Incident Management Guide: Ways to categorize Incidents

Based on Type of Attack: 

  1. Malware : Malicious code has been successfully  logged into business infrastructure

  2. Unauthorized access (user/admin/other privilege escalations) : Any privilege escalations or access gained which should otherwise be denied to subject

  3. Phishing or Social Engineering tactics : Abuse of mostly employee or other which exploits human behavior by social engineering tactics,phishing mails etc

  4. Resource mis-configuration : Any resource not securely devices as per policies with appropriate measures

  5. Data breach : A super critical scenario, where sensitive data has been leaked.

  6. APT (Advanced Persistent Threat) : A targeted attack in which various techniques may be used to breach security infrastructure

  7. Resource abuse or DOS/DDOS : Denial of Business Services due to excess traffic, once again a targeted attack

  8. False alarms : These are the false-positives, most solutions render such time to time. As it is not actually an incident, it should be classified as separate
  9. Internal Exercises or Red Team Activity : Internal exercises by the CIRT(Computer Incidence Reponse Team) to test the security infrastructure. Red Team attacks are a group of white hat hackers who test your business security.

  10. Others : Some further classification may be done based on other common security issues faced by business.In general, the various varied attacks can be classified into this.

Based on Type of Activities: 

  1. Forensics : Preservation of evidence and tracking incident origin
  2. Local IR 

http://www.sans.org/reading-room/whitepapers/incident/incident-response-fight-35342

http://www.bu.edu/tech/services/security/services/incidents/reporting/types/

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform