Update machinetag.json

pull/201/head
Freddy Dezeure 2021-01-30 06:51:09 +01:00 committed by GitHub
parent 1563642c4b
commit 4b82598056
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 6 deletions

View File

@ -26,9 +26,9 @@
"description": "Cybersecurity taxonomy is a set of labels used to classify (in both terms - arrange in classes or/and design to national classification) cybersecurity related information." "description": "Cybersecurity taxonomy is a set of labels used to classify (in both terms - arrange in classes or/and design to national classification) cybersecurity related information."
}, },
{ {
"value": "ruleset", "value": "rule",
"expanded": "Ruleset", "expanded": "Rule",
"description": "Set of detection rules used in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, SIGMA or YARA) or any other tool capable of parsing them." "description": "Detection rule or set of detection rules used in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, SIGMA or YARA) or any other tool capable of parsing them."
}, },
{ {
"value": "notebook", "value": "notebook",
@ -51,9 +51,9 @@
"description": "Code to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm or favicon-mmh3." "description": "Code to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm or favicon-mmh3."
}, },
{ {
"value": "policy", "value": "control",
"expanded": "Policy", "expanded": "Control",
"description": "Public or non-public policy used in organisation's risk management practices." "description": "Mitigating control used to prevent unwanted activity from happening, like specific a configuration of the operating system/tools or an implementation policy."
} }
] ]
}, },