Professional Documents
Culture Documents
HB 3242008
HB
HB 3242008
Lexicon of Key Terms used in Security
HB 3242008
Foreword
FOREWORD
Note from the Author
I would like to sincerely thank the owners and operators of critical
infrastructure represented in Trusted Information Sharing Network (TISN) and
other key interested parties for their participation in the consultation stages of
this project. A full list of contributors is provided at the end of this report.
A lexicon of key security terms can only be relevant if it is informed by the
knowledge and experience of experts in the field. I believe that this has been
achieved through the commitment and dedication of all concerned.
I hope that the Lexicon will prove to be a useful tool that will improve
communication across the diverse security sector.
Mark Bezzina, Managing Director
StanCert Pty Ltd
Contents
HB 3242008
CONTENTS
Page
1
2
4
5
Introduction ........................................................................................................................ 4
The Security Lexicon Project .............................................................................................. 6
2.1 Purpose........................................................................................................................ 7
2.2 Scope and objectives ................................................................................................... 7
2.3 Project methodology .................................................................................................... 7
Criteria................................................................................................................................ 9
3.1 Creating a definition .................................................................................................... 10
3.2 Audience .................................................................................................................... 10
3.3 Authority levels ........................................................................................................... 11
3.4 Key criteria for good definitions................................................................................... 11
Interrelationships and linkages between terms ................................................................. 13
Overview of stakeholder input........................................................................................... 17
5.1 Pre-consultation submissions ..................................................................................... 18
5.2 Interrelationships of terms........................................................................................... 18
5.3 Selection from existing terms...................................................................................... 19
5.4 Preferred definitions.................................................................................................... 19
Definitions......................................................................................................................... 21
6.1 Security ...................................................................................................................... 22
6.2 Security Risk Management ......................................................................................... 25
6.3 Emergency Management............................................................................................ 28
6.4 Business Continuity Management............................................................................... 32
6.5 Enterprise-Wide Risk Management............................................................................. 35
6.6 Business Resilience .................................................................................................... 37
6.7 Infrastructure Assurance............................................................................................. 40
6.8 National Security......................................................................................................... 42
6.9 Protective Security...................................................................................................... 45
6.10 Critical Infrastructure................................................................................................... 46
Summary of Proposed Definitions .................................................................................... 50
7.1 Overarching Descriptor ............................................................................................... 51
7.2 Proposed Definitions................................................................................................... 51
ANNEXES
A
B
C
D
HB 3242008
1
Introduction
Introduction
HB 3242008
In order to achieve this, extensive consultation took place with the owners
and operators of critical infrastructure represented in the Trusted Information
Sharing Network for Critical Infrastructure Protection (TISN) and other key
interested parties.
HB 3242008
2
The Security Lexicon
Project
2.1
HB 3242008
Purpose
2.2
Security
(b)
(c)
Emergency Management
(d)
(e)
(f)
Business Resilience
(g)
Infrastructure Assurance
(h)
National Security
(i)
Protective Security
(j)
Critical Infrastructure
The Lexicon of key security terms takes an all hazards approach to critical
infrastructure protection from a business perspective and covers all aspects
of the security industry and security management.
2.3
Project methodology
This is a free preview. Purchase the entire publication at the link below: