Sealing Element

Sealing Element

Definition(s)


Sealing Element

Device preventing passage (i.e. communication) of liquid and/or gas across the interface in which it is placed.

Source:API SPECIFICATION 19TT, Specification for Downhole Well Test Tools and Related Equipment, First Edition, October 2016. Global Standards
Sampler Carriers

Sampler Carriers

Definition(s)


Sampler Carriers

Tool used to convey fluid samplers downhole.

Source:API SPECIFICATION 19TT, Specification for Downhole Well Test Tools and Related Equipment, First Edition, October 2016. Global Standards
Safety Joint

Safety Joint

Definition(s)


Safety Joint

A device to allow an intentional controlled separation of the work string or bottomhole assembly (BHA). Source:API SPECIFICATION 19TT, Specification for Downhole Well Test Tools and Related Equipment, First Edition, October 2016. Global Standards
Stress Relaxation

Stress Relaxation

Definition(s)


Stress Relaxation

The time-dependent reduction in stress of a component when subjected to a constant strain (see creep). Source:API SPECIFICATION 7K, Drilling and Well Servicing Equipment, Sixth Edition, December 2015. Global Standards
Slip Bowls

Slip Bowls

Definition(s)


Slip Bowls

A cylindrical body with a tapered inner surface, either one piece or segmented, that supports the slips.

Source:API SPECIFICATION 7K, Drilling and Well Servicing Equipment, Sixth Edition, December 2015. Global Standards
Shorebase

Shorebase

Definition(s)


Shorebase

The place an employee reports to before being transported to the offshore facility.

Source:API RP T-1, Creating Orientation Programs for Personnel Going Offshore, Fifth Edition, November 2016. Global Standards
SSID

SSID

Definition(s)


SSID

Service Set Identifier. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
SDLC

SDLC

Definition(s)


SDLC

Software Development Life-cycle. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Scam

Scam

Definition(s)


Scam

Fraud or confidence trick. Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards
Security Implementation Standard

Security Implementation Standard

Definition(s)


Security Implementation Standard

Document specifying authorized ways for realizing security. Source: ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary, Third Edition, January 2014. Global Standards
Scale

Scale

Definition(s)


Scale

Ordered set of values, continuous or discrete, or a set of categories to which the attribute is mapped. [SOURCE: ISO/IEC 15939:2007]
  • Note 1 to entry: The type of scale depends on the nature of the relationship between values on the scale. Four types of scale are commonly defined:
    • nominal: the measurement values are categorical;
    • ordinal: the measurement values are rankings;
    • interval: the measurement values have equal distances corresponding to equal quantities of the attribute;
    • ratio: the measurement values have equal distances corresponding to equal quantities of the attribute, where
    • the value of zero corresponds to none of the attribute.
These are just examples of the types of scale. Source: ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary, Third Edition, January 2014. Global Standards
Subjective Probability

Subjective Probability

Definition(s)


Subjective Probability

Interpretation or estimate of probability as a personal judgment or ―degree of belief‖ about how likely a particular event is to occur, based on the state of knowledge and available evidence Sample Usage: Analysts use their knowledge of terrorist strategies, objectives, and capabilities in combination with evidence from operations to estimate a subjective probability of 10 percent for an attack to occur within the next five years. Annotation:
  1. Like all probabilities, subjective probability is conventionally expressed on a scale from zero to one where zero indicates the event is impossible and one indicates the event has or certainly will occur.
  2. Within the subjective probability interpretation, it is possible to estimate probabilities of events (using experts or models) that have not previously occurred or that have only rarely occurred, such as acts of terrorism. However, because subjective probabilities incorporate historical or trial data when available, the subjective probability will approximate the frequentist probability as data becomes more plentiful.
  3. Subjective probability is currently one of the most common uses of probability among statisticians and the risk analysis community.
  4. Bayesian probability is colloquially used as a synonym for subjective probability. In statistical usage, Bayesian probabilistic inference is an approach to statistical inference that employs Bayes’ theorem to revise prior information using evidence.
Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Subject Matter Expert ω:

Subject Matter Expert ω:

Definition(s)


Subject Matter Expert ω:

Individual with in-depth knowledge in a specific area or field. Sample Usage: A subject matter expert was consulted to inform team members on improvised nuclear devices. Annotation: Structured techniques for the elicitation of expert judgment are key tools for risk assessment. Subject matter experts are also used to supplement empirical data when needed, or to provide input on specialized subject areas for the purposes of designing and executing risk assessments. Frequently abbreviated as SME. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Strategic Risk

Strategic Risk

Definition(s)


