Merge pull request #198 from CyCat-project/main

Better wording
pull/202/head
Alexandre Dulaunoy 2021-01-15 11:45:37 +01:00 committed by GitHub
commit 14c60342d2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 20 additions and 20 deletions

View File

@ -1,7 +1,7 @@
{ {
"namespace": "cycat", "namespace": "cycat",
"expanded": " Universal Cybersecurity Resource Catalogue", "expanded": " Universal Cybersecurity Resource Catalogue",
"description": "Taxonomy used by cycat (Universal Cybersecurity Resource Catalogue) to categorize namespaces available in their cybersecurity catalogue.", "description": "Taxonomy used by CyCAT, the Universal Cybersecurity Resource Catalogue, to categorize the namespaces it supports and uses.",
"version": 1, "version": 1,
"refs": [ "refs": [
"https://www.cycat.org/" "https://www.cycat.org/"
@ -13,12 +13,12 @@
{ {
"value": "tool", "value": "tool",
"expanded": "Tool", "expanded": "Tool",
"description": "Cybersecurity tool is an open source or proprietaty tool used in the cybersecurity scope." "description": "Open source or proprietary tool used in cybersecurity."
}, },
{ {
"value": "playbook", "value": "playbook",
"expanded": "Playbook", "expanded": "Playbook",
"description": "Cybersecurity playbook such as a defined set of rules with one or more actions triggered by different events to respond to, orchestrate or automate cybersecurity related actions." "description": "Playbook, such as a defined set of rules with one or more actions triggered by different events to respond to, orchestrate or automate cybersecurity related actions."
}, },
{ {
"value": "taxonomy", "value": "taxonomy",
@ -28,27 +28,27 @@
{ {
"value": "ruleset", "value": "ruleset",
"expanded": "Ruleset", "expanded": "Ruleset",
"description": "Cybersecurity rulesets are rules used for detection in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, Sigma, Yara format) or any other tool capable of parsing such a ruleset." "description": "Set of detection rules used in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, SIGMA or YARA) or any other tool capable of parsing them."
}, },
{ {
"value": "notebook", "value": "notebook",
"expanded": "Notebook", "expanded": "Notebook",
"description": "Cybersecurity notebook is an interactive document to code, experiment, train or visualize cybersecurity related information. A notebook can be transcribed in a format such as Jupyter Notebooks, Apache Zeppelin, Google Colab." "description": "Interactive document to code, experiment, train or visualize cybersecurity-related information. A notebook can be transcribed in a format such as Jupyter Notebooks, Apache Zeppelin, Pluton or Google Colab."
}, },
{ {
"value": "vulnerability", "value": "vulnerability",
"expanded": "Vulnerability", "expanded": "Vulnerability",
"description": "Vulnerability is a known (public or non-public) information about a security vulnerability in a specific software, hardware or service." "description": "Public or non-public information about a security vulnerability in a specific software, hardware or service."
}, },
{ {
"value": "proof-of-concept", "value": "proof-of-concept",
"expanded": "Proof-of-concept", "expanded": "Proof-of-concept",
"description": "Cybersecurity proof-of-concept is a validation code to a known vulnerability." "description": "Code to validate a known vulnerability."
}, },
{ {
"value": "fingerprint", "value": "fingerprint",
"expanded": "Fingerprint", "expanded": "Fingerprint",
"description": "Cybersecurity fingerprints are codes to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm, favicon-mmh3." "description": "Code to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm or favicon-mmh3."
} }
] ]
}, },
@ -60,32 +60,32 @@
"expanded": "Identify" "expanded": "Identify"
}, },
{ {
"value": "protection", "value": "protect",
"expanded": "Protection" "expanded": "Protect"
}, },
{ {
"value": "detection", "value": "detect",
"expanded": "Detection" "expanded": "Detect"
}, },
{ {
"value": "response", "value": "respond",
"expanded": "Response" "expanded": "Respond"
}, },
{ {
"value": "recover", "value": "recover",
"expanded": "Recover" "expanded": "Recover"
}, },
{ {
"value": "exploitation", "value": "exploit",
"expanded": "Exploitation" "expanded": "Exploit"
}, },
{ {
"value": "investigation", "value": "investigate",
"expanded": "Investigation" "expanded": "Investigate"
}, },
{ {
"value": "training", "value": "train",
"expanded": "Training" "expanded": "Train"
} }
] ]
} }