(I) A security event that involves a security violation.
(C) In other words, a security-relevant system event in which the system’s security policy is disobeyed or otherwise breached.
(O) “Any adverse event which compromises some aspect of computer or network security.”
(I) A occurrence in a system that is relevant to the security of the system.
(I) A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder
gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.
(I) An act or event that disobeys or otherwise breaches security policy.