-
Notifications
You must be signed in to change notification settings - Fork 269
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'develop' into feature/cset-2572
- Loading branch information
Showing
15 changed files
with
300 additions
and
382 deletions.
There are no files selected for viewing
144 changes: 0 additions & 144 deletions
144
CSETWebApi/CSETWeb_Api/CSETWebCore.Business/App_Data/LanguagePacks/UK/CATEGORIES.json
This file was deleted.
Oops, something went wrong.
22 changes: 4 additions & 18 deletions
22
CSETWebApi/CSETWeb_Api/CSETWebCore.Business/App_Data/LanguagePacks/UK/GENERIC.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,20 +1,6 @@ | ||
{ | ||
"pairs": [ | ||
{ | ||
"key": "overall", | ||
"value": "Загалом" | ||
}, | ||
{ | ||
"key": "standards", | ||
"value": "Стандарти" | ||
}, | ||
{ | ||
"key": "default exec summ", | ||
"value": "[UK]Cyber terrorism is a real and growing threat. Standards and guides have been developed, vetted, and widely accepted to assist with protection from cyber attacks. The Cyber Security Evaluation Tool (CSET) includes a selectable array of these standards for a tailored assessment of cyber vulnerabilities. Once the standards were selected and the resulting question sets answered, the CSET created a compliance summary, compiled variance statistics, ranked top areas of concern, and generated security recommendations." | ||
}, | ||
{ | ||
"key": "default assessment name", | ||
"value": "Нова оцінка" | ||
} | ||
] | ||
"overall": "Загалом", | ||
"standards": "Стандарти", | ||
"default exec summ": "[UK]Cyber terrorism is a real and growing threat. Standards and guides have been developed, vetted, and widely accepted to assist with protection from cyber attacks. The Cyber Security Evaluation Tool (CSET) includes a selectable array of these standards for a tailored assessment of cyber vulnerabilities. Once the standards were selected and the resulting question sets answered, the CSET created a compliance summary, compiled variance statistics, ranked top areas of concern, and generated security recommendations.", | ||
"default assessment name": "Нова оцінка" | ||
} |
30 changes: 30 additions & 0 deletions
30
CSETWebApi/CSETWeb_Api/CSETWebCore.Business/App_Data/LanguagePacks/UK/STANDARD_CATEGORY.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
{ | ||
"detect": "Виявляти", | ||
"govern": "Керувати", | ||
"identify": "Ідентифікувати", | ||
"protect": "Захищати", | ||
"recover": "Відновити", | ||
"respond": "Відповісти", | ||
"access control": "Управління доступом", | ||
"analysis": "Аналіз", | ||
"anomalies and events": "Аномалії та події", | ||
"asset management": "Управління активами", | ||
"awareness and training": "Обізнаність і навчання", | ||
"business environment": "Бізнес середовище", | ||
"data security": "Безпека даних", | ||
"detection processes": "Процеси виявлення", | ||
"governance": "Управління", | ||
"improvements": "Покращення", | ||
"information protection processes and procedures": "Процеси та процедури захисту інформації", | ||
"maintenance": "Технічне обслуговування", | ||
"mitigation": "Пом'якшення", | ||
"protective technology": "Захисна техніка", | ||
"recovery communications": "Відновлення комунікацій", | ||
"recovery planning": "Планування відновлення", | ||
"response communications": "Комунікації у відповідь", | ||
"response planning": "Планування реагування", | ||
"risk assessment": "Оцінка ризиків", | ||
"risk management": "Управління ризиками", | ||
"risk management strategy": "Стратегія управління ризиками", | ||
"security continuous monitoring": "Постійний моніторинг безпеки" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.