1. /
  2. Security Response/
  3. Glossary/
  4. Security Incident


A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

Security Incident

A collection of device logs and data that has been identified by the STP to match a pattern that indicates potential weakness or compromise in the customer’s system. For a security incident to appear on the SII, it must be reviewed, categorized, and confirmed by a human analyst; these confirmed incidents appear in reports and statistics as "Validated Incidents." Each validated security incident is assigned a severity, which, along with comments entered by the analyst, can help you determine what actions, if any, should be taken to protect the network and/or prevent further compromise.