www.chilot.me
i.'1
"fh."&:C"'I.7i'> y.u" 'I'),,, "'It'd, !,: I&·:C°'l.7i'>
31 '"information security" means securing infor-
f1"'1.h "'n:
mati on from attacks that obliterate its integrity.
0'''1.!ln (\.f} fl·)· T
fl·)·,>
fI "'I. Fl'/""} fl·) · T
w,.,.·)·
f1"'1.r'lt-"l."f1·)·
·IN"I'I.'t-I:'p
"'I.f1 l' t· 'P. '/'/: 'I ,;
confidentiality and availability while collecting.
h"'I..P<'Im·
processing, preserving and communicating;
unmo'r ',ar l
l' ,!p·r·".)'
"f h.·I~:C"'l. 7i'i
41 "information
""r'l (. 'I-
'/;h '~I'I"p.:) ,
!,:) (;:C"'~O'I'>
fp..I,f1;ri'itl
nology.
"'I"h'l;h p"'l.~.h,o') f1C'l·n··'1
f/"l\.h·)·C'
(;/
l' .:1")."
"('I':'&';C"'!, ?i').
fA.I\./l'l·C'
"'I'7~.·/;h
f1CIl'Y')'··)
f1oumn"
·/;/I';'t'I,,:q.?'l·1
O-f1'Lt·'P.
U
f"'l.t'I'/IIC l' ,!p.).
",/:tlr,~
national interest, constitutional order and nation's
fI 'I ,tlf!'o'
psychology by us ing cyber and electromagnetic
./.,/,q~
(j)'''l]'
61 "cryptography" means
(j)~?"
),'I-'lJ"tflor
tl°~') ' "
uvr'l(.·/·
h.x:C"'(ri'l
f"'l.r'lt· eLl.ar
f'''lh.ar,>
f'/"PIl,e,
f '/'mO,p
), ,)PdfJ
'1' 1:9""
"oj:tI'):
of coding
),,;
71 "public kcy in frastructure" means critical security
')'lili t'l~" I')'
infraslructu re that enable to secure the transferred
f Y. uTd·
message integrity and verify the identity of the
f''''I.YfI )··tI
sender and rccipient;
"'11'1.).
f' Il. ,)"C"'I. 0')
science
anyone other than the intended recipient;
"'11'1')'
Y.u·I'd·
"'1')'1')'
a
messages so that they cannot be read or altered by
ovl\(,'I' tI"'I')' 'Iar,
:j;1
electro-
technologies and systems;
f1ar
f Y.u'I'd ·
and
51 "information attack" means attack against the
),'I-'I)?'I'f,/.ar f"'l,J'f1ltl fY"f1mt- <'I,e:)f1 'I(j)"
1,1
information
infrastructure;
~ ar,
"h?T·r·'7t-&," "'11'1.). h;J-!lnar
ourulh')'') . "'il'1"
),<,.
geospatial
1")-<["):'
fII~'):r-
f1U7 ou"'7f1;J-'P. f1CIl·/: ),,;
"l~
I'<'IY,OC';
"'In') '
telcco-
magnetic communication systems and public key
)'" ,/:tlr,~ fY.UTr) · "uN../· tlml'j-') .r'm.:h~'l/'\'
•
includes
I11mun ication, informati on communication tcch -
f 1l:}(,:CO~. ?i') /,"'I.'I.h:ri·1
'/;1\./\<70, 'I.th ?i')'P
infrastructure"
f'1l:H.:C"'I.O'),>
.r. u'n')'
tI "'I')'
ovt'l(,'I-
81 "critical
infrastructure"
mcans
a
critical
in frast ructure that will have considerable dJrnagc
t'IM.;J h'I';Jt'lm f1'O'Lt-'l? 1',»<{n:r .. l'U7/·n
Y. U')~'r I)~ h<]:'/'~: 7'-'1')' t'I,YovrT) f"'l. ):tI
on the national interest and public safety if its
information
and
information
in frastructure
,
security beco me vulnerable to a threat;
f'h. ,)6: C"'I. 0') . ",,!l(.·I·
1'I"'I(.;J7T
f"'l.Y.(''7
(un
·1·oIIlC
tl°~')'
.r.u'l'd·')
f,?9"7"'1C,'
''''t;'''I'P.
91 "audit"
/I·) ..)·tI
information
fmn'~
Mt.'l7.
II
f),C9"')'
'I ar
"f' P,M
1',;.)."
f1CIl'I:
r'lC')
),C9"P.fP:):'1
"'11'1,).
ovr'l(' 'I'
t'I"'1(.;J71'
f'ov"Ill ,).
°7'1';:(j)'9" Om·I.~·
,eet.L?" t·/.\::
infrastructure
to ensurc that the instituti onal information security
"'1(, 71 l' c,'
OVU"I")
policies and operational procedures comply with
),·IP,.mM.
I' 1l:I&:C"'I. 0'1
laken;
Y.u'l'd·
101 "'assessment" includes conducting penetration test
h.')&:C"'(o')
and simil ar activities to ensure the vulnerability
tl°?')'
mY.
),c,'
ov·ht-'o'
'TDt'ltI
of information
llt-fPl') f"'lh,>(j)') '1''1I]C 'In~,
IN
in formation
evaluatin g
sccurity to assess the adequacy of system control
,
'1·;JI)"l." 'd,')
and
and
national standards and th ~t nece ssary measures are
"'I.e: (. '1
f Il:)~: C"'I.'ri'1
monitoring
I'lc'}(,';C"'J,'ri')
Y.U'I'I·)· 7'1'1. t\. fP): ),'> 1l;J-')-'lCP.:): 'n'Lt-T
y'(.p.:far')
means
/
and
information
infrastructure
st:curity;
)l,;J- \"1'71'100)' 1'f1.')·')?"
II I
allY cxprt:ssion in the mascu li ne gender incl uues
the feminine.