• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

NERC CIP

North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standard specifies a set of requirements designed to secure the assets required for operating North America's bulk electric system.

Cyber Assets

Programmable electronic devices, including the hardware, software, and data in those devices.

BCS

BES Cyber System (BCS)


- One or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity.

BCA

BES Cyber Asset (BCA)


- A Cyber Asset that if rendered unavailable, degraded, or misusedwould, within 15 minutes of its required operation, misoperation, or non‐operation, adversely impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, orotherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System.

BES

Bulk Electric System (BES)


- All Transmission Elements operated at 100 kV or higher and Real Power and Reactive Power resources connected at 100 kV or higher. This does not include facilities used in the local distribution of electric energy. Certain exception apply.

IRA

Interactive Remote Access (IRA)


- User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity’s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP).

ERC

External Routable Connectivity (ERC)


- The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection.

EAP

Electronic Access Point (EAP)


- A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter.

ESP

Electronic Security Perimeter (ESP)


- The logical border surrounding a network to which BES Cyber Systems are connected using a routable protocol.

PCA

Protected Cyber Asset (PCA)


- One or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same ESP.

EACMS (or EACS)

Electronica Access Control & Monitoring System (EACMS or EACS)


- Cyber Assets that perform electronic access control or electronic access monitoring of the Electronic Security Perimeter(s) or BES Cyber Systems. This includes Intermediate Systems.

EACMS examples: Intermediate Systems, authentication servers (e.g., RADIUS servers, Active Directory servers,certificate authorities), security event monitoring systems, and intrusion detection systems.

PACS

Physical Access Control System (PACS)


- Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s), exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers.

PSP

Physical Security Perimeter (PSP)


- The physical border surrounding locations in which BES Cyber Assets, BES Cyber Systems, or Electronic Access Control or Monitoring Systems reside, and for which access is controlled.

BCSI

BES Cyber System Information (BCSI)


- Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements.

Intermediate System

A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter.