OSSIM learning - English-Chinese comments

Ossim the Web UI currently no good localization solutions, which gives a lot of users, especially beginners Ossim English is not good people, brought some trouble, here is part-Chinese comments, and continuous improvement in, we want to learn the process, help.

 

Alert alarm (lower level)

Alarm warning

Antivirus Antivirus (antivirus)

Antispyware Antispyware

Audit Audit

Availability Availability

Agent Agent Program

APT Advanced Persistant Threat highly persistent threats

Awareness Awareness

Authorizing Official authorized officer

Brute Force brute force, and some also called brute-force

BotNet botnet

Baseline Baseline, benchmark

Baselining Benchmarking

checksum checksum

Common Criteria Common Criteria

Compliance Compliance

Compromised damage or damage

Credential certificate

 

Defense in depth Defense in depth

Event Event

Event Field event field

Event record Event Logging

Correlation association

Event Correlation Event Correlation

Event Normalization events standardization

Misconfiguration found configuration errors with Ossim

(Sometimes vulnerability is caused due to the outdated agreement, but sometimes vulnerability is due to negligence or administrator configuration errors, such as running a lower version of the web server program on the firewall to open an illegal port, etc. These will create a loophole It appears.)

Network Behavioral Analysis Network Behavior Analysis

Vulnerabilities Vulnerabilities

Vulnerable Protocols fragile agreement

vulnerable network protocols vulnerable network protocol

Vulnerability Assessment Data vulnerability assessment data

Vulnerability Assessment Vulnerability Assessment referred to VA

Recognizing Attacks on the attack on the recognition of the IT Systems IT systems, whether inside or outside the network, a lot of aggressive behavior characteristics can be found in the administrator when suspicious events occur ossim notifies the administrator attention.

Exploits for the use of the word meaning, the meaning here mainly on behalf of exploits.

Viruses virus

Log Log

Logging Logging

Application debug logging debug logging application

rascal software (Rogue software) rogue software

rogue security software Rogue security software, also known as "scareware"

destination IP address destination IP address

unKnown port unknown port

Unexpected / atypical protocols accident / atypical agreement

Regulatory Compliance Compliance

Payment Card Industry Data Security Standard - PCI DSS Payment Card Industry Data Security Standard

Implement Environmental (Physical) and Operational Security Environment embodiment (including physical) and safe operation

Categorize Categories

Protect Sensitive IT Assets (Systems and Data) to protect sensitive IT assets (system and data)

Worms Worms

Ip spoofing from the outside IP spoofing from outside

Distributed Denial-of-Service (DDoS) attack Distributed Denial of Service

Buffer Overflow Buffer Overflow

SQL Injection Attacks SQL injection attacks

Individual case analysis of individual event analysis

 

... ...

This article comes from " Li Chenguang original technology blog " blog, be sure to keep this source http://chenguang.blog.51cto.com/350944/1633497

Reproduced in: https: //my.oschina.net/chenguang/blog/613910

Guess you like

Origin blog.csdn.net/weixin_34342905/article/details/92045188