Asset V2 Lexicon#
On this page you will find the detailed definitions for the terms commonly used throughout the V2 Asset Service.
A specific resource that Mnemonic’s is aware of. It may additionally be monitored and protected by Mnemonic on behalf of its owning customer. This can be anything from a piece of hardware, software, or data that holds value for the customer.
The rule-set or criteria that outlines what components an Asset of a particular type may contain. This can be used to categorize or specify Assets based on their elements or parts.
The specifications or guidelines that dictate what type of data a component of a given type may contain. This is used to ensure consistency and compatibility across different components with the same definition across all Assets.
A distinct piece of information or a specific part that contributes to the entirety of an Asset. This can be a module in a software, a part in a machine, or a subset of data within a larger dataset.
A designated collection of Assets or other Groups that are grouped together due to shared characteristics, commonalities or purpose. This grouping may not necessarily be based on the type or nature of the Asset.
When updating an asset and its components, we can sometime observe components with the same definitions in both the existing and new version. If the two components’ values are not identical we have a conflict, and have to decide which one to keep.
The original data source that provides the foundation for Vulnerability Definitions. It can be a database, a report, a threat intelligence feed, or any other source that provides information about potential vulnerabilities.
The globally shared data, including potential resolutions, for observed vulnerabilities of a specific type. This definition helps in understanding, managing, and resolving vulnerabilities in a standardized manner.
An observed instance of a Vulnerability (Definition) that has been detected on a specific Asset. It represents a weakness or a flaw that can potentially be exploited to compromise the Asset.
A specific piece of information about an observed Vulnerability. This could be details about its source, its potential impact, its severity, or any other information that contributes to understanding and addressing the vulnerability.