395 lines
14 KiB
Markdown
395 lines
14 KiB
Markdown
|
|
# DBIS GLOSSARY
|
||
|
|
## Comprehensive Glossary of Terms and Acronyms
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## DOCUMENT METADATA
|
||
|
|
|
||
|
|
**Version:** 1.0
|
||
|
|
**Last Updated:** [YYYY-MM-DD]
|
||
|
|
**Effective Date:** [YYYY-MM-DD]
|
||
|
|
**Status:** Active
|
||
|
|
**Authority:** DBIS Executive Directorate
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## OVERVIEW
|
||
|
|
|
||
|
|
This glossary provides definitions for all acronyms, technical terms, legal terms, and specialized terminology used throughout DBIS documentation. Terms are organized alphabetically for easy reference.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## ACRONYMS
|
||
|
|
|
||
|
|
### A-C
|
||
|
|
|
||
|
|
**ACL** - Access Control List
|
||
|
|
**API** - Application Programming Interface
|
||
|
|
**AES** - Advanced Encryption Standard
|
||
|
|
**BGP** - Border Gateway Protocol
|
||
|
|
**CA** - Certificate Authority
|
||
|
|
**CIS** - Center for Internet Security
|
||
|
|
**CSZ** - Cyber-Sovereign Zone
|
||
|
|
**CSP-1113** - Cyber-Sovereignty Protocol 1113
|
||
|
|
**CSRF** - Cross-Site Request Forgery
|
||
|
|
**CSZ** - Cyber-Sovereign Zone
|
||
|
|
|
||
|
|
### D-F
|
||
|
|
|
||
|
|
**DBIS** - Digital Banking and Institutional System
|
||
|
|
**DDoS** - Distributed Denial of Service
|
||
|
|
**DMZ** - Demilitarized Zone
|
||
|
|
**DPI** - Deep Packet Inspection
|
||
|
|
**ECDSA** - Elliptic Curve Digital Signature Algorithm
|
||
|
|
**ECC** - Error-Correcting Code (memory)
|
||
|
|
**EDR** - Endpoint Detection and Response
|
||
|
|
**HSM** - Hardware Security Module
|
||
|
|
|
||
|
|
### G-I
|
||
|
|
|
||
|
|
**GRU** - GRU Reserve System
|
||
|
|
**HMAC** - Hash-based Message Authentication Code
|
||
|
|
**HIDS** - Host-based Intrusion Detection System
|
||
|
|
**IDP** - Identity Provider
|
||
|
|
**IDS** - Intrusion Detection System
|
||
|
|
**IPS** - Intrusion Prevention System
|
||
|
|
**IPMI** - Intelligent Platform Management Interface
|
||
|
|
**ISO** - International Organization for Standardization
|
||
|
|
|
||
|
|
### J-L
|
||
|
|
|
||
|
|
**KMS** - Key Management Service
|
||
|
|
**LACP** - Link Aggregation Control Protocol
|
||
|
|
**LTS** - Long Term Support
|
||
|
|
**MAC** - Mandatory Access Control / Media Access Control
|
||
|
|
|
||
|
|
### M-O
|
||
|
|
|
||
|
|
**MFA** - Multi-Factor Authentication
|
||
|
|
**MSTP** - Multiple Spanning Tree Protocol
|
||
|
|
**NAC** - Network Access Control
|
||
|
|
**NIST** - National Institute of Standards and Technology
|
||
|
|
**NTP** - Network Time Protocol
|
||
|
|
**OSI** - Open Systems Interconnection
|
||
|
|
**OSPF** - Open Shortest Path First
|
||
|
|
**OWASP** - Open Web Application Security Project
|
||
|
|
|
||
|
|
### P-R
|
||
|
|
|
||
|
|
**PCI DSS** - Payment Card Industry Data Security Standard
|
||
|
|
**PFS** - Perfect Forward Secrecy
|
||
|
|
**PITR** - Point-in-Time Recovery
|
||
|
|
**PKI** - Public Key Infrastructure
|
||
|
|
**RAID** - Redundant Array of Independent Disks
|
||
|
|
**RBAC** - Role-Based Access Control
|
