CIPRNet CIP glossary
ABCDEFGHIJKLMNOPQRSTUVWXY
Z
?
A
- ACE
Adaptive Communication Environment ... - AFAP
As Fast As Possible ... - Agent-based simulation
Simulation that uses software agent technology. ... - ALM
Application-Layer Multicast ... - ALMI
Application-Layer Multicast Infrastructure ... - ALSP
Aggregate Level Simulation Protocol ... - API
Application Programming Interface ... - Attack tool
Tool to design attack trees ... - Attack tree
“Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that.. ... - Attribute
Each component can have at least one attribute. Attributes have a name, a data type and a certain value. ... - Attribute value plot
Attribute value plots are used in online mode and analysis to show the evolution of attribute values over time or to show the relation between different attribute. During analysis the attribute may be from the same or from different simulation runs. ...
B
- Batch mode
The batch mode of the simulator is used to run many simulations automat-ically without having to interact with the simulation environment. ... - Behaviour
See User-specified behaviour, System-specified behaviour ... - BTP
Banana Tree Protocol ...
C
- Cascading effect
See cascading failure ... - Cascading failure
“A cascading failure occurs when a disruption in one infrastructure causes the failure of a component in a second infrastructure, which subsequently causes a disruption in the second infrastructure.” (source: [Rinaldi2001]) ... - CBR
Constant Bit-Rate ... - CC
Communication Controller ... - CE
Communication Element ... - CI
See critical infrastructure ... - CI model
A CI model is a particular conceptual model for representing and simulating the behaviour of a critical infrastructure. ... - CIP
See critical infrastructure protection ... - CIWIN
Critical Infrastructure Warning and Information Network ... - CL
Communication Layer ... - Component
A (network) component is an object in a CI model e.g. a generator, a pump, a transmission line, a physical transport, a node, a substation. Components have attributes and user-specified behaviour. ... - Computational model
See computer simulation ... - Computer model
See computer simulation ... - Computer simulation
A computer simulation, a computer model or a computational model is a computer program, or network of computers, that attempts to simulate an abstract model of a particular system. ... - Conceptual model
A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. ... - Connection
Connections describe links between different components in a CI model. ... - consequence
outcome of an event affecting objectives ... - Continuous simulation
In a continuous (computer) simulation, the system behaviour is represented by differential equations and the simulation consists in solving the equation. ... - control
measure that is modifying risk ... - COTS
Commercial off-the-shelf ... - CPN
Cognitive Packet Network ... - Critical Infrastructure
The European Council Directive 2008/114/EC defines: ‘Critical infrastructure’ (CI) means an asset, system or part thereof located in Member States which is essential for the maintenance of vital societal functions, health, safety, security, economic.. ... - Critical Infrastructure Protection
Critical infrastructure protection (CIP) is the study, design and implemen-tation of measures (pro-action, prevention, preparation, incident response, recovery) aimed to reduce the risk that critical infrastructure fails with serious consequences and.. ... - CRM
Customer Relationship Management ... - Cyber dependency
A cyber dependency exists if its state of an infrastructure depends on information transmitted through the information infrastructure.” (after: Rinaldi, 2001) ...
D
- DDoS
Distributed Denial of Service ... - Dependency
Dependency is the relationship between two (critical infrastructure) products or services in which one product or service is required for the generation of the other product or service. ... - DES
Discrete Event Simulation ... - DFS
Depth-First Search ... - DIESIS
Design of an Interoperable European federated Simulation Network for critical Infrastructures ... - DIS
Distributed Interactive Simulation ... - Discrete event simulation
In discrete event simulation, the system-specified behaviour is described as a series of events that must be processed at a discrete point of the simu-lated time and that take a certain amount of real time. ... - DOC
Direct Operating Cost ... - DoS
Denial of Service ... - DSS
Decision Support System ... - DVE
Distributed Virtual Environment ... - DVMRP
Distance Vector Multicast Routing Protocol ...
E
- e-Infrastructure
The Research Infrastructures part of the FP7 Capacities Programme supports an innovative way of conducting scientific research (referred to as e-Science) by the creation of a new environment for academic and industrial research in which virtual.. ... - e-IRG
e-Infrastructure Reflection Group http://www.e-irg.org/ The main objective of the eInfrastructure initiative is to support the creation of a framework (political, technological and administrative) for the easy and cost-effective shared use.. ... - ECI
The Council Directive [EU2008a] defines: ‘European critical infrastructure’ or ‘ECI’ means critical infrastructure located in Member States the disruption or destruction of which would have a significant impact on at least two Member.. ... - EII
EISAC Interoperability Infrastructure ... - EIII
EII Interface ... - EIIM
EISAC Interoperability Infrastructure Middleware ... - EISAC
European Infrastructures Simulation and Analysis Centre ... - ENISA
European Network and Information Security Agency ... - ERA
European Research Area http://ec.europa.eu/research/era/index_en.html A political concept and objective of the European Research Framework Programmes (FPs), introduced in the year 2000. A unified area all across Europe shall be.. ... - ERI
European Research Infrastructure [EU2008b]. ... - ERNCIP
European Reference Network for Critical Infrastructure Protection ... - ESFRI
European Strategy Forum on Research Infrastructures A policy making body for Research Infrastructures on a European Level. National Representatives. The role of ESFRI is to support a coherent approach to policy-making on research infrastructures.. ... - event
occurrence or change of a particular set of circumstances ... - Event
An event describes what happens to a component in the CI model if a condition is fulfilled, e.g. the tripping of a transmission line at a certain time. ... - Event log
The event log contains all events which occurred during a simulation run and are considered “important”, e.g. the trip of a line. System-specified behaviour or user-specified behaviour may write to the event log. ... - external context
external environment in which the organization seeks to achieve its objectives ...
