Name (required)
Organization (required)
Contact Number(required)
Email (required)
Subject Abusive ContentMalicious CodeInformation GatheringIntrusion AttemptsIntrusionsAvailabilityInformation SecurityFraudOthers
Category SpamHarassmentChild/Sexual/Violence/...VirusWormTrojanSpywareDialerScanningSniffingSocial EngineeringExploiting of unknown vulnerabilitiesLogin AttemptsNew Attack SignaturePrivileged Account CompromiseUnprivileged Account CompromiseApplication CompromiseDoSDDoSSubotageUnauthorised Access To InformationUnauthorised Modification Of InformationUnauthorized Use Of ResourcesCopyrightMasqueradeAll incidents which don't fit in one of the given categories should be put into this class
Remark
Identify the letters
Committed to reducing the vulnerability of cyberspace, Incident Management and strengthening the culture of cybersecurity
by Admin | 15th January 2014
Name (Required)
Email (Required - will not be published)
Website
Message (Required)