />
Coding that locks information so that it cannot be read by unauthorised parties.<br />
In the software sector, the end of a product’s life is the moment when it is no longer considered current<br />
by the vendor. When software reaches end-of-life, the vendor will generally no longer release updates<br />
or provide support for it.<br />
Europay MasterCard Visa (EMV) is a standard for debit card systems using chip cards and chip card pay<br />
terminals. The chip card has replaced cards with an easy-to-copy magnetic strip.<br />
Software, data or a series of commands that exploit a hardware/software vulnerability for the purpose<br />
of creating unintended or unexpected behaviour in that software or hardware.<br />
Means of attack used primarily with web applications where a user can add a file with own code<br />
so as to influence the application’s operation.<br />
Providing deliberately incorrect (input) information to a system to determine how it handles incorrect<br />
input.<br />
The satellite-based, Global Positioning System (GPS) is precise to within several metres. GPS is used<br />
for applications such as navigation.<br />
Global System for Mobile Communications (GSM) is a standard for digital mobile telephony. GSM<br />
is considered a second-generation mobile phone technology (2G).<br />
The most conventional definition of a hacker, and the one used in this document, is someone who<br />
attempts to break into computer systems with malicious intent. Originally, the term hacker was used<br />
to denote someone using technology (including software) in unconventional ways, usually with the<br />
objective of circumventing limitations or achieving unexpected effects.<br />
Hypertext Mark-up Language (HTML) is used to define aspects of documents, mainly intended for<br />
building webpages.<br />
Industrial Control Systems (ICS)/Supervisory Control And Data Acquisition (SCADA) are measurement<br />
and control systems used to control industrial processes, for example, or building management systems.<br />
ICS and SCADA systems collect and process measurement and control signals from sensors in physical<br />
systems and steer the corresponding machines or devices.<br />
iDeal is an online payment service allowing users to pay online directly through their own bank’s internet<br />
banking web site.<br />
Deliberately creating the appearance of a different identity than one’s own with malicious intent.<br />
A (cyber) incident is a disruption of IT services where the expected availability of the service disappears<br />
completely or in part. It can also be the unlawful publication, obtaining and/or modification of<br />
information stored on IT services.<br />
107