và chúng thường làm việc quá sức vì nó. Vì vậy, bạn cần phải ghi nhớ rằng bạn nên thực hiện thu thập thông tin kiểm kê đơn giản và hiệu quả nhất có thể cho họ và bạn cần phải phát triển và duy trì một mối quan hệ tích cực với họ. Nếu không có hỗ trợ kịp thời và chính xác của họ, | 178 Chapter 11 Addressing Incident Response Table continued Types of Security Incidents ID No. Incident Name Incident Description 11 Insider Threat Unauthorized Access Any type of unauthorized use of an account outside the account s authorized levels of privilege for normal usage 12 Insider Threat Administrator Error An unintentional security breach that occurs due to an administrative error . incorrect configuration 13 Installation of Unlicensed Software Installation of software that is not approved or licensed by the agency includes commercial software custom code freeware and media 14 IP Address Spoofing An attack where an unauthorized user gains access to a computer or a network by making it appear that a message or packet has come from a trusted machine by spoofing the IP address of that machine 15 Java or ActiveX Exploitation Any circumstance that creates exploitation of Java or ActiveX 16 MAC Address Spoofing An attack where an unauthorized user gains access to a computer or a network by making it appear that a message or packet has come from a trusted machine by spoofing the MAC address of the trusted machine 17 Malicious Code Indication of a computer virus worm or Trojan whether destructive or harmless 18 Loss or Theft An indication that a computer system or media has been lost or stolen 19 Man-in-the-Middle Attack An attack where a malicious party intercepts and or alters a legitimate communication between two friendly parties without the knowledge of the original sender or recipient Continued Addressing Incident Response Chapter 11 179 Table continued Types of Security Incidents ID No. Incident Name Incident Description 20 Network Bandwidth Attack An unusual and unauthorized increase in network traffic possibly induced by a user downloading excessive amounts of data or using unauthorized tools that reserve large amounts of bandwidth 21 Other Attacks All other circumstances in which a security incident occurs but cannot be .