Skip to content

Commit cdf1369

Browse files
committed
Updated Data Glossary contents
1 parent c91eea4 commit cdf1369

File tree

1 file changed

+38
-26
lines changed

1 file changed

+38
-26
lines changed

docs/index.html

Lines changed: 38 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ <h3 class="text-lg font-semibold flex items-center gap-2">
194194
<span class="px-2 bg-orange-100 text-orange-800 rounded-full">UNKNOWN</span> - URL status is uncertain.
195195
</li>
196196
<li>
197-
<span class="px-2 bg-gray-100 text-gray-800 rounded-full">UNDER REVIEW</span> - Investigation is ongoing. (Not in use)
197+
<span class="px-2 bg-gray-100 text-gray-800 rounded-full">UNDER REVIEW</span> - Investigation is ongoing.
198198
</li>
199199
</ul>
200200
</div>
@@ -208,85 +208,97 @@ <h3 class="text-lg font-semibold flex items-center gap-2">
208208
<b>Charts provide a visual representation of attack patterns.</b>
209209
</li>
210210
<li>
211-
<span class="font-medium">Attack Methods:</span> Breakdown of attack techniques used.
211+
<span class="font-medium">Attack Methods Distribution:</span> Breakdown of techniques used by attackers.
212212
</li>
213213
<li>
214214
<span class="font-medium">Attacks Over Time:</span> Historical trend analysis of attack frequency.
215215
</li>
216216
<li>
217-
<span class="font-medium">Targeted Platforms:</span> Most affected applications and services.
217+
<span class="font-medium">Attack Surfaces:</span> Platforms and applications targeted by attacks.
218218
</li>
219219
<li>
220-
<span class="font-medium">Behavior Types:</span> Classification of common malicious behaviors.
220+
<span class="font-medium">Suspected Regions of Origin:</span> Geographical sources of attacks.
221+
</li>
222+
<li>
223+
<span class="font-medium">Behaviour Types Distribution:</span> Classification of malicious behaviors.
221224
</li>
222225
</ul>
223226
</div>
224-
<!-- URL Status Definitions -->
227+
<!-- Additional Charts Definitions -->
225228
<div>
226229
<p class="font-medium mb-2 text-indigo-600">
227-
<b>URL Status Comparison:</b>
230+
<b>Additional Charts:</b>
228231
</p>
229232
<ul class="space-y-2">
230233
<li>
231-
<b>Comparison of URL threat statuses based on detected risks.</b>
234+
<b>These charts provide deeper insights into attack characteristics.</b>
232235
</li>
233236
<li>
234-
<span class="font-medium">Attack Goals:</span> Intent behind identified cyber threats.
237+
<span class="font-medium">URL Status Comparison:</span> Distribution of URL threat statuses.
235238
</li>
236239
<li>
237-
<span class="font-medium">Compromised Accounts:</span> Categorization of affected accounts.
240+
<span class="font-medium">Attack Goal Distribution:</span> Objectives behind identified threats.
238241
</li>
239242
<li>
240-
<span class="font-medium">Method vs. Goal:</span> Relationship between attack type and objective.
243+
<span class="font-medium">Compromised Account Status:</span> Current state of affected accounts.
241244
</li>
242245
<li>
243-
<span class="font-medium">Resolution Status:</span> Final determination of detected URLs.
246+
<span class="font-medium">Method vs Goal Matrix:</span> Relationship between attack methods and objectives.
247+
</li>
248+
<li>
249+
<span class="font-medium">Attack Vectors Analysis:</span> Entry points exploited by attackers.
244250
</li>
245251
</ul>
246252
</div>
247-
<!-- Database Field Definitions -->
253+
<!-- Data Table Information -->
248254
<div>
249255
<p class="font-medium mb-2 text-indigo-600">
250-
<b>Database Fields Overview:</b>
256+
<b>Detailed Data Table:</b>
251257
</p>
252258
<ul class="space-y-2">
253259
<li>
254-
<b>Database fields store detailed records of detected threats.</b>
260+
<b>The table provides comprehensive records of individual cases.</b>
255261
</li>
256262
<li>
257-
<span class="font-medium">DISCORD_ID:</span> Unique identifier for the compromised user.
263+
<span class="font-medium">Found On:</span> Date when the threat was identified.
258264
</li>
259265
<li>
260-
<span class="font-medium">USERNAME:</span> Name associated with the detected account.
266+
<span class="font-medium">Username:</span> Affected user's display name.
261267
</li>
262268
<li>
263-
<span class="font-medium">ATTACK_METHOD:</span> Technique used for account compromise.
269+
<span class="font-medium">Attack Method:</span> Technique used in the compromise.
264270
</li>
265271
<li>
266-
<span class="font-medium">ATTACK_GOAL:</span> Purpose behind the attack, such as credential theft.
272+
<span class="font-medium">Target:</span> Platform or service being targeted.
273+
</li>
274+
<li>
275+
<span class="font-medium">Status:</span> Current threat status (Active/Inactive/Unknown).
267276
</li>
268277
</ul>
269278
</div>
270-
<!-- Technical Definitions -->
279+
<!-- Usage and Features -->
271280
<div>
272-
<p class="font-large mb-2 text-indigo-600">
273-
<b>Technical Details:</b>
281+
<p class="font-medium mb-2 text-indigo-600">
282+
<b>Dashboard Features:</b>
274283
</p>
275284
<ul class="space-y-2">
276285
<li>
277-
<b>Detailed description of the technologies and protocols involved in the attack analysis.</b>
286+
<b>The dashboard offers several interactive features to analyze the data.</b>
287+
</li>
288+
<li>
289+
<span class="font-medium">Search:</span> Find specific entries by username, behavior, or attack method.
278290
</li>
279291
<li>
280-
<span class="font-medium">Malware Signature:</span> Unique identifiers for malicious files or software.
292+
<span class="font-medium">Filters:</span> Narrow results by attack method or date range.
281293
</li>
282294
<li>
283-
<span class="font-medium">IP Addresses:</span> Identified malicious IP addresses involved in the attack.
295+
<span class="font-medium">Interactive Charts:</span> Click datapoints to switch views or hover for details.
284296
</li>
285297
<li>
286-
<span class="font-medium">Network Protocols:</span> Communication protocols used in the attack.
298+
<span class="font-medium">Export Data:</span> Download the filtered results as a CSV file.
287299
</li>
288300
<li>
289-
<span class="font-medium">Geolocation Data:</span> Physical location of identified attack sources.
301+
<span class="font-medium">Detailed View:</span> Click on table actions to see comprehensive case details.
290302
</li>
291303
</ul>
292304
</div>

0 commit comments

Comments
 (0)