[{"data":1,"prerenderedAt":518},["ShallowReactive",2],{"page-data-security_incident-zh":3,"categories-security_incident-search-data-zh":39,"markdown-security_incident-main-zh":515,"data-sources-zh--security_incident-security_incident":516,"tags-zh--security_incident-security_incident":517},{"dataTypes":4,"versionsMap":22,"activeType":19,"schema":35,"siblingSchemas":38},[5,10,14,18],{"dataType":6,"dataTypeChName":7,"description":8,"label":9,"value":6},"log","","由操作系统、应用程序或安全设备按时间顺序生成的事件记录。日志提供了不可篡改的审计追踪，用于监控系统状态、调查可疑活动以及在事后进行取证分析。","日志",{"dataType":11,"dataTypeChName":7,"description":12,"label":13,"value":11},"alert","由安全系统（如SIEM、IDS或防火墙）自动生成的通知，表示预定义的安全规则或异常检测阈值已被触发。","告警",{"dataType":15,"dataTypeChName":7,"description":16,"label":17,"value":15},"asset","指组织中任何具有价值并需要保护的数据、设备或系统组成部分，包括硬件、软件、信息及网络资源。","资产",{"dataType":19,"dataTypeChName":7,"description":20,"label":21,"value":19},"incident","指已确认或即将发生的违反组织安全策略、可接受使用政策或标准安全实践的行为。安全事件通常由告警经调查后升级而来，需要协调响应以控制影响。","安全事件",{"log":23,"alert":29,"asset":31,"incident":33},[24],{"value":25,"label":26,"verDesc":27,"isLatest":28},"1.0","v1.0","Default Version",true,[30],{"value":25,"label":26,"verDesc":27,"isLatest":28},[32],{"value":25,"label":26,"verDesc":27,"isLatest":28},[34],{"value":25,"label":26,"verDesc":27,"isLatest":28},{"id":36,"title":21,"description":37,"dataType":19},"security_incident","安全事件指任何已确认违反或即将威胁违反计算机安全策略、可接受使用政策或标准安全实践的行为。",[35],{"security_incident":40},{"categoryId":36,"fields":41,"subCategories":511},[42,49,54,76,101,410,416,422,427,432,437,443,448,454,460,465,470,475,480,486,491,496,501,506],{"id":43,"fieldName":43,"fieldType":44,"displayName":45,"importance":46,"description":47,"tag":-1,"dataSource":-1,"enumValues":48,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentId","string","事件ID","REQUIRED","事件ID是安全事件的全局唯一标识符，通常采用UUID或时间戳序列等不可重复算法生成，以保证其唯一性。",[],{"id":50,"fieldName":50,"fieldType":44,"displayName":51,"importance":46,"description":52,"tag":-1,"dataSource":-1,"enumValues":53,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentName","事件名称","该字段用于标识安全事件的简要概括名称。",[],{"id":55,"fieldName":55,"fieldType":56,"displayName":57,"importance":46,"description":58,"tag":-1,"dataSource":-1,"enumValues":59,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentLevel","enum","事件级别","安全事件的严重程度等级，用于评估事件的影响范围和紧急程度。取值范围为枚举类型，可选值包括：Critical（严重）、High（高）、Medium（中）、Low（低），需严格使用给定的枚举值。",[60,64,68,72],{"value":61,"title":62,"description":63},"Critical","严重","造成重大业务影响的安全事件，需要立即响应",{"value":65,"title":66,"description":67},"High","高","对业务运营有显著影响的安全事件，需要优先处理",{"value":69,"title":70,"description":71},"Medium","中","对业务有一定影响的安全事件，需要按计划处理",{"value":73,"title":74,"description":75},"Low","低","影响较小的安全事件，可按照常规流程处理",{"id":77,"fieldName":77,"fieldType":56,"displayName":78,"importance":46,"description":79,"tag":-1,"dataSource":-1,"enumValues":80,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentStatus","事件状态","标识安全事件在响应生命周期中的当前处理状态。该字段为枚举类型，其值必须为预定义的字符串。可选值为：Analysising (分析中)、Error (错误)、Ignore (忽略)、Pending (待处置)、Disposed (已处置)。",[81,85,89,93,97],{"value":82,"title":83,"description":84},"Analysising","分析中","正在分析中的事件",{"value":86,"title":87,"description":88},"Error","错误","分析过程中自动化剧本执行流程错误终止的事件",{"value":90,"title":91,"description":92},"Ignore","忽略","经过分析不需要处置的事件",{"value":94,"title":95,"description":96},"Pending","待处置","经过分析需要处置的事件",{"value":98,"title":99,"description":100},"Disposed","已处置","已经完成处置关闭的事件",{"id":102,"fieldName":102,"fieldType":56,"displayName":103,"importance":46,"description":104,"tag":-1,"dataSource":-1,"enumValues":105,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentType","安全事件类型","安全事件类型字段用于标识安全事件的主要攻击分类和技术类别，采用层级路径格式表示。该字段为枚举类型，必须从预定义的可选值中选择，每个值均为一个字符串形式的路径。",[106,110,114,118,122,126,130,134,138,142,146,150,154,158,162,166,170,174,178,182,186,190,194,198,202,206,210,214,218,222,226,230,234,238,242,246,250,254,258,262,266,270,274,278,282,286,290,294,298,302,306,310,314,318,322,326,330,334,338,342,346,350,354,358,362,366,370,374,378,382,386,390,394,398,402,406],{"value":107,"title":108,"description":109},"/Malware/ComputerVirus","计算机病毒事件","计算机病毒事件:制造、传播或利用恶意程序，影响计算机使用,破坏计算机功能，毁坏或窃取数据；",{"value":111,"title":112,"description":113},"/Malware/Worm","网络蠕虫事件","网络端虫事件：利用网络缺陷，蓄意制造或通过网络自动复制并传播网络蠕虫；",{"value":115,"title":116,"description":117},"/Malware/Trojan","特洛伊木马事件","特洛伊木马事件：制造、传播或利用具有远程控制功能的恶意程序，实现非法窃取或截获数据；",{"value":119,"title":120,"description":121},"/Malware/Botnet","僵尸网络事件","僵尸网络事件：利用僵尸工具程序形成僵尸网络；",{"value":123,"title":124,"description":125},"/Malware/MaliciousCodeEmbedded","恶意代码内嵌网页事件","恶意代码内嵌网页事件：在访问被嵌入恶意代码而受到污损的网页时，该恶意代码在访问该网页的计算机系统中安装恶意软件；",{"value":127,"title":128,"description":129},"/Malware/MaliciousCodeHostingSite","恶意代码宿主站点事件","恶意代码宿主站点事件:诱使目标用户到存储恶意代码的宿主站点下载恶意代码；",{"value":131,"title":132,"description":133},"/Malware/Ransomware","勒索软件事件","勒索软件事件:采取加密或屏蔽用户操作等方式劫持用户对系统或数据的访问权，并籍此向用户索取赎金；",{"value":135,"title":136,"description":137},"/Malware/Miner","挖矿病毒事件","挖矿病毒事件：以获得数字加密货币为目的，控制他人的计算机并植入挖矿病毒程序完成大量运算",{"value":139,"title":140,"description":141},"/Malware/BlendedAttack","混合攻击程序事件","混合攻击程序事件:利用多种方法传播和利用多种恶意程序.例如，一个计算机病毒在侵入计算机系统后在系统中安装木马程序；",{"value":143,"title":144,"description":145},"/Malware/Others","其他恶意程序事件","其他恶意程序事件:不在以上子类之中的恶意程序事件。",{"value":147,"title":148,"description":149},"/NetAttack/Scan","网络扫描探测事件","网络扫描探测事件：利用网络扫描软件获取有关网络配置、端口、服务和现有脆弱性等信息；",{"value":151,"title":152,"description":153},"/NetAttack/Phishing","网络钓鱼事件","网络钓鱼事件：利用欺诈性网络技术诱使用户泄露重要数据或个人信息；",{"value":155,"title":156,"description":157},"/NetAttack/VulnExploit","漏洞利用事件","漏洞利用事件：通过挖掘并利用网络配置缺陷、通信协议缺陷或应用程序缺陷等漏洞对网络实施攻击；",{"value":159,"title":160,"description":161},"/NetAttack/BackdoorExploit","后门利用事件","后门利用事件:恶意利用软件或硬件系统设计过程中未经严格验证所留下的接口、功能模块、程序等，非法获取网络管理权限；",{"value":163,"title":164,"description":165},"/NetAttack/BackdoorImplantation","后门植入事件","后门植入事件：非法在网络中创建能够持续获取其管理权限的后门；",{"value":167,"title":168,"description":169},"/NetAttack/Credential","凭据攻击事件","凭据攻击事件：破解口令.解析登录口令或凭据等；",{"value":171,"title":172,"description":173},"/NetAttack/SignalInterference","信号干扰事件","信号干扰事件：通过技术手段阻碍有线或无线信号在网络中正常传播；",{"value":175,"title":176,"description":177},"/NetAttack/DOS","拒绝服务事件","拒绝服务事件：通过非正常使用网络资源（诸如CPU、内存、磁盘空间或网络带宽）影响或破坏网络可用性，例如：DDOS等；",{"value":179,"title":180,"description":181},"/NetAttack/WebTempering","网页篡改事件","网页篡改事件:通过恶意破坏或更改网页内容影响网站声誉或破坏网页及网站可用性；",{"value":183,"title":184,"description":185},"/NetAttack/DomainHijack","域名劫持事件","域名劫持事件:通过攻击或伪造DNS的方式蓄意或恶意诱导用户访问非预期的指定IP地址（网站）；",{"value":187,"title":188,"description":189},"/NetAttack/DomainRedirect","域名转嫁事件","域名转嫁事件:把自己的域名指向一个不属于自己的IP地址，导致针对该域名的攻击都将被引向所指向的IP地址；",{"value":191,"title":192,"description":193},"/NetAttack/DNSPoisoning","DNS污染事件","DNS污染事件:利用刻意制造或无意制造的DNS数据包，把域名指向不正确的IP地址；",{"value":195,"title":196,"description":197},"/NetAttack/WLANHijack","WLAN劫持事件","WLAN劫持事件:通过口令破解、固件替换等方法非法获取无线局域网的控制权限；",{"value":199,"title":200,"description":201},"/NetAttack/TrafficHijack","流量劫持事件","流量劫持事件：通过恶意诱导或非法强制用户访问特定网络资源造成用户流量损失；",{"value":203,"title":204,"description":205},"/NetAttack/BGPHijack","BGP劫持攻击事件","BGP劫持攻击事件:通过BGP恶意操纵网络路由路径；",{"value":207,"title":208,"description":209},"/NetAttack/BroadcastFraud","广播欺诈事件","广播欺诈事件:通过广播欺骗的方式干扰网络数据包正常传输或窃取网络用户敏感信息；",{"value":211,"title":212,"description":213},"/NetAttack/CompromisedHost","失陷主机事件","失陷主机事件：攻击者获得某主机的控制权后.能以该主机为跳板继续攻击组织内网其他主机；",{"value":215,"title":216,"description":217},"/NetAttack/SupplyChain","供应链攻击事件","供应链攻击事件:通过利用供应链管理中存在的脆弱性，感染合法应用来分发恶意程序：",{"value":219,"title":220,"description":221},"/NetAttack/APT","APT事件","APT事件：通过对特定对象展开持续有效的攻击活动.这种攻击活动具有极强的隐蔽性和针对性，通常会运用受感染的各种介质、供应链和社会工程学等多种手段实施先进的、持久的且有效的威胁和攻击",{"value":223,"title":224,"description":225},"/NetAttack/Others","其他网络攻击事件","其他网络攻击事件:不在以上子类之中的网络攻击事件。",{"value":227,"title":228,"description":229},"/DataSec/DataTampering","数据篡改事件","数据篡改事件:未经授权接触或修改数据；",{"value":231,"title":232,"description":233},"/DataSec/DataFake","数据假冒事件","数据假冒事件：非法或未经许可使用、伪造数据；",{"value":235,"title":236,"description":237},"/DataSec/DataLeakage","数据泄露事件","数据泄露事件:无意或恶意通过技术手段使数据或敏感个人信息对外公开泄露：",{"value":239,"title":240,"description":241},"/DataSec/SocialEngineering","社会工程事件","社会工程事件:通过非技术手段（如心理学、话术等）诱导他人泄露数据或执行行动；",{"value":243,"title":244,"description":245},"/DataSec/DataTheft","数据窃取事件","数据窃取事件:未经授权利用技术手段（例如窃听、间谍等）偷窃数据；",{"