scenario_id
int64 1
50
| domain
stringclasses 3
values | situation
stringlengths 13
31
| context
stringlengths 3
23
| human_thought_process
stringlengths 13
72
| possible_mistake
stringlengths 9
25
| correct_decision
stringlengths 16
37
| risk_level
stringclasses 4
values | explanation
stringlengths 14
35
|
|---|---|---|---|---|---|---|---|---|
1
|
cybersecurity
|
Multiple failed login attempts
|
Corporate VPN
|
Could be user error or brute force. Need to check IP pattern and timing.
|
Disable all VPN access
|
Block suspicious IP and alert SOC
|
medium
|
Targeted blocking avoids disruption
|
2
|
system
|
Server disk usage suddenly full
|
Production Linux server
|
Logs or backups might have grown unexpectedly.
|
Delete random files
|
Analyze disk usage and clean safely
|
high
|
Blind deletion risks data loss
|
3
|
network
|
High latency reported
|
Office LAN
|
Is this congestion, faulty switch, or external issue?
|
Restart all devices
|
Trace route and isolate bottleneck
|
medium
|
Root cause analysis saves time
|
4
|
cybersecurity
|
Phishing email reported
|
Employee inbox
|
Check sender domain and email headers.
|
Ignore single report
|
Analyze and warn all users
|
high
|
Early warning prevents spread
|
5
|
system
|
CPU spike at night
|
Cloud VM
|
Scheduled job or malicious process?
|
Reboot VM
|
Check cron jobs and running processes
|
high
|
Reboot hides root cause
|
6
|
network
|
Packet loss detected
|
ISP connection
|
Could be ISP issue or local cable fault.
|
Change router immediately
|
Test locally and contact ISP
|
medium
|
Avoid unnecessary replacement
|
7
|
cybersecurity
|
Unknown USB plugged in
|
Office PC
|
USB could contain malware.
|
Open files to check
|
Isolate system and scan USB
|
high
|
USB attacks are common
|
8
|
system
|
Application crashes repeatedly
|
Production app
|
Check logs before blaming code.
|
Redeploy blindly
|
Inspect error logs
|
medium
|
Logs reveal exact issue
|
9
|
cybersecurity
|
Password reuse detected
|
User audit
|
User convenience vs security risk.
|
Ignore minor reuse
|
Force password reset
|
medium
|
Reuse increases breach risk
|
10
|
network
|
WiFi speed drops
|
Campus WiFi
|
Too many users or interference?
|
Increase bandwidth
|
Change channel and optimize APs
|
low
|
Optimization is cheaper
|
11
|
cybersecurity
|
Admin login from new country
|
Cloud console
|
Could be travel or compromise.
|
Disable admin
|
Verify activity and MFA logs
|
high
|
Context matters
|
12
|
system
|
Memory leak suspected
|
Backend service
|
Gradual memory growth indicates leak.
|
Restart service
|
Profile memory usage
|
high
|
Restart is temporary fix
|
13
|
network
|
DNS resolution slow
|
Internal DNS
|
Cache or upstream issue?
|
Switch public DNS
|
Fix internal DNS config
|
medium
|
Internal reliability matters
|
14
|
cybersecurity
|
Ransomware note found
|
User system
|
Immediate isolation needed.
|
Pay ransom
|
Disconnect system and start IR
|
critical
|
Containment is priority
|
15
|
system
|
Backup job failed
|
Database server
|
Storage or permission issue?
|
Ignore single failure
|
Investigate immediately
|
high
|
Backups are critical
|
16
|
network
|
Firewall blocking legit traffic
|
Enterprise firewall
|
Rule misconfiguration likely.
|
Disable firewall
|
Adjust specific rule
|
high
|
Firewall protects network
|
17
|
cybersecurity
|
Suspicious PowerShell script
|
System logs
|
PowerShell often abused.
|
Delete script
|
Analyze source and intent
|
high
|
Forensics needed
|
18
|
system
|
Time drift observed
|
Distributed system
|
Clock mismatch affects logs.
|
Ignore seconds drift
|
Sync NTP across systems
|
medium
|
Time consistency matters
|
19
|
network
|
VPN users disconnected
|
Remote workforce
|
Server overload or ISP issue?
|
Restart VPN server
|
Check load and logs
|
medium
|
Restart may worsen issue
|
20
|
cybersecurity
|
API key exposed in repo
|
Public GitHub
|
Key likely compromised.
|
Do nothing
|
Revoke and rotate key
|
critical
|
Keys must be rotated
|
21
|
system
|
Service dependency missing
|
Microservices
|
Config mismatch after deploy.
|
Rollback immediately
|
Fix dependency config
|
medium
|
Rollback not always needed
|
22
|
network
|
ARP spoofing suspected
|
LAN network
|
Unusual MAC-IP mapping.
|
Ignore alerts
|
Enable ARP inspection
|
high
|
ARP attacks enable MITM
|
23
|
cybersecurity
|
User clicks suspicious link
|
Office laptop
|
Endpoint may be compromised.
|
Scold user
|
Scan system and educate
|
medium
|
Education reduces future risk
|
24
|
system
|
High I/O wait
|
Database server
|
Disk bottleneck or query issue.
|
Add more RAM
|
Optimize queries or storage
|
high
|
Correct resource matters
|
25
|
network
|
Load balancer uneven traffic
|
Web servers
|
Health checks misconfigured.
|
Restart LB
|
Fix health check rules
|
medium
|
Restart hides config issue
|
26
|
cybersecurity
|
Malware detected by AV
|
Endpoint
|
False positive or real?
|
Ignore AV
|
Quarantine and analyze
|
high
|
Ignoring AV is dangerous
|
27
|
system
|
Config file overwritten
|
Server reboot
|
Automation tool issue.
|
Manually edit
|
Fix automation script
|
medium
|
Automation errors repeat
|
28
|
network
|
Port scan detected
|
Firewall logs
|
Recon activity likely.
|
Ignore low volume
|
Block source and monitor
|
medium
|
Early blocking helps
|
29
|
cybersecurity
|
Privilege escalation attempt
|
Server logs
|
Serious breach indicator.
|
Restart server
|
Investigate immediately
|
critical
|
Restart destroys evidence
|
30
|
system
|
Service starts slowly
|
Application server
|
Cold start or dependency delay.
|
Increase CPU
|
Optimize startup sequence
|
low
|
Performance tuning needed
|
31
|
network
|
MTU mismatch issue
|
VPN tunnel
|
Fragmentation causing drops.
|
Ignore small drops
|
Align MTU settings
|
medium
|
MTU mismatch common issue
|
32
|
cybersecurity
|
Social engineering call
|
Helpdesk
|
Caller urgency suspicious.
|
Reset password
|
Verify identity strictly
|
high
|
Social attacks bypass tech
|
33
|
system
|
Database connection timeout
|
App backend
|
Pool exhaustion likely.
|
Restart DB
|
Increase pool and fix leaks
|
high
|
Restart is temporary
|
34
|
network
|
Duplicate IP detected
|
Office LAN
|
Static IP conflict.
|
Restart device
|
Resolve IP assignment
|
low
|
Conflict causes instability
|
35
|
cybersecurity
|
Unusual outbound traffic
|
Server firewall
|
Possible data exfiltration.
|
Ignore off-hours
|
Analyze destination and volume
|
critical
|
Data loss risk
|
36
|
system
|
Log files missing
|
Server audit
|
Rotation or tampering?
|
Assume rotation
|
Check audit policies
|
high
|
Logs are evidence
|
37
|
network
|
Switch port flapping
|
Data center
|
Cable or NIC fault.
|
Ignore alerts
|
Replace cable/NIC
|
medium
|
Hardware issues degrade network
|
38
|
cybersecurity
|
MFA disabled by user
|
Account settings
|
Security weakened.
|
Allow for convenience
|
Force MFA re-enable
|
high
|
MFA is critical
|
39
|
system
|
Kernel panic observed
|
Linux server
|
Hardware or driver issue.
|
Reboot repeatedly
|
Analyze crash dump
|
critical
|
Repeated panic worsens damage
|
40
|
network
|
BGP route change detected
|
ISP network
|
Possible hijack.
|
Ignore brief change
|
Verify routing integrity
|
critical
|
Routing attacks are severe
|
41
|
cybersecurity
|
Unauthorized software installed
|
Employee PC
|
Policy violation.
|
Uninstall silently
|
Investigate intent
|
medium
|
Could be insider threat
|
42
|
system
|
Service health check failing
|
Monitoring alert
|
False alert or real issue?
|
Mute alert
|
Verify service status
|
medium
|
Alerts guide action
|
43
|
network
|
Wireless rogue AP detected
|
Office
|
Possible evil twin.
|
Ignore unknown AP
|
Locate and remove AP
|
high
|
Rogue AP steals data
|
44
|
cybersecurity
|
Email attachment opened
|
User system
|
Malware risk.
|
Wait for symptoms
|
Scan immediately
|
high
|
Early detection helps
|
45
|
system
|
Environment variables missing
|
App deploy
|
Config error.
|
Hardcode values
|
Fix environment config
|
medium
|
Hardcoding is unsafe
|
46
|
network
|
Excessive broadcast traffic
|
LAN
|
Loop or misconfig.
|
Restart switches
|
Find loop and fix STP
|
high
|
Broadcast storms are dangerous
|
47
|
cybersecurity
|
Session hijack suspected
|
Web app
|
Token leakage?
|
Ignore rare case
|
Invalidate sessions
|
high
|
Sessions must be protected
|
48
|
system
|
Cache inconsistency
|
Distributed cache
|
Stale data served.
|
Disable cache
|
Fix invalidation logic
|
medium
|
Cache improves performance
|
49
|
network
|
Slow file transfers
|
SFTP server
|
Encryption overhead or disk?
|
Disable encryption
|
Optimize disk and cipher
|
medium
|
Security should remain
|
50
|
cybersecurity
|
Unknown scheduled task
|
System audit
|
Persistence technique.
|
Ignore if idle
|
Investigate task origin
|
high
|
Persistence enables long attacks
|
YAML Metadata
Warning:
empty or missing yaml metadata in repo card
(https://huggingface.co/docs/hub/datasets-cards)
Human-Like Reasoning Security Scenarios
A handcrafted dataset of realistic cybersecurity, system, and network scenarios focused on human-style reasoning, not just final answers.
Why this dataset is different
- Includes human thought processes
- Covers common mistakes
- Explains correct decisions
- Designed for reasoning-based AI models
Domains
- Cybersecurity
- Systems
- Networking
Use Cases
- LLM fine-tuning
- AI agent training
- Cybersecurity education
- Decision-making simulations
Format
CSV (easily convertible to JSON)
- Downloads last month
- 25