Threat Classification

During an incident you will need to identify the nature of the threat - likely one of the following. This classification should be used as one of the entries into our Security Incident Log

Unauthorized Access

Incidents involving access to systems or data by individuals who do not have permission, potentially leading to information theft or data manipulation.

Malware Infection

Cases where systems are infected by viruses, ransomware, spyware, or other malicious software that compromises system integrity or steals data.

Data Breach

Incidents where sensitive, protected, or confidential data is accessed, used, or disclosed in an unauthorized way.

Denial of Service (DoS)

Attacks that make network services unavailable to intended users, typically by overwhelming the service with excessive requests.

Phishing Attacks

Attempts to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communications.

Loss or Theft of Equipment

Incidents involving the physical loss or theft of devices like computers, mobile phones, and storage devices containing business data.

Exploits

Incidents where attackers exploit known or unknown vulnerabilities in software to gain unauthorized access or cause damage.

Accidental Data Loss

Non-malicious incidents where data is lost or corrupted due to human error, software or hardware failure.

Title Threat Classification
Document Type
Document ID Version Issued
Review Process
Approved Issued Reviewer