||
|
|
**RHEL** - Red Hat Enterprise Linux
|
||
|
|
**RPO** - Recovery Point Objective
|
||
|
|
**RSTP** - Rapid Spanning Tree Protocol
|
||
|
|
**RTO** - Recovery Time Objective
|
||
|
|
|
||
|
|
### S-U
|
||
|
|
|
||
|
|
**SAST** - Static Application Security Testing
|
||
|
|
**SCC** - Sovereign Control Council
|
||
|
|
**SIEM** - Security Information and Event Management
|
||
|
|
**SAML** - Security Assertion Markup Language
|
||
|
|
**SNMP** - Simple Network Management Protocol
|
||
|
|
**SOC** - System and Organization Controls
|
||
|
|
**SSH** - Secure Shell
|
||
|
|
**SSO** - Single Sign-On
|
||
|
|
**STP** - Spanning Tree Protocol
|
||
|
|
**TLS** - Transport Layer Security
|
||
|
|
**TPM** - Trusted Platform Module
|
||
|
|
**UEFI** - Unified Extensible Firmware Interface
|
||
|
|
**VLAN** - Virtual Local Area Network
|
||
|
|
**VPN** - Virtual Private Network
|
||
|
|
|
||
|
|
### V-Z
|
||
|
|
|
||
|
|
**XAU** - Gold (chemical symbol), used for gold reserves
|
||
|
|
**X.509** - X.509 certificate standard
|
||
|
|
**ZKP** - Zero-Knowledge Proof
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## TECHNICAL TERMS
|
||
|
|
|
||
|
|
### A
|
||
|
|
|
||
|
|
**Access Control List (ACL)** - A list of permissions attached to an object specifying which users or system processes are granted access and what operations are allowed.
|
||
|
|
|
||
|
|
**Asymmetric Encryption** - A cryptographic system that uses pairs of keys: public keys for encryption and private keys for decryption.
|
||
|
|
|
||
|
|
**Authentication** - The process of verifying the identity of a user, device, or system.
|
||
|
|
|
||
|
|
**Authorization** - The process of determining what actions an authenticated user, device, or system is permitted to perform.
|
||
|
|
|
||
|
|
### B
|
||
|
|
|
||
|
|
**Blockchain** - A distributed ledger technology that maintains a continuously growing list of records (blocks) linked and secured using cryptography.
|
||
|
|
|
||
|
|
**Boundary** - In CSZ context, the defined limits of a Cyber-Sovereign Zone, including network, logical, physical, and cryptographic boundaries.
|
||
|
|
|
||
|
|
### C
|
||
|
|
|
||
|
|
**Certificate Authority (CA)** - An entity that issues digital certificates certifying the ownership of a public key.
|
||
|
|
|
||
|
|
**Cipher Suite** - A set of algorithms used to secure network connections through Transport Layer Security (TLS) or Secure Sockets Layer (SSL).
|
||
|
|
|
||
|
|
**Cryptographic Security** - Security provided through the use of cryptographic algorithms and protocols.
|
||
|
|
|
||
|
|
**Cyber-Sovereign Zone (CSZ)** - A defined digital territory with sovereign control over infrastructure, independent network architecture, autonomous security protocols, and isolated operational environment.
|
||
|
|
|
||
|
|
**Cyber-Sovereignty Protocol 1113 (CSP-1113)** - The comprehensive technical framework for cyber-sovereignty operations within DBIS Cyber-Sovereign Zones, defining cryptographic specifications, validation frameworks, network architecture, security protocols, and emergency procedures.
