Professional Documents
Culture Documents
Lecture 8
Lecture 8
Lecture 8
Lecture 8
Incident Handling
Esmiralda Moradian
24-04-2023
Learning outcomes
● Unauthorized Access
– attempts to retrieve password files
– exploitation of protocol vulnerabilities
– attempts to elevate privileges to resources or information
– direct or indirect disclosure or modification of information,
– breaches of accountability or misuse of information systems
– breaches of physical security arrangements
– misconfigured OS, or
– malfunctions of SW or HW
Security incidents (cont.)
● Malware
● Abuse
Need for Incident Response