Ossim the Web UI currently no good localization solutions, which gives a lot of users, especially beginners Ossim English is not good people, brought some trouble, here is part-Chinese comments, and continuous improvement in, we want to learn the process, help.
Alert alarm (lower level)
Alarm warning
Antivirus Antivirus (antivirus)
Antispyware Antispyware
Audit Audit
Availability Availability
Agent Agent Program
APT Advanced Persistant Threat highly persistent threats
Awareness Awareness
Authorizing Official authorized officer
Brute Force brute force, and some also called brute-force
BotNet botnet
Baseline Baseline, benchmark
Baselining Benchmarking
checksum checksum
Common Criteria Common Criteria
Compliance Compliance
Compromised damage or damage
Credential certificate
Defense in depth Defense in depth
Event Event
Event Field event field
Event record Event Logging
Correlation association
Event Correlation Event Correlation
Event Normalization events standardization
Misconfiguration found configuration errors with Ossim
(Sometimes vulnerability is caused due to the outdated agreement, but sometimes vulnerability is due to negligence or administrator configuration errors, such as running a lower version of the web server program on the firewall to open an illegal port, etc. These will create a loophole It appears.)
Network Behavioral Analysis Network Behavior Analysis
Vulnerabilities Vulnerabilities
Vulnerable Protocols fragile agreement
vulnerable network protocols vulnerable network protocol
Vulnerability Assessment Data vulnerability assessment data
Vulnerability Assessment Vulnerability Assessment referred to VA
Recognizing Attacks on the attack on the recognition of the IT Systems IT systems, whether inside or outside the network, a lot of aggressive behavior characteristics can be found in the administrator when suspicious events occur ossim notifies the administrator attention.
Exploits for the use of the word meaning, the meaning here mainly on behalf of exploits.
Viruses virus
Log Log
Logging Logging
Application debug logging debug logging application
rascal software (Rogue software) rogue software
rogue security software Rogue security software, also known as "scareware"
destination IP address destination IP address
unKnown port unknown port
Unexpected / atypical protocols accident / atypical agreement
Regulatory Compliance Compliance
Payment Card Industry Data Security Standard - PCI DSS Payment Card Industry Data Security Standard
Implement Environmental (Physical) and Operational Security Environment embodiment (including physical) and safe operation
Categorize Categories
Protect Sensitive IT Assets (Systems and Data) to protect sensitive IT assets (system and data)
Worms Worms
Ip spoofing from the outside IP spoofing from outside
Distributed Denial-of-Service (DDoS) attack Distributed Denial of Service
Buffer Overflow Buffer Overflow
SQL Injection Attacks SQL injection attacks
Individual case analysis of individual event analysis
... ...
This article comes from " Li Chenguang original technology blog " blog, be sure to keep this source http://chenguang.blog.51cto.com/350944/1633497
Reproduced in: https: //my.oschina.net/chenguang/blog/613910