Strategic Risk

Risk that affects an entity’s vital interests or execution of chosen strategy, whether imposed by external threats or arising from flawed or poorly implemented strategy. Sample Usage: An analysis of the organization's strategic risk considered threats to carrying out its essential mission functions. Annotation:
  1. Managing strategic risk is associated with the ability to recognize future trends, challenges, and threats and match these with appropriate operational concepts, capabilities, competencies, and capacity.
  2. Strategic risk can arise from three basic sources. First, strategic risk can arise from the actions of adversaries, from natural hazards or from non-adversarial human actions, such as accidents. These can be thought of as imposed risks. Second, strategic risk can be created by the unintended consequences of the strategies we adopt in response to imposed risks. These can be thought of as self-imposed risks. Finally, strategic risk can arise from obstacles to successful implementation of an adopted strategy. These obstacles can be either imposed (e.g., the actions of an adaptive adversary to counter a security measure or to exploit an unintended vulnerability created by a security measure) or self-imposed (e.g., failure to adequately resource, or to prematurely abandon, a strategy or course of action that would otherwise be beneficial.
Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Strategic Foresight

Strategic Foresight

Definition(s)


Strategic Foresight

Range of activities associated with longer range planning and alternative futures analysis. Sample Usage: The organization’s strategic foresight initiative called for horizon scanning and analysis of the long-term implications of security policies. Annotation: Strategic foresight can be applied to activities such as scenario development, critical thinking and brainstorming about long-term trends, Delphi sessions, workshops, trend analysis and gaming (or "war-gaming"). Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Simulation

Simulation

Definition(s)


Simulation

Model that behaves or operates like a given process, concept, or system when provided a set of controlled inputs Sample Usage: The scientists designed a simulation to see how weather affected the plume of smoke. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Social Amplification of Risk

Social Amplification of Risk

Definition(s)


Social Amplification of Risk

Distortion of the seriousness of a risk caused by public concern about the risk and/or about an activity contributing to the risk. Sample Usage: Social amplification of risk can result in public concern with an otherwise insignificant risk. Annotation:
  1. Describes the phenomenon by which hazards interact with psychological, social, institutional, and cultural processes in ways that may amplify or attenuate the public's perceived level of risk.
  2. The social amplification of risk phenomenon is the subject of a field of study that seeks to systematically link the technical assessment of risk with sociological perspectives of risk perception and risk-related behavior.
Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Semi-quantitative Risk Assessment Methodology

Semi-quantitative Risk Assessment Methodology

Definition(s)


Semi-quantitative Risk Assessment Methodology

Set of methods, principles, or rules to assess risk that uses bins, scales, or representative numbers whose values and meanings are not maintained in other contexts Sample Usage: By giving the "low risk, "medium risk," and "high risk" categories corresponding numerical values, the assessor used a semi-quantitative risk assessment methodology. Annotation: While numbers may be used in a semi-quantitative methodology, the values are not applicable outside of the methodology, and numerical results from one methodology cannot be compared with those from other methodologies. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Secondary Consequence

Secondary Consequence

Definition(s)


Secondary Consequence

Effect that is not a direct consequence of an event, incident, or occurrence, but is caused by a direct consequence, subsequent cascading effects, and/or related decisions. Sample Usage: The secondary consequence of a terrorist threat on a subway could be the decreased use of public transportation over time. Annotation:
  1. Examples of indirect consequences can include the enactment of new laws, policies, and risk mitigation strategies or investments, contagion health effects, supply-chain economic consequences, reductions in property values, stock market effects, and long-term cleanup efforts,
  2. Accounting for indirect consequences in risk assessments is important because they may have greater and longer-lasting effects than the direct consequences.
  3. Indirect consequences are also sometimes referred to as ripple, multiplier, general equilibrium, macroeconomic, secondary, and tertiary effects.
  4. The distinction between direct and indirect consequences is not always clear but what matters in risk analysis is a) capturing the likely effects – be they designated as direct or indirect – that should be part of the analysis, b) clearly defining what is contained as part of direct consequences and what is part of indirect consequences, and c) being consistent across the entire analysis. Such consistency and clarity is important for comparability across scenarios and risk analyses.
  5. Induced consequences are occasionally estimated separately from indirect consequences but should be contained within indirect estimates.
Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Scenario (risk)

Scenario (risk)

Definition(s)


Scenario (risk)

Hypothetical situation comprised of a hazard, an entity impacted by that hazard, and associated conditions including consequences when appropriate. Sample Usage: The team designed a scenario involving a terrorist attack at a plant to help assess the risk of certain types of terrorist attacks. Annotation: A scenario can be created and used for the purposes of training, exercise, analysis, or modeling as well as for other purposes. A scenario that has occurred or is occurring is an incident. Source: DHS Risk Lexicon, U.S. Department of Homeland Security, 2010 Edition. September 2010 Regulatory Guidance
Symbol “X”

