Name (required)
Organization (required)
Contact Number(required)
Email (required)
Subject Abusive ContentMalicious CodeInformation GatheringIntrusion AttemptsIntrusionsAvailabilityInformation SecurityFraudOthers
Category SpamHarassmentChild/Sexual/Violence/...VirusWormTrojanSpywareDialerScanningSniffingSocial EngineeringExploiting of unknown vulnerabilitiesLogin AttemptsNew Attack SignaturePrivileged Account CompromiseUnprivileged Account CompromiseApplication CompromiseDoSDDoSSubotageUnauthorised Access To InformationUnauthorised Modification Of InformationUnauthorized Use Of ResourcesCopyrightMasqueradeAll incidents which don't fit in one of the given categories should be put into this class
Remark
Identify the letters
Committed to reducing the vulnerability of cyberspace, Incident Management and strengthening the culture of cybersecurity
by mda-web01 | 8th October 2012
Name (Required)
Email (Required - will not be published)
Website
Message (Required)