...
Class | Definition | Sources |
---|---|---|
Phishing | Class: Information Gathering Attempt to gather information on a user or a system through phishing methods. Including;
| |
Login attempt | Class: Intrusion Attempt and Intrusion Attempt to log in to services or authentication / access control mechanisms. Including:
| |
Unauthorised access to a system or component by bypassing an access control system in place. | Class: Intrusion Type: (Successful) Exploitation of vulnerability Actual intrusion by exploiting vulnerability in the system, component or network. Unauthorised access to a system or component by bypassing an access control system in place. (Control system bypass: (Art. 2 [A], Art. 3 and 7 [F]) | |
Compromising an account | Class: Intrusion Actual intrusion in a system, component or network by compromising a user or administrator account. Unauthorised access to a system or component by using stolen access credentials. (Theft of access credentials: Art. 6 [A], Art. 3 and 7 [F]) | |
Unauthorised access | Class: Information Security Unauthorised access to a particular set of information Unauthorised access to a system or component (Unauthorised access to a system: - Art. 2 [A] - Art. 3 and 7 [F]) Unauthorised access to a set of information (Unauthorised access to information: - Art. 2 [A] - Art. 3 and 7 [F] - Art. 5, 6 and 25 [G]) Unauthorised access to and sharing of a specific set of information (Data exfiltration: - Art. 2 [A]) |