F
- Fault behaviour
The fault behaviour describes negative effects to an infrastructure, like attacks or faults. ... - Fault tree
Fault trees represent fault sequences of components in which each component is logically decomposed into sub-components (CXX). In a Fault Tree, leaves represent failures of sub-components (fault causes), and the logical.. ... - FC
Federation Controller ... - FCM
Federation Control Module ... - Federate
a) A single simulation model that interoperates with other simulations in a federation. (source: [Rathnam2004]) b) In the DIESIS context, a federate also refers to the aggregate of a simulator and its specific.. ... - Federate simulation bridge
The coupling between the different CI simulators has to be “intelligent” in some way to provide a “bridge” between the different, very heterogeneous simulators. ... - Federate(d) simulation
The parallel execution of a group of simulations wherein information is exchanged between individual simulations at run-time. (source: Rathnam, 2004) ... - Federation
A collection of interoperating federated simulations. (source: Rathnam, 2004). The federation may include additional components like logging tools, a graphical user interface for controlling the federation, visualisa-tion tools and more. ... - Federation adapter
Synonymously used for gateway (reference) and federation simula-tion controller ... - Federation control module
In the DIESIS context, the term “Federation Control Module” refers to the graphical user interface with which the user invokes certain functions, in the federated simulation. Its abbreviation is FCM. ... - Federation controller
In the DIESIS context, the term “Federation Controller,” abbreviated FC, refers to the element described in the communication middleware deliverables D3.2a and D3.2b. ... - Federation manager
In the DIESIS context, the entity that binds several wrappers and exerts some control on the federation is called the “Federation Manager”, abbreviated FM. ... - Federation simulation controller
Synonymously used for gateway (reference) and federation adapter ... - FOM
Federation Object Model ... - FONT
Federation Ontology ... - frequency
number of events or outcomes per defined unit of time ... - FTP
File Transfer Protocol ... - Functional dependency
Two infrastructures are functional dependent when objects in one infrastructure can only function when the objects in the other infrastructure operate properly. Functional dependencies can be uni- or bi-directional (interdependency). ...
G
- Gateway
A gateway is a technical interface component that makes a proprietary simulator compatible with the DIESIS schemes for dependency modelling, time synchronisation and simulation.. ... - Geographical dependency
Infrastructures are geographically dependent if a local environmental event can create state changes in all of them. (after: [Rinaldi2001]) E.g. if telecommunication and electrical distribution lines use the same bridge, the destruction.. ... - GIS
Geographical Information System ... - GPS
Global Positioning System ... - GUI
A GUI is a graphical user interface that allows the user to interact with the simulation in an intuitive way. ...
H
- hazard
source of potential harm ... - HLA
HLA (High Level Architecture) is an IEEE standard developed by the United States department of defence [HLA00a, HLA00b, HLA00c, HLA03, Kuh99]. It allows the exchange of information among several and heterogeneous simulators during simulation running. ... - HMTP
Host Multicast Tree Protocol ...
I
- IC
Imperial College London ... - ICT
Information and Communication Technologies ... - Inter-dependency
Interdependency is the mutual dependency of products or services (ACIP, 2003). ... - internal context
internal environment in which the organization seeks to achieve its objectives ... - IONT
Infrastructure Ontology ... - IP
Internet Protocol ... - IPC
Inter-process Communication ...
J
K
L
- LAMPS
LAMPS (Language for Agent-based Modelling of Processes and Scenarios) is a general language to describe processes and scenarios. ... - LAN
Local Area Network ... - likelihood
chance of something happening ... - Log
See Event log and simulation log. ... - Logical dependency
Two infrastructures are logically dependent if the state of each depends on the state of the other via a mechanism that is not a physical, cyber, or geographic connection. (after: [Rinaldi2001]) ...
M
- M&S Interoperability
Ability of a model or simulation to provide services to and accept services from other models and simulations, and to use the services so exchanged to enable them to operate effectively together. (after: [MSMP; DoDD 5000.59; DSMC 1]) ... - MANET
Military Ad-hoc Networks ... - Model
See conceptual model ... - Modelling
Modelling denotes the action of designing and creating a conceptual model or a computational model or a CI model or a computer simulation. Other synonyms may apply as well. ... - MST
Minimum Spanning Tree ... - MTBF
Mean Time Between Failures ...