value":247,"title":248,"description":249},"/DataSec/DataIntercept","数据拦截事件","数据拦截事件:在数据到达目标接收者之前非法捕获数据；",{"value":251,"title":252,"description":253},"/DataSec/PositionDetection","位置检测事件","位置检测事件:非法检测系统、个人的地理位置信息或敏感数据的存储位置；",{"value":255,"title":256,"description":257},"/DataSec/DataPoisoning","数据投毒事件","训练数据的概率分布，导致模型在某些特定条件下产生分类或聚类错误；",{"value":259,"title":260,"description":261},"/DataSec/DataAbuse","数据滥用事件","数据滥用事件:无意或恶意滥用数据",{"value":263,"title":264,"description":265},"/DataSec/PrivacyInvasion","隐私侵犯事件","隐私侵犯事件:无意或恶意侵犯网络中存在的敏感个人信息；",{"value":267,"title":268,"description":269},"/DataSec/DataLoss","数据损失事件","数据损失事件：因误操作、人为蓄意或软硬件缺陷等因素导致数据损失；",{"value":271,"title":272,"description":273},"/DataSec/Others","其他数据安全事件","其他数据安全事件:不在以上子类之中的数据安全事件。",{"value":275,"title":276,"description":277},"/InformationSec/Reactionary","反动宣传事件","反动宣传事件：利用网络传播煽动颠覆国家政权、推翻社会主义制度.煽动分裂国家、破坏国家统一等危害国家安全、荣誉和利益的非法信息：",{"value":279,"title":280,"description":281},"/InformationSec/Violent","暴恐宣扬事件","暴恐宣扬事件:利用网络宣扬恐怖主义、极端主义，煽动民族仇恨、民族歧视的信息，引起社会恐慌和动乱；",{"value":283,"title":284,"description":285},"/InformationSec/Porn","色情传播事件","色情传播事件：利用网络传播违背社会伦理道德的淫秽色情信息；",{"value":287,"title":288,"description":289},"/InformationSec/FalseInformation","虚假信息传播事件","虚假信息传播事件：利用网络编造并传播虚假信息来扰乱经济秩序和社会秩序.造成负面影响；",{"value":291,"title":292,"description":293},"/InformationSec/RightsInfringement","权益侵害事件","权益侵害事件：利用网络传播的信息侵害了社会组织或公民的合法权益；",{"value":295,"title":296,"description":297},"/InformationSec/InformationSpamming","信息滥发事件","信息滥发事件:利用网络传播未经接收者准许的信息，例如：垃圾邮件等；",{"value":299,"title":300,"description":301},"/InformationSec/NetworkFraud","网络欺诈事件","网络欺诈事件:恶意利用技术或非技术手段对特定或不特定目标通过网络进行欺诈以非法获取信息或钱财；",{"value":303,"title":304,"description":305},"/InformationSec/Others","其他信息内容安全事件","其他信息内容安全事件：不在以上子类之中的信息内容安全事件。",{"value":307,"title":308,"description":309},"/DevOps/TechnicalFailure","技术故障事件","技术故障事件：网络中软硬件的自然缺陷、设计缺陷或运行环境发生变化而引起系统故障，例如：硬件故障、软件故障、过载等；",{"value":311,"title":312,"description":313},"/DevOps/InfrastructureFailure","配套设施故障事件","配套设施故障事件:支撑网络运行的配套设施发生故障.例如：电力供应故障、照明系统故障、温湿度控制系统故障等；",{"value":315,"title":316,"description":317},"/DevOps/PhysicalDamage","物理损害事件","物理损害事件：故意或意外的物理行动造成网络环境或网络设备损坏.例如：失火、漏水、静电、设备毁坏或丢失等；",{"value":319,"title":320,"description":321},"/DevOps/Radiation","辐射干扰事件","辐射干扰事件：因辐射产生干扰影响网络正常运行.例如：电磁辐射、电磁脉冲、电子干扰、电压波动、热辐射等；",{"value":323,"title":324,"description":325},"/DevOps/Others","其他设备设施故障事件","其他设备设施故障事件：不在以上子类之中的设备设施故障事件。",{"value":327,"title":328,"description":329},"/ViolateOp/PrivilegeAbuse","权限滥用事件","权限滥用事件：由于网络服务端功能开放过多或权限限制不严格，导致攻击者通过直接或间接调用权限的方式进行攻击；",{"value":331,"title":332,"description":333},"/ViolateOp/PrivilegeEscalation","权限伪造事件","权限伪造事件：为了欺骗制造虚假权限；",{"value":335,"title":336,"description":337},"/ViolateOp/BehaviorDenial","行为抵赖事件","行为抵赖事件:用户否认其有害行为；",{"value":339,"title":340,"description":341},"/ViolateOp/Deliberate","故意违规操作事件","故意违规操作事件：故意执行非法操作；",{"value":343,"title":344,"description":345},"/ViolateOp/Misoperation","误操作事件","误操作事件:无意地执行错误操作；",{"value":347,"title":348,"description":349},"/ViolateOp/PersonnelAvailability","人员可用性破坏事件","人员可用性破坏事件:人力资源受损，导致人员缺失或缺席；",{"value":351,"title":352,"description":353},"/ViolateOp/UnauthResource","资源未授权使用事件","资源未授权使用事件:未经授权访问资源；",{"value":355,"title":356,"description":357},"/ViolateOp/Copyright","版权违反事件","版权违反事件:违反版权要求安装使用商业软件或其他受版权保护的材料；",{"value":359,"title":360,"description":361},"/ViolateOp/Others","其他违规操作事件","其他违规操作事件：不在以上子类之中的违规操作事件。",{"value":363,"title":364,"description":365},"/SafetyHazard/NetVuln","网络漏洞事件","网络漏洞事件：因操作系统、应用程序或安全协议开发及设计过程中，对安全性考虑不充分而出现安全隐患；",{"value":367,"title":368,"description":369},"/SafetyHazard/NetConfigFlaw","网络配置缺陷事件","网络配置合规缺陷事件：由于软硬件安全配置不合理或缺省配置，不符合网络安全要求而产生安全缺陷或隐患；",{"value":371,"title":372,"description":373},"/SafetyHazard/Others","其他安全隐患事件","其他安全隐患事件:不在以上子类之中的安全隐患事件。",{"value":375,"title":376,"description":377},"/AbnormalBehavior/Access","访问异常事件","访问异常事件：因网络软硬件运行环境发生变化导致不能提供服务；",{"value":379,"title":380,"description":381},"/AbnormalBehavior/Traffic","流量异常事件","流量异常事件：网络流量行为模式偏离正常基线；",{"value":383,"title":384,"description":385},"/AbnormalBehavior/Others","其他异常行为事件","其他异常行为事件:不在以上子类之中的异常行为事件。",{"value":387,"title":388,"description":389},"/Majeure/NaturalDisaster","自然灾害事件","自然灾害事件：大自然的极端现象导致信息和信息系统受损，例如：地震、火山、洪水、暴风、闪电、海啸、崩塌等；",{"value":391,"title":392,"description":393},"/Majeure/IncidentDisaster","事故灾难事件","事故灾难事件：具有灾难性后果的事故导致信息和信息系统受损，例如：公共设施和设备事故、环境污染事故等",{"value":395,"title":396,"description":397},"/Majeure/PublicHealth","公共卫生事件","公共卫生事件：传染病疫情等导致信息和信息系统受损；",{"value":399,"title":400,"description":401},"/Majeure/SocialSec","社会安全事件","社会安全事件：危害国家和社会的突发性群体性事件导致信息和信息系统受损.例如：恐怖袭击事件等；",{"value":403,"title":404,"description":405},"/Majeure/Others","其他不可抗力事件","其他不可抗力事件：不在以上子类之中的不可抗力事件。",{"value":407,"title":408,"description":409},"/Others/Others","其他事件","其他事件指未归为上述分类的网络安全事件。",{"id":411,"fieldName":411,"fieldType":44,"displayName":412,"importance":413,"description":414,"tag":-1,"dataSource":-1,"enumValues":415,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"latestActivityTime","最近发生时间","RECOMMENDED","该字段记录安全事件中最后一次活动或告警触发的时间。格式必须为标准的日期时间字符串，具体要求为：yyyy-mm-dd HH:mm:ss，例如 2024-12-27 19:28:22。",[],{"id":417,"fieldName":417,"fieldType":44,"displayName":418,"importance":419,"description":420,"tag":-1,"dataSource":-1,"enumValues":421,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"createTime","创建时间","OPTIONAL","该字段记录系统对象、文件或资源的初始创建时间。