Lines Matching refs:threat

63         The NIC framework deals with threat mitigation. The NIC
68 could be the potential targets of the detected threat.
69 Upon receiving the information about the threat from
72 on it and as indicated in the threat notification message.
74 TMS protocol is used for distribution and management of threat
82 to receive threat notification message from controller
85 from which it intends to receive threat messages.
88 about a threat to one or more target TIDP groups or to
91 TMS protocol messages. Upon receiving the threat
95 available in threat message. The respective action is then
98 The state of threat is set according to the result of
102 mitigation action carried out for the threat.
107 Active Threat : A threat is active on a consumer if mitigation
108 action corresponding to the threat has been enforced
111 Inactive Threat : A threat is inactive on a consumer if
112 mitigation action corresponding to the threat has been
225 "This textual convention represents the status of the threat
240 Consumer has recorded the information about the threat
251 Inactivation of threat failed.
272 that can be applied to mitigate a threat.
275 No action, threat ignored.
293 Local exception enforced for the threat.
557 -- Table for threat information
567 registered with. A threat received from one controller
568 in a TIDP group is uniquely identified by the threat id
571 A row is added to the table when a threat notification
575 the information about a threat received from a controller
585 and corresponds to the information about a threat and it's
615 consumer about the threat."
624 threat."
633 threat."
641 "This object represents the current status of the threat on
650 "This object represents the class of threat. An example of
659 "This object represents name of the threat. An example of
660 threat name is 'WittyWorm'."
668 "This object represents the duration the threat has been
678 responds to this threat. A higher value indicates a lower
679 priority for the threat and vice versa."
688 in the threat. For example,
702 threat. A threat is uniquely represented by the threat id,
706 mitigation action as a result of receiving a threat message
709 the mitigation action taken for the threat received from a
721 applied for a particular threat."
748 the consumer for a threat."
801 a particular threat mitigation action. 'OER mitigation not
815 "The application of threat mitigation is typically done on one
821 a threat message from a controller in a TIDP group.
823 mitigation action taken on a interface as a result of threat
834 which the threat mitigation action is applied."
855 for a particular threat has been successfully applied
910 consumer acts upon a particular threat and changes the state
911 of the threat.
928 mitigation action enforced for a particular threat fails.
1022 particular threat is applied."