chg: [taxonomy] add reset scope - configuration type Fix #2
parent
8e800759a3
commit
c4375fe723
|
@ -2,7 +2,7 @@
|
||||||
"namespace": "cycat",
|
"namespace": "cycat",
|
||||||
"expanded": " Cybersecurity Resource Catalogue",
|
"expanded": " Cybersecurity Resource Catalogue",
|
||||||
"description": "Taxonomy used by CyCAT, the Cybersecurity Resource Catalogue, to categorize the namespaces it supports and uses.",
|
"description": "Taxonomy used by CyCAT, the Cybersecurity Resource Catalogue, to categorize the namespaces it supports and uses.",
|
||||||
"version": 2,
|
"version": 3,
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.cycat.org/"
|
"https://www.cycat.org/"
|
||||||
],
|
],
|
||||||
|
@ -64,6 +64,11 @@
|
||||||
"value": "dataformat",
|
"value": "dataformat",
|
||||||
"expanded": "Data format",
|
"expanded": "Data format",
|
||||||
"description": "Data structure and format to describe elements in the cybersecurity field."
|
"description": "Data structure and format to describe elements in the cybersecurity field."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "configuration",
|
||||||
|
"expanded": "Configuration",
|
||||||
|
"description": "A configuration describes the state or environment conditions of a tool."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -102,6 +107,10 @@
|
||||||
"value": "train",
|
"value": "train",
|
||||||
"expanded": "Train"
|
"expanded": "Train"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"value": "reset",
|
||||||
|
"expanded": "Reset"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"value": "test",
|
"value": "test",
|
||||||
"expanded": "Test"
|
"expanded": "Test"
|
||||||
|
|
|
@ -3,7 +3,7 @@ namespace: cycat
|
||||||
expanded: " Cybersecurity Resource Catalogue"
|
expanded: " Cybersecurity Resource Catalogue"
|
||||||
description: Taxonomy used by CyCAT, the Cybersecurity Resource Catalogue, to categorize
|
description: Taxonomy used by CyCAT, the Cybersecurity Resource Catalogue, to categorize
|
||||||
the namespaces it supports and uses.
|
the namespaces it supports and uses.
|
||||||
version: 2
|
version: 3
|
||||||
refs:
|
refs:
|
||||||
- https://www.cycat.org/
|
- https://www.cycat.org/
|
||||||
values:
|
values:
|
||||||
|
@ -56,6 +56,10 @@ values:
|
||||||
expanded: Data format
|
expanded: Data format
|
||||||
description: Data structure and format to describe elements in the cybersecurity
|
description: Data structure and format to describe elements in the cybersecurity
|
||||||
field.
|
field.
|
||||||
|
- value: configuration
|
||||||
|
expanded: Configuration
|
||||||
|
description: A configuration describes the state or environment conditions of
|
||||||
|
a tool.
|
||||||
- predicate: scope
|
- predicate: scope
|
||||||
entry:
|
entry:
|
||||||
- value: identify
|
- value: identify
|
||||||
|
@ -74,6 +78,8 @@ values:
|
||||||
expanded: Investigate
|
expanded: Investigate
|
||||||
- value: train
|
- value: train
|
||||||
expanded: Train
|
expanded: Train
|
||||||
|
- value: reset
|
||||||
|
expanded: Reset
|
||||||
- value: test
|
- value: test
|
||||||
expanded: Test
|
expanded: Test
|
||||||
predicates:
|
predicates:
|
||||||
|
|
Loading…
Reference in New Issue