CIP V5 Definitions Flashcards

0
Q

What is a BES Cyber System?

A

One or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is a BES Cyber Asset?

A

A Cyber Asset that if rendered unavailable, degraded, or misused would, within 15 minutes of its required operation, misoperation, or non-operation, adversely impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System. Redundancy of affected Facilities, systems, and equipment shall not be considered when determining adverse impact. Each BES Cyber Asset is included in one or more BES Cyber Systems. (A Cyber Asset is not a BES Cyber Asset if, for 30 consecutive calendar days or less, it is directly connected to a network within an ESP, a Cyber Asset within an ESP, or to a BES Cyber Asset, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a BES Cyber System Information?

A

Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a CIP Exceptional Circumstance?

A

A situation that involves or threatens to involve one or more of the following, or similar, conditions that impact safety or BES reliability: a risk of injury or death; a natural disaster; civil unrest; an imminent or existing hardware, software, or equipment failure; a Cyber Security Incident requiring emergency assistance; a response by emergency services; the enactment of a mutual assistance agreement; or an impediment of large scale workforce availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a CIP Senior Manager?

A

A single senior management official with overall authority and responsibility for leading and managing implementation of and continuing adherence to the requirements within the NERC CIP Standards, CIP-002 through CIP-011.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Control Center?

A

One or more facilities hosting operating personnel that monitor and control the Bulk Electric System (BES) in real-time to perform the reliability tasks, including their associated data centers, of: 1) a Reliability Coordinator, 2) a Balancing Authority, 3) a Transmission Operator for transmission Facilities at two or more locations, or 4) a Generator Operator for generation Facilities at two or more locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Cyber Asset?

A

Programmable electronic devices including the hardware, software, and data in those devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Cyber Security Incident?

A

A malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter or, Disrupts, or was an attempt to disrupt, the operation of a BES Cyber System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Dial-up Connectivity?

A

A data communication link that is established when the communication equipment dials a phone number and negotiates a connection with the equipment on the other end of the link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Electronic Access Control or Monitoring Systems (“EACMS”)?

A

Cyber Assets that perform electronic access control or electronic access monitoring of the Electronic Security Perimeter(s) or BES Cyber Systems. This includes Intermediate Devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Electronic Access Point (“EAP”)?

A

A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Electronic Security Perimeter (“ESP”)?

A

The logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an External Routable Connectivity?

A

The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Interactive Remote Access?

A

User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate Device and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Intermediate System?

A

A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Physical Access Control Systems (“PACS”)?

A

Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s), exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers.

16
Q

What is a Physical Security Perimeter (“PSP”)?

A

The physical border surrounding locations in which BES Cyber Assets, BES Cyber Systems, or Electronic Access Control or Monitoring Systems reside, and for which access is controlled.

17
Q

What are Protected Cyber Assets (“PCA”)?

A

One or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same ESP. A Cyber Asset is not a Protected Cyber Asset if, for 30 consecutive calendar days or less, it is connected either to a Cyber Asset within the ESP or to the network within the ESP, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.

18
Q

What is a Reportable Cyber Security Incident?

A

A Cyber Security Incident that has compromised or disrupted one or more reliability tasks of a functional entity.