Context | IAM |
---|---|
Title | A Classification of IAM Related Incident Classes |
Version |
|
Summary | In order to enable the measurement of IAM related, it is necessary to establish a classification of IAM related incident classes. This page is a placeholder where to progressively consolidate references to IAM related incident classes. |
See Also |
|
TODO |
|
Approach
In order to enable the measurement of IAM related, it is necessary to establish a classification of IAM related incident classes. At this point, this page is a placeholder where references to IAM related incident classes are progressively inventories. It is by no mean complete.
Call for contributions
If you are aware of classes not yet referenced on this page or if you are aware of complementary source references, please let us know and contribute.
Classification
Class | Definition | Comments | Sources |
---|---|---|---|
Information Gathering - Phishing | Attempt to gather information on a user or a system through phishing methods. Including;
| ||
Intrusion Attempt and Intrusion - Login attempt | Attempt to log in to services or authentication / access control mechanisms. Including:
| ||