You are on page 1of 9

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

HB 3242008

Lexicon of Key Terms used in Security

HB

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

HB 3242008
Lexicon of Key Terms used in Security

First published as HB 3242008.

Copyright 2008 Standards Australia Limited.


All rights reserved. No part of this publication may be reproduced or copied in any form or by any means,
electronic or mechanical, including photocopying, without the written permission of the publisher.
Published by Standards Australia Limited, GPO Box 476, Sydney, NSW 2001, Australia
ISBN 0 7337 8844 0

HB 3242008

Foreword

FOREWORD
Note from the Author
I would like to sincerely thank the owners and operators of critical
infrastructure represented in Trusted Information Sharing Network (TISN) and
other key interested parties for their participation in the consultation stages of
this project. A full list of contributors is provided at the end of this report.
A lexicon of key security terms can only be relevant if it is informed by the
knowledge and experience of experts in the field. I believe that this has been
achieved through the commitment and dedication of all concerned.

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

I hope that the Lexicon will prove to be a useful tool that will improve
communication across the diverse security sector.
Mark Bezzina, Managing Director
StanCert Pty Ltd

Contents

HB 3242008

CONTENTS
Page

1
2

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

4
5

Introduction ........................................................................................................................ 4
The Security Lexicon Project .............................................................................................. 6
2.1 Purpose........................................................................................................................ 7
2.2 Scope and objectives ................................................................................................... 7
2.3 Project methodology .................................................................................................... 7
Criteria................................................................................................................................ 9
3.1 Creating a definition .................................................................................................... 10
3.2 Audience .................................................................................................................... 10
3.3 Authority levels ........................................................................................................... 11
3.4 Key criteria for good definitions................................................................................... 11
Interrelationships and linkages between terms ................................................................. 13
Overview of stakeholder input........................................................................................... 17
5.1 Pre-consultation submissions ..................................................................................... 18
5.2 Interrelationships of terms........................................................................................... 18
5.3 Selection from existing terms...................................................................................... 19
5.4 Preferred definitions.................................................................................................... 19
Definitions......................................................................................................................... 21
6.1 Security ...................................................................................................................... 22
6.2 Security Risk Management ......................................................................................... 25
6.3 Emergency Management............................................................................................ 28
6.4 Business Continuity Management............................................................................... 32
6.5 Enterprise-Wide Risk Management............................................................................. 35
6.6 Business Resilience .................................................................................................... 37
6.7 Infrastructure Assurance............................................................................................. 40
6.8 National Security......................................................................................................... 42
6.9 Protective Security...................................................................................................... 45
6.10 Critical Infrastructure................................................................................................... 46
Summary of Proposed Definitions .................................................................................... 50
7.1 Overarching Descriptor ............................................................................................... 51
7.2 Proposed Definitions................................................................................................... 51

ANNEXES
A
B
C
D

About Standards Australia................................................................................................ 54


About the National Centre for Security Standards (NCSS) ................................................ 56
Developing the Lexicon .................................................................................................... 59
Contributors ..................................................................................................................... 61
D1 Pre-consultation ......................................................................................................... 62
D2 Consultation ............................................................................................................... 64
E Consolidated comments for Draft Lexicon of Key Terms used in Security ........................ 66

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

HB 3242008

1
Introduction

Introduction

HB 3242008

The Security Lexicon Project was established to develop an authoritative


lexicon of key security terms to be published as a Standards Australia
Handbook. The need for this Lexicon arose out of the Security Standards and
Support Systems project and the Critical Infrastructure Protection Training
Analysis project, in which it was identified that there is a lack of common
understanding of terminology used in the security industry. Good terminology
aids efficiency, security, quality and safety. Using the same terms for the
same concepts helps to avoid misunderstandings that lead to conflict,
wasted time and money.

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

In order to achieve this, extensive consultation took place with the owners
and operators of critical infrastructure represented in the Trusted Information
Sharing Network for Critical Infrastructure Protection (TISN) and other key
interested parties.

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

HB 3242008

2
The Security Lexicon
Project

The Security Lexicon Project

2.1

HB 3242008

Purpose

The Project was initiated by Standards Australia to provide stakeholders with


the definitions of key terms used in security.

2.2

Scope and objectives

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

The Security Lexicon Handbook aims to develop an authoritative lexicon of


key security terms that will assist the owners and operators of critical
infrastructure to develop a common understanding of terminology used in the
security industry and to use standard terminology to communicate security
related matters.
The Lexicon focused on the following ten key terms and their
interrelationships. It is beyond the scope of this document to create a general
dictionary of all the terms used in security. The terms below have been
chosen because they have been identified as creating the most confusion.
(a)

Security

(b)

Security Risk Management

(c)

Emergency Management

(d)

Business Continuity Management

(e)

Enterprise-Wide Risk Management

(f)

Business Resilience

(g)

Infrastructure Assurance

(h)

National Security

(i)

Protective Security

(j)

Critical Infrastructure

The Lexicon of key security terms takes an all hazards approach to critical
infrastructure protection from a business perspective and covers all aspects
of the security industry and security management.

2.3

Project methodology

A project plan that defines the detailed methodology, timelines and


deliverables was approved by the National Centre for Security Standards
(NCSS).
Pre-consultation and analysis and research involved carrying out background
research to identify effective systems for the creation of security definitions. It
also identified existing definitions for the 10 key security terms.
To ensure that the project identified and examined all existing authoritative
definitions, stakeholders were sent a letter requesting their suggested
definitions for the key terms.
Stakeholders were also asked to identify the source of their preferred
definition, along with its strengths and weaknesses.

This is a free preview. Purchase the entire publication at the link below:

This is a free 8 page sample. Access the full version at http://infostore.saiglobal.com.

HB 324-2008, Lexicon of Key Terms used in


Security

Looking for additional Standards? Visit SAI Global Infostore


Subscribe to our Free Newsletters about Australian Standards in Legislation; ISO, IEC, BSI and more
Do you need to Manage Standards Collections Online?
Learn about LexConnect, All Jurisdictions, Standards referenced in Australian legislation
Do you want to know when a Standard has changed?
Want to become an SAI Global Standards Sales Affiliate?
Learn about other SAI Global Services:
LOGICOM Military Parts and Supplier Database
Metals Infobase Database of Metal Grades, Standards and Manufacturers
Materials Infobase Database of Materials, Standards and Suppliers
Database of European Law, CELEX and Court Decisions

Need to speak with a Customer Service Representative - Contact Us

You might also like