Example Incidents

Employee received phishing email

Incident Name

The name given for the individual incidents.

Employee received phishing email

Incident Description

The description section offers a detailed and complete summary of the incident, providing the reader with a clear understanding of what it entails.

One of our employees received a phishing email.

Rating

For this example we'll suppose that the employee in question did not click any links from the phishing email and reported it straight away, so we'll assign a rating of Low.

Low

Asset Affected

The specific asset(s) which are affect by this incident.

Since this didn't affect any assets we'll leave this blank.

Date Reported

The specific date on which the incident was reported.

20/05/2023

Status

In the context of an Information Security Management System (ISMS), the status of incident can be described as either open or closed.

  • Open - An open incident is a incident that has been identified, assessed, and acknowledged, but has not been mitigated or treated. It remains a potential threat to the organisation and requires further action to reduce its likelihood or impact.

  • Close - A closed incident, on the other hand, is an incident that has been adequately mitigated or treated. The organisation has taken appropriate measures to address the incident, and it no longer poses a significant threat to the information assets.

Closed

Date Closed

The specific date on which the incident was mitigated.

21/05/2023

Category

When reporting an incident in an Information Security Management System (ISMS), incidents can be categorised into several categories, including:

  • Breach: Unauthorised access to sensitive data or systems.

  • Denial of Service: Overwhelming a system or network with traffic or requests to make it unavailable.

  • Physical damage: Physical destruction or damage to IT infrastructure or devices.

  • Theft: Stealing or unauthorised access to physical or digital assets.

  • Vulnerability: Weaknesses or flaws in a system or application that can be exploited by attackers.

  • Misconfiguration: Errors or oversights in system settings or configurations.

  • Exploitation: Taking advantage of a vulnerability or weakness in a system or application.

  • Unauthorised Access Attacks: Gaining access to a system or application without proper authorisation.

  • Privilege Escalation Attacks: Exploiting a vulnerability to gain higher levels of access than authorised.

  • Insider Threat Attacks: Malicious actions taken by an authorised individual within an organisation.

  • Phishing Attacks: Deceptive techniques to trick individuals into revealing sensitive information or performing actions.

  • Man-in-the-Middle (MitM) Attacks: Intercepting communication between two parties to steal or modify information.

  • Password Attacks: Attempting to crack or steal passwords to gain access to systems or applications.

Phishing Attacks

Identified By

The name of the individual who reported the incident.

Frodo Baggins

Last Reviewed

The date when the incident was last reviewed.

21/05/2023

Last updated