|
Name |
Description |
|---|---|
|
Connection Activity |
The connection activity class covers actions which deal with the connection activity such as Connect Attempt and others. |
|
Signature Violation Activity |
The signature violation activity class covers actions which deal with the signature matching actions such as Signature Violation and others. |
|
Application Security |
Application activity reported by network devices like IDS, IPS and gateways. |
|
Corporate Policy Violation |
Any network activity that violates corporate policy. |
|
Information Leak |
Network activity related to attempt or successful data theft and unauthorized transfer of data. |
|
Privilege Escalation |
Attempts to escalate user privileges |
|
Denial of Service |
Activity related to attempts to make a computer resource unavailable to its intended users |
|
Suspicious Activity |
Any type of suspicious activity reported that cannot be classified into other classes in “Network Security” Category. |
|
Copyright © 2014 CA.
All rights reserved.
|
|