SlideShare a Scribd company logo
1 of 2
Download to read offline
Define each class of incident.
types of incidents classifcations
repudiation
reconnaissance attack
harassment
extortion
pornography trafficking
organized crime activity
subversion
hoax
caveat
typed 250 word minimum this is for computer forensics
Solution
Incidents are classified based on their severity.Classification serves the purpose of taking the
proper action towards handling those incidents.The category of incidents whether it is related to
hardware or software or people and the type of incident stating whetherit is fault or failure etc are
to be taken into account.
Repudiation attack occurs when the system fails to take proper control of user's login
sessions.when this happens unauthenticated users or intruders pretending as authorized can easily
manipulate the data in the log fles or other important data.
Reconnaissance attack is a type of attack when an intruder attacks the system through varoius
ways like phishing spam mails ,malicious links etc aiming at gathering high confident
information from the user like bank account credentials.
Harrasment is making someone uncomfortable,degraded and humiiated with verbal or physical
behaviour in social or work environment which is a highly punishable offense in the present
society .
Extortion is forcing someone to give up something of value by threats or force against the will of
the person.Blackmailing is one such act.
Pornography Trafficking is using victim's illegal pictures or other media for promoting their
products in a commercial way exploiting the victim with out his/her consent.
Organized Crime involves clever ways of planning and plotting activities with the sole purpose
of making money simple.Some of them include hizacking,robberies ,scams etc
Subversion is an attack where by the heirarchy of file system is changed.Versioning is
maintaining a history of changes that are made to files .This is quite useful in data recovery.
Hoax attack provides wrong information to the user about viruses or some lottery or other social
messages making the ussers to respond to the particular mail.Aim is to delete important
information from the targetted system or to introduce malicious programs into the system.
Caveat is a warning about something which should be considered while doing an action.Like
messages warning the users about phishing while doing online bank transactions.

More Related Content

Similar to Define each class of incident.types of incidents classifcationsr.pdf

Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscapecyberprosocial
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemChinmayee Behera
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

Similar to Define each class of incident.types of incidents classifcationsr.pdf (20)

Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscape
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Top 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent ThemTop 10 Cyber Security Threats and How to Prevent Them
Top 10 Cyber Security Threats and How to Prevent Them
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from 4babies2010

Find the domain of the function. (Enter your answer using interval no.pdf
Find the domain of the function. (Enter your answer using interval no.pdfFind the domain of the function. (Enter your answer using interval no.pdf
Find the domain of the function. (Enter your answer using interval no.pdf4babies2010
 
factors that are significant in the development of disease includ.pdf
factors that are significant in the development of disease includ.pdffactors that are significant in the development of disease includ.pdf
factors that are significant in the development of disease includ.pdf4babies2010
 
economic institutions 8. According to Thomas Piketty, what is the si.pdf
economic institutions 8. According to Thomas Piketty, what is the si.pdfeconomic institutions 8. According to Thomas Piketty, what is the si.pdf
economic institutions 8. According to Thomas Piketty, what is the si.pdf4babies2010
 
Discuss bio films , formation location etc Discuss bio films , .pdf
Discuss bio films , formation location etc Discuss bio films , .pdfDiscuss bio films , formation location etc Discuss bio films , .pdf
Discuss bio films , formation location etc Discuss bio films , .pdf4babies2010
 
Discuss the importance of documentation in the medical record.So.pdf
Discuss the importance of documentation in the medical record.So.pdfDiscuss the importance of documentation in the medical record.So.pdf
Discuss the importance of documentation in the medical record.So.pdf4babies2010
 
Determine the molecular geometry of CO32â».Solution .pdf
Determine the molecular geometry of CO32â».Solution           .pdfDetermine the molecular geometry of CO32â».Solution           .pdf
Determine the molecular geometry of CO32â».Solution .pdf4babies2010
 
Complete a force field analysis for an organization with which you a.pdf
Complete a force field analysis for an organization with which you a.pdfComplete a force field analysis for an organization with which you a.pdf
Complete a force field analysis for an organization with which you a.pdf4babies2010
 
Write CC++ a program that inputs a weighted undirected graph and fi.pdf
Write CC++ a program that inputs a weighted undirected graph and fi.pdfWrite CC++ a program that inputs a weighted undirected graph and fi.pdf
Write CC++ a program that inputs a weighted undirected graph and fi.pdf4babies2010
 
Why was the iodide ion successful for the SN2 reactions What if you.pdf
Why was the iodide ion successful for the SN2 reactions What if you.pdfWhy was the iodide ion successful for the SN2 reactions What if you.pdf
Why was the iodide ion successful for the SN2 reactions What if you.pdf4babies2010
 
What were the triumphs and limitations of democracy in Periclean Ath.pdf
What were the triumphs and limitations of democracy in Periclean Ath.pdfWhat were the triumphs and limitations of democracy in Periclean Ath.pdf
What were the triumphs and limitations of democracy in Periclean Ath.pdf4babies2010
 
What process causes plant ion-uptake to acidify soil What soil pH r.pdf
What process causes plant ion-uptake to acidify soil What soil pH r.pdfWhat process causes plant ion-uptake to acidify soil What soil pH r.pdf
What process causes plant ion-uptake to acidify soil What soil pH r.pdf4babies2010
 
what is the name and stereochemistry of the compoundSolution.pdf
what is the name and stereochemistry of the compoundSolution.pdfwhat is the name and stereochemistry of the compoundSolution.pdf
what is the name and stereochemistry of the compoundSolution.pdf4babies2010
 
What are some of the architectural decisions that you need to make w.pdf
What are some of the architectural decisions that you need to make w.pdfWhat are some of the architectural decisions that you need to make w.pdf
What are some of the architectural decisions that you need to make w.pdf4babies2010
 
What are lichens What are foliose lichensSolutionAnswers .pdf
What are lichens  What are foliose lichensSolutionAnswers .pdfWhat are lichens  What are foliose lichensSolutionAnswers .pdf
What are lichens What are foliose lichensSolutionAnswers .pdf4babies2010
 
These are questions to be answered in a paper about the Chernobyl in.pdf
These are questions to be answered in a paper about the Chernobyl in.pdfThese are questions to be answered in a paper about the Chernobyl in.pdf
These are questions to be answered in a paper about the Chernobyl in.pdf4babies2010
 
The following is the (incomplete) header file for the class Fracti.pdf
The following is the (incomplete) header file for the class Fracti.pdfThe following is the (incomplete) header file for the class Fracti.pdf
The following is the (incomplete) header file for the class Fracti.pdf4babies2010
 
The adjusted trial balance for Tybalt Construction as of December 31.pdf
The adjusted trial balance for Tybalt Construction as of December 31.pdfThe adjusted trial balance for Tybalt Construction as of December 31.pdf
The adjusted trial balance for Tybalt Construction as of December 31.pdf4babies2010
 
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdfSummarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf4babies2010
 
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdfSuppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf4babies2010
 
std deviationSolutionStandard deviation is the measure of disp.pdf
std deviationSolutionStandard deviation is the measure of disp.pdfstd deviationSolutionStandard deviation is the measure of disp.pdf
std deviationSolutionStandard deviation is the measure of disp.pdf4babies2010
 

More from 4babies2010 (20)

Find the domain of the function. (Enter your answer using interval no.pdf
Find the domain of the function. (Enter your answer using interval no.pdfFind the domain of the function. (Enter your answer using interval no.pdf
Find the domain of the function. (Enter your answer using interval no.pdf
 
factors that are significant in the development of disease includ.pdf
factors that are significant in the development of disease includ.pdffactors that are significant in the development of disease includ.pdf
factors that are significant in the development of disease includ.pdf
 
economic institutions 8. According to Thomas Piketty, what is the si.pdf
economic institutions 8. According to Thomas Piketty, what is the si.pdfeconomic institutions 8. According to Thomas Piketty, what is the si.pdf
economic institutions 8. According to Thomas Piketty, what is the si.pdf
 
Discuss bio films , formation location etc Discuss bio films , .pdf
Discuss bio films , formation location etc Discuss bio films , .pdfDiscuss bio films , formation location etc Discuss bio films , .pdf
Discuss bio films , formation location etc Discuss bio films , .pdf
 
Discuss the importance of documentation in the medical record.So.pdf
Discuss the importance of documentation in the medical record.So.pdfDiscuss the importance of documentation in the medical record.So.pdf
Discuss the importance of documentation in the medical record.So.pdf
 
Determine the molecular geometry of CO32â».Solution .pdf
Determine the molecular geometry of CO32â».Solution           .pdfDetermine the molecular geometry of CO32â».Solution           .pdf
Determine the molecular geometry of CO32â».Solution .pdf
 
Complete a force field analysis for an organization with which you a.pdf
Complete a force field analysis for an organization with which you a.pdfComplete a force field analysis for an organization with which you a.pdf
Complete a force field analysis for an organization with which you a.pdf
 
Write CC++ a program that inputs a weighted undirected graph and fi.pdf
Write CC++ a program that inputs a weighted undirected graph and fi.pdfWrite CC++ a program that inputs a weighted undirected graph and fi.pdf
Write CC++ a program that inputs a weighted undirected graph and fi.pdf
 
Why was the iodide ion successful for the SN2 reactions What if you.pdf
Why was the iodide ion successful for the SN2 reactions What if you.pdfWhy was the iodide ion successful for the SN2 reactions What if you.pdf
Why was the iodide ion successful for the SN2 reactions What if you.pdf
 
What were the triumphs and limitations of democracy in Periclean Ath.pdf
What were the triumphs and limitations of democracy in Periclean Ath.pdfWhat were the triumphs and limitations of democracy in Periclean Ath.pdf
What were the triumphs and limitations of democracy in Periclean Ath.pdf
 
What process causes plant ion-uptake to acidify soil What soil pH r.pdf
What process causes plant ion-uptake to acidify soil What soil pH r.pdfWhat process causes plant ion-uptake to acidify soil What soil pH r.pdf
What process causes plant ion-uptake to acidify soil What soil pH r.pdf
 
what is the name and stereochemistry of the compoundSolution.pdf
what is the name and stereochemistry of the compoundSolution.pdfwhat is the name and stereochemistry of the compoundSolution.pdf
what is the name and stereochemistry of the compoundSolution.pdf
 
What are some of the architectural decisions that you need to make w.pdf
What are some of the architectural decisions that you need to make w.pdfWhat are some of the architectural decisions that you need to make w.pdf
What are some of the architectural decisions that you need to make w.pdf
 
What are lichens What are foliose lichensSolutionAnswers .pdf
What are lichens  What are foliose lichensSolutionAnswers .pdfWhat are lichens  What are foliose lichensSolutionAnswers .pdf
What are lichens What are foliose lichensSolutionAnswers .pdf
 
These are questions to be answered in a paper about the Chernobyl in.pdf
These are questions to be answered in a paper about the Chernobyl in.pdfThese are questions to be answered in a paper about the Chernobyl in.pdf
These are questions to be answered in a paper about the Chernobyl in.pdf
 
The following is the (incomplete) header file for the class Fracti.pdf
The following is the (incomplete) header file for the class Fracti.pdfThe following is the (incomplete) header file for the class Fracti.pdf
The following is the (incomplete) header file for the class Fracti.pdf
 
The adjusted trial balance for Tybalt Construction as of December 31.pdf
The adjusted trial balance for Tybalt Construction as of December 31.pdfThe adjusted trial balance for Tybalt Construction as of December 31.pdf
The adjusted trial balance for Tybalt Construction as of December 31.pdf
 
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdfSummarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf
Summarize the case Surgery Iturralde v. Hilo Medical Center USA , i.pdf
 
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdfSuppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf
Suppose we draw 2 cards out of a deck of 52. Let A = “the first card.pdf
 
std deviationSolutionStandard deviation is the measure of disp.pdf
std deviationSolutionStandard deviation is the measure of disp.pdfstd deviationSolutionStandard deviation is the measure of disp.pdf
std deviationSolutionStandard deviation is the measure of disp.pdf
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Define each class of incident.types of incidents classifcationsr.pdf

  • 1. Define each class of incident. types of incidents classifcations repudiation reconnaissance attack harassment extortion pornography trafficking organized crime activity subversion hoax caveat typed 250 word minimum this is for computer forensics Solution Incidents are classified based on their severity.Classification serves the purpose of taking the proper action towards handling those incidents.The category of incidents whether it is related to hardware or software or people and the type of incident stating whetherit is fault or failure etc are to be taken into account. Repudiation attack occurs when the system fails to take proper control of user's login sessions.when this happens unauthenticated users or intruders pretending as authorized can easily manipulate the data in the log fles or other important data. Reconnaissance attack is a type of attack when an intruder attacks the system through varoius ways like phishing spam mails ,malicious links etc aiming at gathering high confident information from the user like bank account credentials. Harrasment is making someone uncomfortable,degraded and humiiated with verbal or physical behaviour in social or work environment which is a highly punishable offense in the present society . Extortion is forcing someone to give up something of value by threats or force against the will of the person.Blackmailing is one such act. Pornography Trafficking is using victim's illegal pictures or other media for promoting their products in a commercial way exploiting the victim with out his/her consent. Organized Crime involves clever ways of planning and plotting activities with the sole purpose of making money simple.Some of them include hizacking,robberies ,scams etc Subversion is an attack where by the heirarchy of file system is changed.Versioning is
  • 2. maintaining a history of changes that are made to files .This is quite useful in data recovery. Hoax attack provides wrong information to the user about viruses or some lottery or other social messages making the ussers to respond to the particular mail.Aim is to delete important information from the targetted system or to introduce malicious programs into the system. Caveat is a warning about something which should be considered while doing an action.Like messages warning the users about phishing while doing online bank transactions.