Perfectyash's picture
Create data.csv
3e428f5 verified
text,label
An employee clicks a phishing email pretending to be HR,High Risk
A developer pushes API keys to a public GitHub repository,High Risk
Firewall rules are reviewed and tightened quarterly,Low Risk
An unknown USB drive is plugged into an office computer,High Risk
Multi-factor authentication is enabled for all admin accounts,Low Risk
A server is running an outdated operating system,Medium Risk
An employee reports a suspicious email to IT immediately,Low Risk
Database backups are stored without encryption,High Risk
Antivirus definitions are updated daily,Low Risk
An open port is detected during a routine security scan,Medium Risk
Employees reuse the same password across multiple systems,High Risk
Security awareness training is conducted every six months,Low Risk
A company laptop is lost without disk encryption enabled,High Risk
Access logs are reviewed only after an incident occurs,Medium Risk
Critical systems are isolated using network segmentation,Low Risk
An intern is given admin access without approval,High Risk
Patch management is delayed due to operational workload,Medium Risk
A public Wi-Fi network is used without a VPN for work tasks,High Risk
Security alerts are ignored due to alert fatigue,Medium Risk
Sensitive files are shared through unsecured messaging apps,High Risk
An organization enforces least-privilege access policies,Low Risk
Default credentials are left unchanged on network devices,High Risk
A web application lacks input validation,Medium Risk
Intrusion detection systems are actively monitored,Low Risk
Employees disable antivirus to improve performance,High Risk
Incident response plans are documented but not tested,Medium Risk
Password managers are recommended and enforced,Low Risk
Third-party vendors are not security-audited,Medium Risk
Logs are centrally collected and correlated,Low Risk
A critical vulnerability is publicly disclosed but not patched,High Risk
Developers follow secure coding guidelines,Low Risk
Remote access is allowed without MFA,High Risk
Security patches are applied after testing,Low Risk
Unauthorized software is installed on workstations,Medium Risk
Privileged access is time-bound and monitored,Low Risk
A cloud storage bucket is publicly accessible,High Risk
Employees share credentials to meet deadlines,High Risk
Regular penetration testing is conducted,Low Risk
Alerts are generated but not reviewed daily,Medium Risk
An email gateway blocks known malicious domains,Low Risk