• Font Size:
  • S
  • M
  • L

Article NO. Content

Title:

Reference Guidelines on the Cybersecurity Protection of Service Enterprises in Securities and Futures Markets  CH

Announced Date: 2024.04.19 (Articles 2, 3, 5, 7, 8, 12, 16 amended,English version coming soon)
Current English version amended on 2022.04.26 
Categories: Information Operations
Article 3     (Definitions)
  1. Information and communication system:
  2. A system used for collecting, controlling, transmitting, storing, circulating, deleting information or otherwise processing, using, and sharing information
  3. Access:
  4. Access of an information asset by various means, including acquisition, use, safekeeping, inquiry, revision, adjustment, destruction, etc.
  5. Network equipment:
  6. Components for network communication which are required for transmitting data, programs, services, and multimedia, such as firewalls, routers, switches, etc., as also included in the network diagram of an organization.
  7. Information and communication security event:
  8. An event where a system, service, or network is found upon evaluation to show signs of a possible breach of the information and communication security policy or failure of a protective measure, which impacts the operation of the information and communication system, constituting a threat against the information and communication security policy.
  9. Information asset:
  10. An asset pertaining to the processing of information, including hardware, software, data, documents, and personnel, etc., such as information of the operating system, applications, and other software of a server or a user’s computer.