Actions taken through the use of an information system or network that result in an actual or potentially adverse effect on an information system, network, and/or the information residing therein. See incident. See also event, security-relevant event, and intrusion.
Sources:
CNSSI 4009-2015
under cyber incident
Actions taken through the use of an information system or network that result in an actual or potentially adverse effect on an information system, network, and/or the information residing therein.
Sources:
NIST SP 800-160 Vol. 2 Rev. 1
under cyber incident
from
CNSSI 4009-2015
Any event that attempts to change the security state of the system (e.g., change access controls, change the security level of a user, change a user password). Also, any event that attempts to violate the security policy of the system (e.g., too many logon attempts).
Sources:
NISTIR 5153
under Security Relevant Event
from
DoD 5200.28-STD