Eristotle

Runbooks

29

Jun'16

Test

Meant for testing.

Read More

29

Jun'16

Other

All incidents which don’t fit in one of the given categories should be put into this class. If the number …

Read More

29

Jun'16

Vulnerable

Open resolvers, world readable printers, vulnerability apparent from Nessus etc scans, virus signatures not up-to-date, etc

Read More

29

Jun'16

Fraud

Unauthorized use of resources Copyright Masquerade Phishing

Read More

29

Jun'16

Fraud – Unauthorized Use of Resources

Using resources for unauthorized purposes including profit-making ventures (E.g. the use of e-mail to participate in illegal profit chain letters …

Read More

29

Jun'16

Fraud – Copyright

Offering or Installing copies of unlicensed commercial software or other copyright protected materials (Warez).

Read More

29

Jun'16

Fraud – Masquerade

Type of attacks in which one entity illegitimately assumes the identity of another in order to benefit from it.

Read More

29

Jun'16

Fraud – Phishing

Masquerading as another entity in order to persuade the user to reveal a private credential.

Read More

29

Jun'16

Information Content Security

Besides a local abuse of data and systems the information security can be endangered by a successful account or application …

Read More

29

Jun'16

Availability

Denial of Service (Dos) Distributed Denial of Service (DDoS) Sabotag Non-malicious Outage

Read More

Eristotle™ Project

Eristotle Project develops and deliver innovative solutions and services for improving Cyber Security and Compliance posture for global small and medium size organisations. Capitalising on our interests and R&D driven insights backed by Big Data analysis, we continue to add value for our customers and partners by leading them towards fact based decision making and leverage their investments where they matter the most.

Popular Courses

top
© Eristotle. All rights reserved. Legal | Contact