What are the types of information security incidents?

According to the Network Security Law of the People's Republic of China, GBT 24363-2009 Information Security Emergency Plan Specification, GB\T 20984-2007 Information Security Risk Assessment Specification, GB\Z 20985-2007 Information Security Technology Information Network Attack Event Management Guide, GB\ Z 20986-2007 Information Security

Cyber attack events:

Information security incidents that attack the information system through the network or other technical means by using configuration defects, protocol defects, program defects or violent attacks, which cause the information system to be abnormal or potentially harmful to the current operation of the information system, including denial of service attacks, backdoor attacks, vulnerability attacks, network scanning eavesdropping incidents, phishing incidents, interference incidents, etc.

Unwanted program events:

Intentionally manufacturing and spreading harmful programs or information security incidents caused by the influence of harmful programs. Including computer virus events, worm events, Trojan horse events, botnet events, mixed attack program events, malicious code embedded in web pages and so on.

Information leakage event:

Tampering, forging, leaking or stealing the information in the information system through the network or other technical means, resulting in information security incidents. Information leakage events include patent leakage, system active monitoring and abnormal checklist, product bidding, suspected employees leaking customer information, employees leaking company contracts, etc.

Information content security event:

The use of information networks to publish and disseminate security incidents that endanger national security, social stability, public interests and company interests. Including information security incidents that violate laws, regulations and company regulations; Discuss and comment on social issues, form sensitive public opinion hotspots on the internet, and appear information security incidents with a certain hype scale; Organize a series of information security incidents that incite assemblies and processions.