www.chilot.me

i.'1

"fh."&:C"'I.7i'> y.u" 'I'),,, "'It'd, !,: I&·:C°'l.7i'>

31 '"information security" means securing infor-

f1"'1.h "'n:

mati on from attacks that obliterate its integrity.

0'''1.!ln (\.f} fl·)· T
fl·)·,>

fI "'I. Fl'/""} fl·) · T

w,.,.·)·

f1"'1.r'lt-"l."f1·)·

·IN"I'I.'t-I:'p

"'I.f1 l' t· 'P. '/'/: 'I ,;

confidentiality and availability while collecting.

h"'I..P<'Im·

processing, preserving and communicating;

unmo'r ',ar l

l' ,!p·r·".)'

"f h.·I~:C"'l. 7i'i

41 "information

""r'l (. 'I-

'/;h '~I'I"p.:) ,

!,:) (;:C"'~O'I'>

fp..I,f1;ri'itl

nology.

"'I"h'l;h p"'l.~.h,o') f1C'l·n··'1

f/"l\.h·)·C'
(;/

l' .:1")."

"('I':'&';C"'!, ?i').
fA.I\./l'l·C'

"'I'7~.·/;h

f1CIl'Y')'··)

f1oumn"

·/;/I';'t'I,,:q.?'l·1
O-f1'Lt·'P.

U

f"'l.t'I'/IIC l' ,!p.).

",/:tlr,~

national interest, constitutional order and nation's

fI 'I ,tlf!'o'

psychology by us ing cyber and electromagnetic

./.,/,q~

(j)'''l]'

61 "cryptography" means

(j)~?"

),'I-'lJ"tflor
tl°~') ' "

uvr'l(.·/·

h.x:C"'(ri'l

f"'l.r'lt· eLl.ar
f'''lh.ar,>

f'/"PIl,e,

f '/'mO,p

), ,)PdfJ
'1' 1:9""

"oj:tI'):

of coding

),,;

71 "public kcy in frastructure" means critical security

')'lili t'l~" I')'

infraslructu re that enable to secure the transferred

f Y. uTd·

message integrity and verify the identity of the

f''''I.YfI )··tI

sender and rccipient;

"'11'1.).

f' Il. ,)"C"'I. 0')

science

anyone other than the intended recipient;

"'11'1')'

Y.u·I'd·

"'1')'1')'

a

messages so that they cannot be read or altered by

ovl\(,'I' tI"'I')' 'Iar,
:j;1

electro-

technologies and systems;

f1ar

f Y.u'I'd ·

and

51 "information attack" means attack against the

),'I-'I)?'I'f,/.ar f"'l,J'f1ltl fY"f1mt- <'I,e:)f1 'I(j)"
1,1

information

infrastructure;

~ ar,

"h?T·r·'7t-&," "'11'1.). h;J-!lnar
ourulh')'') . "'il'1"

),<,.

geospatial

1")-<["):'

fII~'):r-

f1U7 ou"'7f1;J-'P. f1CIl·/: ),,;
"l~

I'<'IY,OC';

"'In') '

telcco-

magnetic communication systems and public key

)'" ,/:tlr,~ fY.UTr) · "uN../· tlml'j-') .r'm.:h~'l/'\'

•

includes

I11mun ication, informati on communication tcch -

f 1l:}(,:CO~. ?i') /,"'I.'I.h:ri·1

'/;1\./\<70, 'I.th ?i')'P

infrastructure"

f'1l:H.:C"'I.O'),>

.r. u'n')'

tI "'I')'

ovt'l(,'I-

81 "critical

infrastructure"

mcans

a

critical

in frast ructure that will have considerable dJrnagc

t'IM.;J h'I';Jt'lm f1'O'Lt-'l? 1',»<{n:r .. l'U7/·n

Y. U')~'r I)~ h<]:'/'~: 7'-'1')' t'I,YovrT) f"'l. ):tI

on the national interest and public safety if its
information

and

information

in frastructure

,
security beco me vulnerable to a threat;

f'h. ,)6: C"'I. 0') . ",,!l(.·I·
1'I"'I(.;J7T

f"'l.Y.(''7

(un

·1·oIIlC

tl°~')'

.r.u'l'd·')

f,?9"7"'1C,'

''''t;'''I'P.

91 "audit"

/I·) ..)·tI

information

fmn'~

Mt.'l7.

II

f),C9"')'
'I ar

"f' P,M

1',;.)."

f1CIl'I:

r'lC')

),C9"P.fP:):'1

"'11'1,).
ovr'l(' 'I'

t'I"'1(.;J71'
f'ov"Ill ,).

°7'1';:(j)'9" Om·I.~·

,eet.L?" t·/.\::

infrastructure

to ensurc that the instituti onal information security

"'1(, 71 l' c,'

OVU"I")

policies and operational procedures comply with

),·IP,.mM.

I' 1l:I&:C"'I. 0'1

laken;

Y.u'l'd·

101 "'assessment" includes conducting penetration test

h.')&:C"'(o')

and simil ar activities to ensure the vulnerability

tl°?')'

mY.

),c,'

ov·ht-'o'

'TDt'ltI

of information

llt-fPl') f"'lh,>(j)') '1''1I]C 'In~,

IN

in formation

evaluatin g

sccurity to assess the adequacy of system control

,

'1·;JI)"l." 'd,')

and

and

national standards and th ~t nece ssary measures are

"'I.e: (. '1

f Il:)~: C"'I.'ri'1

monitoring

I'lc'}(,';C"'J,'ri')

Y.U'I'I·)· 7'1'1. t\. fP): ),'> 1l;J-')-'lCP.:): 'n'Lt-T

y'(.p.:far')

means

/

and

information

infrastructure

st:curity;

)l,;J- \"1'71'100)' 1'f1.')·')?"
II I

allY cxprt:ssion in the mascu li ne gender incl uues
the feminine.

Select target paragraph3