Symbol “X”

Definition(s)


Symbol "X"

Symbol used to denote specific conditions of use. Source: IEC 60079-19:2015, Explosive atmospheres – Part 19: Equipment repair, overhaul and reclamation, Edition 3.1, March 2015. Global Standards
Serviceable Condition

Serviceable Condition

Definition(s)


Serviceable Condition

Permits a replacement or reclaimed component part to be used without prejudice to the performance or explosion protection aspects of the equipment, with due regard to the requirements of the certificate documentation as applicable, in which such a component part is used. Source: IEC 60079-19:2015, Explosive atmospheres – Part 19: Equipment repair, overhaul and reclamation, Edition 3.1, March 2015. Global Standards
Skilled Personnel

Skilled Personnel

Definition(s)


Skilled Personnel

Persons whose training has included instruction on the various types of protection and installation practices, the requirements of this standard, the relevant national regulations/company rules applicable to the installation and on the general principles of area classification. Source: IEC 60079-17:2013, Explosive atmospheres – Part 17: Electrical installations inspection and maintenance, Edition 5.0, November 2013. Global Standards
Sample Inspection

Sample Inspection

Definition(s)


Sample Inspection

Inspection of a representative proportion of the electrical equipment, systems and installations. Source: IEC 60079-17:2013, Explosive atmospheres – Part 17: Electrical installations inspection and maintenance, Edition 5.0, November 2013. Global Standards
Safety Extra-low Voltage System (SELV)

Safety Extra-low Voltage System (SELV)

Definition(s)


Safety Extra-low Voltage System (SELV)

Electric system in which the voltage cannot exceed the value of extra-low voltage:
  • under normal conditions and
  • under single fault conditions, including earth faults in other electric circuits.
Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Type of Protection “n”

Type of Protection “n”

Definition(s)


Type of Protection “n”

Type of protection applied to electrical equipment such that, in normal operation and in certain specified abnormal conditions, it is not capable of igniting a surrounding explosive atmosphere. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
System, Intrinsically Safe

System, Intrinsically Safe

Definition(s)


System, Intrinsically Safe

An assembly of interconnected intrinsically safe apparatus, associated apparatus, and interconnecting cables in which those parts of the system that may be used in hazardous (classified) locations are intrinsically safe circuits. An intrinsically safe system may include more than one intrinsically safe circuit. Source: API Recommended Practice 14FZ, Recommended Practice for Design, Installation, and Maintenance of Electrical Systems for Fixed and Floating Offshore Petroleum Facilities for Unclassified and Class I, Zone 0, Zone 1, and Zone 2 Locations, Second Edition, May 2013. Global Standards Source: API RP 14F, Design, Installation, and Maintenance of Electrical Systems for Fixed and Floating Offshore Petroleum Facilities for Unclassified and Class 1, Division 1 and Division 2 Locations, Fifth Edition, July 2008. Global Standards
Simple Apparatus

Simple Apparatus

Definition(s)


Simple Apparatus

A device that will not generate or store more than 1.2 V, 0.1 A, 25 mW, or 20 ìJ. Examples are switches, thermocouples, light-emitting diodes, connectors, and resistance temperature detectors (RTDs). Apparatus reliant on voltage or current limiting or suppression devices for remaining within the limits given in the definition, and sensors (e.g. certain gas detector sensors) that utilize catalytic reaction or other electrochemical mechanisms are excluded by IEC 60079-11 from the category of “simple apparatus”. Temperature limitations as described in 4.2 are applicable to simple apparatus.

Source: API Recommended Practice 14FZ, Recommended Practice for Design, Installation, and Maintenance of Electrical Systems for Fixed and Floating Offshore Petroleum Facilities for Unclassified and Class I, Zone 0, Zone 1, and Zone 2 Locations, Second Edition, May 2013. Global Standards

Simple Apparatus

Electrical component or combination of components of simple construction with well-defined electrical parameters which is compatible with the intrinsic safety or energy-limited safety of the circuit in which it is used. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Starting Current Ratio (IA/IN)

Starting Current Ratio (IA/IN)

Definition(s)


Starting Current Ratio (IA/IN)

Ratio between initial starting current IA and rated current IN. Source: IEC 60079-14:2013, Explosive atmospheres – Part 14: Electrical installations design, selection and erection, Edition 5.0, November 2013. Global Standards
Systems Security Architecture

Systems Security Architecture

Definition(s)


Systems Security Architecture

In the NICE Workforce Framework, cybersecurity work where a person: Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes. From: NICE Workforce Framework. Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards