Browse Definitions :
Definition

security incident

Contributor(s): Ivy Wigmore

A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed.

In IT, an event is anything that has significance for system hardware or software and an incident is an event that disrupts normal operations. Security events are usually distinguished from security incidents by the degree of severity and the associated potential risk to the organization.

If a single user is denied access to a requested service, for example, that can be considered a security event because there is some possibility that it indicates a compromised system but the access failure could also be caused by a lot of other things and that single event does not typically have a severe impact on the organization. However, if large numbers of users are denied access, it is likely to mean that there is a more serious problem, such as a denial of service (DoS) attack, so that event may be classified as a security incident.

According to NIST Special Publication 800-61, a security incident is the violation of an explicit or implied security policy.

Examples of security incidents:

  • Attempts from unauthorized sources to access systems or data.
  • Unplanned disruption to a service or denial of a service.
  • Unauthorized processing or storage of data.
  • Unauthorized changes to system hardware, firmware, or software.

Processes and products designed to help with security incident management include incident response planning (IRP), security awareness training and security information and event management (SIEM).

This was last updated in November 2016

Continue Reading About security incident

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close