时间格式必须为yyyy-mm-dd HH:mm:ss。",[],{"id":423,"fieldName":423,"fieldType":44,"displayName":424,"importance":419,"description":425,"tag":-1,"dataSource":-1,"enumValues":426,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"closeTime","关闭时间","closeTime字段表示事件处置完成并被正式关闭的时间。该字段为字符串类型，必须遵循严格的日期时间格式：yyyy-mm-dd HH:mm:ss，例如2025-01-14 11:18:31。",[],{"id":428,"fieldName":428,"fieldType":44,"displayName":429,"importance":413,"description":430,"tag":-1,"dataSource":-1,"enumValues":431,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"closeReason","关闭原因","该字段用于记录安全事件关闭的具体原因和解决状态。值为字符串类型，应简洁明了地描述关闭事件的原因。",[],{"id":433,"fieldName":433,"fieldType":44,"displayName":434,"importance":419,"description":435,"tag":-1,"dataSource":-1,"enumValues":436,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"closeUser","关闭操作者","该字段标识执行事件关闭操作的用户或系统实体。其值为字符串类型，用于记录关闭操作的发起者。",[],{"id":438,"fieldName":438,"fieldType":439,"displayName":440,"importance":419,"description":441,"tag":-1,"dataSource":-1,"enumValues":442,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"participants","array","参与人","该字段记录参与安全事件响应和处理的所有相关人员列表，存储格式为字符串数组。",[],{"id":444,"fieldName":444,"fieldType":439,"displayName":445,"importance":413,"description":446,"tag":-1,"dataSource":-1,"enumValues":447,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"alertDevices","告警来源设备","告警来源设备字段记录生成告警的安全设备和传感器信息集合，格式为字符串数组。每个数组元素应为描述设备名称及标识信息的字符串，通常包含设备名称和IP地址等关键信息。",[],{"id":449,"fieldName":449,"fieldType":450,"displayName":451,"importance":413,"description":452,"tag":-1,"dataSource":-1,"enumValues":453,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"isInternetAttack","boolean","是否互联网攻击","该字段用于标识攻击源是否来自互联网外部网络。字段类型为布尔值，取值为 true 或 false，其中 true 表示攻击源来自互联网，false 表示攻击源非来自互联网。",[],{"id":455,"fieldName":455,"fieldType":456,"displayName":457,"importance":419,"description":458,"tag":-1,"dataSource":-1,"enumValues":459,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"durationTime","long","持续时间","持续时间表示事件或操作从开始到结束的完整时间长度，以秒为单位。该字段为长整型数值，应大于等于0。",[],{"id":461,"fieldName":461,"fieldType":44,"displayName":462,"importance":419,"description":463,"tag":-1,"dataSource":-1,"enumValues":464,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"incidentDataSource","安全事件数据源","安全事件数据源字段用于标识安全事件数据的原始来源系统和检测机制，例如安全设备、日志系统、威胁情报平台或人工报告等。",[],{"id":466,"fieldName":466,"fieldType":439,"displayName":467,"importance":419,"description":468,"tag":-1,"dataSource":-1,"enumValues":469,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"alertNames","告警名称列表","告警名称列表，记录安全事件生命周期中关联的所有告警规则名称集合。该字段为字符串数组，数组内每个元素为一个告警名称字符串。",[],{"id":471,"fieldName":471,"fieldType":439,"displayName":472,"importance":413,"description":473,"tag":-1,"dataSource":-1,"enumValues":474,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"alertIds","告警ID列表","记录安全事件关联的所有告警唯一标识符集合。该字段为字符串数组，数组内每个元素应为表示告警唯一标识符的字符串。",[],{"id":476,"fieldName":476,"fieldType":439,"displayName":477,"importance":413,"description":478,"tag":-1,"dataSource":-1,"enumValues":479,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"alertTypes","告警类型列表","记录安全事件关联的所有告警分类类型集合。字段值为字符串数组，每个数组元素为一个告警分类类型字符串。",[],{"id":481,"fieldName":481,"fieldType":482,"displayName":483,"importance":419,"description":484,"tag":-1,"dataSource":-1,"enumValues":485,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"alertCount","integer","告警数量","该字段用于统计安全事件关联的告警总数。其值应为非负整数，表示告警的具体数量。",[],{"id":487,"fieldName":487,"fieldType":439,"displayName":488,"importance":413,"description":489,"tag":-1,"dataSource":-1,"enumValues":490,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"attacker","攻击者","攻击者是指在攻击活动中使用的所有唯一源IP地址集合，用于标识攻击来源。该字段为数组类型，每个元素必须符合IP地址格式要求，即有效的IPv4或IPv6地址。",[],{"id":492,"fieldName":492,"fieldType":439,"displayName":493,"importance":413,"description":494,"tag":-1,"dataSource":-1,"enumValues":495,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"victim","受害者","记录受攻击影响的所有唯一目标IP地址集合，以数组形式存储。数组中的每个元素必须是有效的IPv4或IPv6地址格式。IPv4地址格式为点分十进制（如：192.168.1.1），IPv6地址格式需符合标准表示法（如：2001:0db8:85a3:0000:0000:8a2e:0370:7334或压缩格式）。",[],{"id":497,"fieldName":497,"fieldType":439,"displayName":498,"importance":413,"description":499,"tag":-1,"dataSource":-1,"enumValues":500,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"srcAddrList","来源IP列表","该字段记录安全事件中所有唯一源IP地址的集合。字段值为字符串数组，每个数组元素必须是一个合法的IPv4或IPv6地址。",[],{"id":502,"fieldName":502,"fieldType":439,"displayName":503,"importance":413,"description":504,"tag":-1,"dataSource":-1,"enumValues":505,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"destAddrList","目的IP列表","目的IP列表记录安全事件中所有唯一目的IP地址的集合。该字段为数组类型，每个元素必须是合法的IPv4或IPv6地址格式。",[],{"id":507,"fieldName":507,"fieldType":44,"displayName":508,"importance":419,"description":509,"tag":-1,"dataSource":-1,"enumValues":510,"categoryId":36,"subCategoryId":36,"subCategoryName":21},"assignee","负责人","负责人字段用于标识负责安全事件调查和响应的主要责任人。其值应为字符串类型，通常为责任人的用户名、工号或姓名。",[],[512],{"categoryDesc":513,"categoryId":36,"categoryName":21,"id":514},"安全事件是指任何已确认违反或即将违反计算机安全策略、可接受使用政策或标准安全实践的行为。",51,"# 安全事件  **路径**: 安全事件 > 安全事件  ## 描述  安全事件指任何已确认违反或即将威胁违反计算机安全策略、可接受使用政策或标准安全实践的行为。  ## 基本信息  - **分类ID**: `security_incident` - **所属类型**: 安全事件 (`incident`) - **包含事件类型**: 1 个  ## 子分类列表  本主分类包含以下事件类型：  | 事件类ID | 事件类型名称 | 描述 | 字段数 | |--------|------------|------|--------| | `security_incident` | 安全事件 | 安全事件是指任何已确认违反或即将违反计算机安全策略、可接受使用政策或标准安全实践的行为。 | 24 |  ### 子分类详情  #### 安全事件  - **ID**: `security_incident` - **描述**: 安全事件是指任何已确认违反或即将违反计算机安全策略、可接受使用政策或标准安全实践的行为。 - **字段数**: 24 个 - **详细信息**: [查看详情](https://www.ocim.tech/osim/data/category/security_incident/security_incident/index.html.md)",[],[],1776855161546]