Glossary entry

English term or phrase:

intrusion set

Czech translation:

soubor prostředků narušení

Added to glossary by Pavel Prudký
Jan 25, 2023 17:01
1 yr ago
20 viewers *
English term

intrusion set

English to Czech Tech/Engineering IT (Information Technology) cybersecurity
Kontexty: I'd also like to introduce what are simply called indicators of compromise or IOCs and this is evidence that you find in your network that you may have been compromised. Secondly, tactics, techniques and procedures or TTPs. These are the methods used by a threat actor to attempt to carry out cyber theft and these may be associated with a particular vulnerability such as phishing in the web case cross-site scripting or denial-of-service attacks. An intrusion set, as we've mentioned is the combined set of a threat actor's intentions and capabilities. And, finally, common vulnerabilities and exposures which we'll discuss which are catalogs of existing specific vulnerabilities applied to a given piece of software or resource.
--
xxx It is widely used in the cybersecurity profession in order to provide a signature for a particular threat and threat actor, which is sometimes referred to as an intrusion set
---
nebo i zde: https://lists.oasis-open.org/archives/cti/201605/msg00084.ht...

Proposed translations

1 day 19 hrs
Selected

sada (soubor) prostředků narušení

dle kontextu
Something went wrong...
4 KudoZ points awarded for this answer. Comment: "děkuji!"
Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search