Name |
Description |
---|---|
Connection Activity |
The connection activity class covers actions which deal with the connection activity such as Connect Attempt and others. |
Signature Violation Activity |
The signature violation activity class covers actions which deal with the signature matching actions such as Signature Violation and others. |
Application Security |
Application activity reported by network devices like IDS, IPS and gateways. |
Corporate Policy Violation |
Any network activity that violates corporate policy. |
Information Leak |
Network activity related to attempt or successful data theft and unauthorized transfer of data. |
Privilege Escalation |
Attempts to escalate user privileges |
Denial of Service |
Activity related to attempts to make a computer resource unavailable to its intended users |
Suspicious Activity |
Any type of suspicious activity reported that cannot be classified into other classes in “Network Security” Category. |
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |