Security incidents are possible within an information systems infrastructure

What types of security incidents are possible within an information systems infrastructure? Select one such incident and detail how you would respond to the incident.