|
||
|
|
|
||
|
|
### D
|
||
|
|
|
||
|
|
**Defense in Depth** - A security strategy employing multiple layers of security controls to protect assets.
|
||
|
|
|
||
|
|
**Digital Signature** - A mathematical scheme for verifying the authenticity of digital messages or documents.
|
||
|
|
|
||
|
|
**Distributed Ledger** - A consensus of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions.
|
||
|
|
|
||
|
|
### E
|
||
|
|
|
||
|
|
**Encryption at Rest** - The encryption of data when it is stored on disk or other storage media.
|
||
|
|
|
||
|
|
**Encryption in Transit** - The encryption of data when it is being transmitted over a network.
|
||
|
|
|
||
|
|
**Endpoint** - A device or node that is connected to a network and can communicate with other devices.
|
||
|
|
|
||
|
|
### F
|
||
|
|
|
||
|
|
**Failover** - The process of automatically switching to a redundant or standby system when the primary system fails.
|
||
|
|
|
||
|
|
**Firewall** - A network security device that monitors and filters incoming and outgoing network traffic based on security policies.
|
||
|
|
|
||
|
|
### G
|
||
|
|
|
||
|
|
**GRU Reserve System** - The foundational reserve mechanism for DBIS, maintaining reserves in multiple asset classes including gold (XAU), digital assets, and sovereign instruments, with sophisticated conversion and redemption mechanisms.
|
||
|
|
|
||
|
|
### H
|
||
|
|
|
||
|
|
**Hash Function** - A function that converts an input of arbitrary length into a fixed-size output (hash value).
|
||
|
|
|
||
|
|
**Hardware Security Module (HSM)** - A physical computing device that safeguards and manages digital keys and performs cryptographic operations.
|
||
|
|
|
||
|
|
### I
|
||
|
|
|
||
|
|
**Intrusion Detection System (IDS)** - A device or software application that monitors network or system activities for malicious activities or policy violations.
|
||
|
|
|
||
|
|
**Intrusion Prevention System (IPS)** - A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
|
||
|
|
|
||
|
|
### K
|
||
|
|
|
||
|
|
**Key Management** - The administration and control of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, and replacement.
|
||
|
|
|
||
|
|
**Key Rotation** - The process of periodically changing cryptographic keys to limit the amount of data protected by a single key.
|
||
|
|
|
||
|
|
### L
|
||
|
|
|
||
|
|
**Legal Personality** - The capacity of an entity to have rights and obligations, enter into contracts, and be subject to legal proceedings.
|
||
|
|
|
||
|
|
**Link Aggregation** - The combining of multiple network connections in parallel to increase throughput and provide redundancy.
|
||
|
|
|
||
|
|
### M
|
||
|
|
|
||
|
|
**Multi-Factor Authentication (MFA)** - An authentication method that requires the user to provide two or more verification factors to gain access.
|
||
|
|
|
||
|
|
### N
|
||
|
|
|
||
|
|
**Network Segmentation** - The practice of splitting a computer network into subnetworks, each being a network segment.
|
||
|
|
|
||
|
|
**Non-Repudiation** - The assurance that someone cannot deny the validity of something, typically a digital signature or message.
|
||
|
|
|
||
|
|
### O
|
||
|
|
|
||
|
|
**Operational Authority** - The power and responsibility to manage day-to-day operations and make operational decisions.
|
||
|
|
|
||
|
|
### P
|
||
|
|
|
||
|
|
**Perfect Forward Secrecy (PFS)** - A property of secure communication protocols in which compromise of long-term keys does not compromise past session keys.
|
||
|
|
|
||
|
|
**Point-in-Time Recovery (PITR)** - The ability to restore a database to any specific point in time, typically using transaction logs.
|
||
|
|
|
||
|
|
**Post-Quantum Cryptography** - Cryptographic algorithms that are secure against attacks by both classical and quantum computers.
|
||
|
|
|
||
|
|
### R
|
||
|
|
|
||
|
|
**Recovery Point Objective (RPO)** - The maximum acceptable amount of data loss measured in time.
|
||
|
|
|
||
|
|
**Recovery Time Objective (RTO)** - The maximum acceptable amount of time to restore a system after a failure.
|
||
|
|
|
||
|
|
**Redundancy** - The duplication of critical components or functions of a system to increase reliability.
|
||
|
|
|
||
|
|
**Reserve Ratio** - The ratio of reserves to liabilities, indicating the adequacy of reserves.
|
||
|
|
|
||
|
|
**Role-Based Access Control (RBAC)** - A method of regulating access to computer or network resources based on the roles of individual users.
