Remote access
Use of systems which are within the perimeter of the security zone and that can be accessed
from another geographical location with the same rights as if the systems were physically at
the same location.
SCADA
Supervisory Control and Data Acquisition (SCADA) involves monitoring and controlling
technical processes using a computer system.
Security
Safeguards the confidentiality, integrity and availability of a product, a solution or a service.
Security hole
Weak point in a computer system that allows an attacker to violate the integrity of the system.
As a rule, this is the result of program errors or design defects in the system.
A weak point of a resource or operator element that can be exploited by one or more threats.
SIEM system
SIEM stands for Security Information and Event Management and has become an established
term in IT security. Such systems are able to identify and evaluate security-relevant events
and notify the administrator.
Switch
Network component for connecting several terminal devices or network segments in a local
network (LAN).
Threat
Potential cause of an undesirable incident which may result in damage to a system or
organization.
Threat and Risk Analysis
The TRA (Threat and Risk Analysis) is a Siemens-wide standardized method for use in the
product, solution and service business, for product development, engineering or service
projects. The method is intended to help those involved in the project to identify typical security
defects and weak points, analyze the hazards that could exploit these defects and weak points,
and evaluate the resulting risks.
Glossary
Industrial Security
Configuration Manual, 08/2017, A5E36912609A
231