1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Risky
Actions that look deliberate and potentially malicious—e.g., a service modifying system files, uploading sensitive data off‐network, or executing unsigned binaries. These behaviors pose clear, high‐impact threats and should trigger immediate alerts and user training
Unexpected
Legitimate activities happening outside of established norms—such as a user suddenly logging in from a foreign country, large spikes in data transfers, or access attempts at odd hours. While not inherently malicious, they deviate from baseline behavior and warrant investigation
Unintentional
Honest mistakes or misconfigurations that introduce risk—like mistyping a URL, losing track of a USB drive, or accidentally disabling security settings. Though non-malicious, these errors can expose vulnerabilities and should be caught by automated monitoring and corrected via training or policy enforcement
Answer
answer