Glossary entry (derived from question below)
English term or phrase:
intrusion set
Czech translation:
soubor prostředků narušení
Added to glossary by
Pavel Prudký
Jan 25, 2023 17:01
1 yr ago
20 viewers *
English term
intrusion set
English to Czech
Tech/Engineering
IT (Information Technology)
cybersecurity
Kontexty: I'd also like to introduce what are simply called indicators of compromise or IOCs and this is evidence that you find in your network that you may have been compromised. Secondly, tactics, techniques and procedures or TTPs. These are the methods used by a threat actor to attempt to carry out cyber theft and these may be associated with a particular vulnerability such as phishing in the web case cross-site scripting or denial-of-service attacks. An intrusion set, as we've mentioned is the combined set of a threat actor's intentions and capabilities. And, finally, common vulnerabilities and exposures which we'll discuss which are catalogs of existing specific vulnerabilities applied to a given piece of software or resource.
--
xxx It is widely used in the cybersecurity profession in order to provide a signature for a particular threat and threat actor, which is sometimes referred to as an intrusion set
---
nebo i zde: https://lists.oasis-open.org/archives/cti/201605/msg00084.ht...
--
xxx It is widely used in the cybersecurity profession in order to provide a signature for a particular threat and threat actor, which is sometimes referred to as an intrusion set
---
nebo i zde: https://lists.oasis-open.org/archives/cti/201605/msg00084.ht...
Proposed translations
(Czech)
3 | sada (soubor) prostředků narušení | Jaroslav Suchánek |
Proposed translations
1 day 19 hrs
Selected
sada (soubor) prostředků narušení
dle kontextu
4 KudoZ points awarded for this answer.
Comment: "děkuji!"
Something went wrong...