• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

In the categories of threat actions, how is misuse defined by VERIS?

  • Misuse is defined as “all attempts to intentionally access or harm information assets without (or exceeding) authorization by circumventing or thwarting logical security mechanisms.”
  • Misuse is defined as “use of deception, intimidation, or manipulation to exploit the human element.”
  • Misuse is defined as “any malicious software, script, or code that is run on a device that alters its state or function without the owner’s informed consent.”
  • Misuse is defined as the use of entrusted organizational resources or privileges for any purpose contrary to what was intended.
Explanation & Hint:

In the categories of threat actions as defined by VERIS (Vocabulary for Event Recording and Incident Sharing), misuse is defined as the use of entrusted organizational resources or privileges for any purpose contrary to what was intended. This involves situations where individuals abuse their access rights within an organization, using resources or information in ways that are not aligned with their intended or authorized use. This can include various activities, such as unauthorized use of systems, data theft by insiders, or any other actions that misuse the access or privileges granted to an individual within an organization.

For more Questions and Answers:

Threat Response Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments