12.07.2015 Views

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

INTERNATIONAL ISO/IEC STANDARD 18028-1

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ISO</strong>/<strong>IEC</strong><strong>18028</strong>-1:2006(E)3.2.19intrusionunauthorized access to a network or a network-connected system i.e. deliberate or accidental unauthorizedaccess to an information system, to include malicious activity against an information system, or unauthorizeduse of resources within an information system3.2.20intrusion detectionformal process of detecting intrusions, generally characterized by gathering knowledge about abnormal usagepatterns as well as what, how, and which vulnerability has been exploited to include how and when it occurredNOTE See <strong>ISO</strong>/I EC 18043.3.2.21intrusion detection system IDStechnical system that is used to identify that an intrusion has been attempted, is occurring, or has occurredand possibly respond to intrusions in information systems and networksNOTE See <strong>ISO</strong>/I EC 18043.3.2.22intrusion prevention systemIPSvariant on intrusion detection systems that are specifically designed to provide an active response capabilityNOTE See <strong>ISO</strong>/<strong>IEC</strong> 18043.3.2.23jitterone form of line distortion caused when a transmitted signal deviates from its reference3.2.24malwaremalicious software, such as a virus or a trojan horse, designed specifically to damage or disrupt a system3.2.25multi protocol label switchingMPLStechnique, developed for use in inter-network routing, whereby labels are assigned to individual data paths orflows, and used to switch connections, underneath and in addition to normal routing protocol mechanismsNOTELabel switching can be used as one method of creating tunnels.3.2.26network administrationday-to-day operation and management of network processes and users3.2.27network analyzerdevice used to capture and decode information flowing in networks3.2.28network elementinformation system that is connected to a networkNOTE The detailed description of security element is given in <strong>ISO</strong>/<strong>IEC</strong> <strong>18028</strong>-2.3.2.29network managementprocess of planning, designing, implementing, operating, monitoring and maintaining a network4 © <strong>ISO</strong>/<strong>IEC</strong> 2006 - All rights reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!