N
- NAC
Network Access Control ... - NAT
Network Address Translation ... - NSA
National Security Agency ... - NTP
Network Time Protocol ...
O
- OGSA
Open Grid Services Architecture ... - Online mode
If a simulation is running in online mode, the user can monitor and influence the running simulation, e.g. by changing the values of attributes. ... - Ontology
In both computer science and information science, an ontology is a representation of a set of concepts within a domain and the relationships between those concepts. It is used to reason about the properties.. ... - OpenMI
Open Modelling Interface (OpenMI) is a modelling standard emerged from the domain of water system simulation. ... - OS
Operating System ... - OWL
Web Ontology Language ...
P
- P2P
Peer-To-Peer ... - PDES
Parallel Discrete Event Simulation ... - PDU
Protocol Data Unit ... - Physical depen-dency
Two infrastructures are physically dependent if the state of each is dependent on the material output(s) of the other. (after: [Rinaldi2001]) ... - PN
Physical Node ... - PNeT
Physical Network ... - PoC
Proof of Concept ... - probability
measure of the chance of occurrence expressed as a number between 0 and 1, where 0 is impossibility and 1 is absolute certainty ...
Q
R
- risk
effect of uncertainty on objectives ... - risk analysis
process to comprehend the nature of risk and to determine the level of risk ... - risk assessment
overall process of risk identification, risk analysis and risk evaluation ... - risk criteria
terms of reference against which the significance of a risk is evaluated ... - risk evaluation
process of comparing the results of risk analysis with risk criteria to determine whether the risk and/or its magnitude is acceptable or tolerable ... - risk identification
process of finding, recognizing and describing risks ... - risk matrix
tool for ranking and displaying risks by defining ranges for consequence and likelihood ... - risk source
element which alone or in combination has the intrinsic potential to give rise to risk ... - RNN
Random Neural Network ... - RO
Receive Order ... - RP
Rendezvous Point ... - RPC
Remote Procedure Call ... - RTI
Run Time Infrastructure ... - RTT
Round-Trip Time ...
S
- Scenario
A scenario consists of a CI model, the initial states of all components and the scenario behaviour that describes the events that happen within the scenario. ... - Scenario behaviour
The scenario behaviour describes the “normal” events that happen within a scenario (e.g. a consumer changes the amount of electric power that is consumed). The events may be triggered by time or by other conditions defined in the scenario behaviour. ... - Simulation
See computer simulation. ... - Simulation log
The simulation log contains the evolution of the values of all attributes over time. It builds the basis for the analysis of simulation runs. ... - Simulation run
A simulation run is a single execution of a scenario and optional fault behaviour. ... - SLA
Service Level Agreement ... - SOA
Service-Oriented Architecture ... - SOAP
Simple Object Access Protocol ... - SOAP-RPC
SOAP Remote Procedure Call ... - Software agent
A software agent (or autonomous agent or intelligent agent) is a computer program which works toward goals (as opposed to discrete tasks) in a dynamic environment (where change is the norm) on behalf of another.. ... - Software agent technology
The software techniques, frameworks, and tools that are used to design, develop, implement, deploy, and support software agents. (source: http://www.agtivity.com/) ... - SONT
Simulator Ontology ... - SPT
Shortest Path Tree ... - SQL
Structured Query Language ... - SSL
Secure Sockets Layer ... - stakeholder
person or organization that can affect, be affected by, or perceive themselves to be affected by a decision or activity ... - SWRL
Semantic Web Rule Language ... - System-specified behaviour
System-specified behaviour is behaviour of components or scenarios that is either too basic or too complicated to be described as user-specified behaviour and therefore has to be implemented in a programming language by a developer. ...
T
- TBCP
Tree Building Control Protocol ... - TCM
TCP Communication Module ... - TCP
Transmission Control Protocol ... - TCP/IP
Transmission Control Protocol/Internet Protocol ... - Threat
Any indication, circumstance, or event with the potential to disrupt or destroy critical infrastructure, or any element thereof (EU, 2006) ... - TLS
Transport Layer Security ... - TMM
Time Management Module ... - Topology
A topology is given by connections between components of a CI model. ... - TPoC
Technical Proof-of-Concept ... - TSO
Timestamp Order ...
U
- UDM
UDP Communication Module ... - UDP
User Datagram Protocol ... - UML
Unified Modeling Language ... - User-specified behaviour
User-specified behaviour is behaviour that can be designed and modified by the user using a special language for behaviour definition (LAMPS). User-specified behaviour can invoke other user-specified behaviour or system-specified behaviour. ...
V
- VN
Virtual Node ... - VNet
Virtual Network ... - vulnerability
intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence ...
W
- WAN
Wide Area Network ... - WP
Work Package ... - Wrapper
In the context of DIESIS, a wrapper refers to a DIESIS interoperability middleware software construct that binds certain links (data, time, control, function links) between federates, as defined in the draft architecture description deliverable D4.1a. ... - WSDL
Web Services Description Language ...
X
- XML
Extensible Markup Language ... - XSL
Extensible Stylesheet Language ... - XSLT
XSL Transformations ...