|
||
|
|
|
||
|
|
### S
|
||
|
|
|
||
|
|
**Sovereign Control Council (SCC)** - The supreme governing body of DBIS, exercising all powers not specifically delegated to other bodies.
|
||
|
|
|
||
|
|
**Sovereign Immunity** - Immunity from jurisdiction and execution, protecting DBIS from legal proceedings except as explicitly waived.
|
||
|
|
|
||
|
|
**Symmetric Encryption** - A type of encryption where the same key is used for both encryption and decryption.
|
||
|
|
|
||
|
|
### T
|
||
|
|
|
||
|
|
**Trusted Platform Module (TPM)** - A specialized chip on a computer's motherboard that provides hardware-based security functions.
|
||
|
|
|
||
|
|
**Tunnel** - A method of transporting data over a network using an encapsulation protocol.
|
||
|
|
|
||
|
|
### V
|
||
|
|
|
||
|
|
**Validation Framework** - A system of procedures and checks to verify the correctness, completeness, and security of operations, particularly in cryptographic and reserve systems.
|
||
|
|
|
||
|
|
**VLAN (Virtual Local Area Network)** - A logical network segment created within a physical network to isolate traffic and improve security.
|
||
|
|
|
||
|
|
### Z
|
||
|
|
|
||
|
|
**Zero-Knowledge Proof (ZKP)** - A cryptographic method by which one party (the prover) can prove to another party (the verifier) that they know a value without revealing the value itself.
|
||
|
|
|
||
|
|
**Zero-Trust Architecture** - A security model based on the principle of "never trust, always verify," requiring verification for every access request.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## LEGAL TERMS
|
||
|
|
|
||
|
|
### C
|
||
|
|
|
||
|
|
**Constitutional Charter** - The supreme governing document establishing DBIS as a sovereign institutional entity.
|
||
|
|
|
||
|
|
### I
|
||
|
|
|
||
|
|
**Instrument of Establishment** - The formal legal document creating DBIS with legal standing.
|
||
|
|
|
||
|
|
**International Agreement** - A formal agreement between DBIS and sovereign states or international organizations.
|
||
|
|
|
||
|
|
### L
|
||
|
|
|
||
|
|
**Legal Capacity** - The ability to have rights and obligations, enter into contracts, and participate in legal proceedings.
|
||
|
|
|
||
|
|
**Legal Framework** - The system of laws, regulations, and legal principles governing DBIS operations.
|
||
|
|
|
||
|
|
### S
|
||
|
|
|
||
|
|
**Statutory Code** - The comprehensive legal framework consisting of 20 titles covering all aspects of DBIS operations, governance, and administration.
|
||
|
|
|
||
|
|
**Sovereign Status** - The legal status of DBIS as a sovereign institutional entity with sovereign immunity and treaty-making capacity.
|
||
|
|
|
||
|
|
### T
|
||
|
|
|
||
|
|
**Treaty** - A formal international agreement entered into by DBIS with sovereign states or international organizations.
|
||
|
|
|
||
|
|
**Tribunal** - The Institutional Tribunal, the judicial body of DBIS with authority to adjudicate disputes and interpret institutional documents.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## FINANCIAL TERMS
|
||
|
|
|
||
|
|
### B
|
||
|
|
|
||
|
|
**Bond** - Financial instruments issued by DBIS, including closed-loop bond systems within the GRU Reserve System.
|
||
|
|
|
||
|
|
### C
|
||
|
|
|
||
|
|
**Conversion** - The process of converting between different asset classes within the GRU Reserve System, such as XAU triangulation conversions.
|
||
|
|
|
||
|
|
### G
|
||
|
|
|
||
|
|
**Gold Reserves (XAU)** - Physical and allocated gold held as part of the GRU Reserve System.
|
||
|
|
|
||
|
|
**GRU Reserve System** - See Technical Terms section.
|
||
|
|
|
||
|
|
### R
|
||
|
|
|
||
|
|
**Reserve Adequacy** - The sufficiency of reserves to meet obligations and maintain financial stability.
|
||
|
|
|
||
|
|
**Reserve Assets** - Assets held in the GRU Reserve System, including gold (XAU), digital assets, and sovereign instruments.
|
||
|
|
|
||
|
|
**Reserve Ratio** - See Technical Terms section.
|
||
|
|
|
||
|
|
**Redemption** - The process of converting DBIS instruments or currencies back into reserve assets.
|
||
|
|
|
||
|
|
### S
|
||
|
|
|
||
|
|
**Sovereign Instruments** - Government bonds and securities held as reserve assets.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## GOVERNANCE TERMS
|
||
|
|
|
||
|
|
### A
|
||
|
|
|
||
|
|
**Articles of Governance** - The core operational and decision-making framework implementing the principles of the Constitutional Charter.
|
||
|
|
|
||
|
|
### E
|
||
|
|
|
||
|
|
**Executive Directorate** - The executive authority of DBIS responsible for implementing policies, managing day-to-day operations, and executing decisions.
|
||
|
|
|
||
|
|
### F
|
||
|
|
|
||
|
|
**Founding Member** - An original signatory of the Constitutional Charter and Instrument of Establishment.
|
||
|
|
|
||
|
|
### M
|
||
|
|
|
||
|
|
**Member** - Any entity with membership in DBIS.
|
||
|
|
|
||
|
|
**Member State** - A sovereign state that is a member of DBIS.
|
||
|
|
|
||
|
|
### S
|
||
|
|
|
||
|
|
**Sovereign Control Council (SCC)** - See Technical Terms section.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## OPERATIONAL TERMS
|
||
|
|
|
||
|
|
### B
|
||
|
|
|
||
|
|
**Business Continuity** - The capability of DBIS to continue essential functions during and after a disaster or disruption.
|
||
|
|
|
||
|
|
### C
|
||
|
|
|
||
|
|
**Compliance** - Adherence to laws, regulations, policies, and standards applicable to DBIS operations.
|
||
|
|
|
||
|
|
### E
|
||
|
|
|
||
|
|
**Emergency Procedures** - Procedures for responding to emergencies, disasters, and operational disruptions.
|
||
|
|
|
||
|
|
### O
|
||
|
|
|
||
|
|
**Operational Authority** - See Technical Terms section.
|
||
|
|
|
||
|
|
**Operational Procedures** - Detailed procedures for day-to-day operations and service delivery.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## CROSS-REFERENCES
|
||
|
|
|
||
|
|
For detailed definitions and context, refer to:
|
||
|
|
|
||
|
|
- **Constitutional Terms:** [DBIS Constitutional Charter](01_constitutional/DBIS_Constitutional_Charter.md)
|
||
|
|
- **Statutory Terms:** [Title I: General Provisions](02_statutory_code/Title_I_General_Provisions.md) - Chapter 2: Definitions
|
||
|
|
- **Technical Terms:** [CSP-1113 Technical Specification](csp_1113/CSP-1113_Technical_Specification.md)
|
||
|
|
- **Financial Terms:** [GRU Reserve System Whitepaper](gru_reserve_system/GRU_Reserve_System_Whitepaper.md)
|
||
|
|
- **Governance Terms:** [Articles of Governance](03_governance/Articles_of_Governance.md)
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## UPDATES
|
||
|
|
|
||
|
|
This glossary is maintained by the DBIS Executive Directorate and updated:
|
||
|
|
- When new terms are introduced
|
||
|
|
- When definitions are clarified or expanded
|
||
|
|
- Quarterly review for completeness
|
||
|
|
|
||
|
|
**Last Review:** [YYYY-MM-DD]
|
||
|
|
**Next Review:** [YYYY-MM-DD]
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
**END OF GLOSSARY**
|
||
|
|
|