What are the different types of network security incidents?

An attack executed from removable media (e.g., flash drive, CD) or a peripheral device.


An attack executed via an email message or attachment (e.g. malware infection).


An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.

Improper Usage:

Any incident resulting from violation of an organization’s acceptable usage policies by an authorized user, excluding the above categories.


An attack executed from a website or a web-based application (e.g. drive-by download).

Loss or Theft of Equipment:

The loss or theft of a computing device or media used by the organization, such as a laptop or smartphone.


An attack that does not fit into any of the other categories.

Recent Posts


What Is Cyber Insurance, and Should We Buy It?      For most businesses, covering liability wit.....READ MORE

Conduct an audit of your data types. What kind of information would a criminal want? Creating securi.....READ MORE