- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Abnormal Database Access Scenario
Learn about the Compromised Credentials Abnormal Database Access scenario.
The Abnormal Database Access scenario describes when an attacker compromises valid credentials and starts accessing or interacting with databases differently.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Abnormal Database Access scenario falls under the Compromised Credentials use case.