HTML Preview It Incident Report page number 1.


No. CS001 Reporting an IT Security Incident July 2009
Introduction
Compromises in security can potentially occur at every level of computing from an individual's
desktop computer to the largest and best-protected systems on campus. Incidents can be accidental
incursions or deliberate attempts to break into systems and can be benign to malicious in purpose or
consequence. Regardless, each incident requires careful response at a level commensurate with its
potential impact to the security of individuals and the campus as a whole. This document outlines
the procedure individuals should follow to report potentially serious IT security incidents and the
actions the Computing Services Department will take upon notification of an IT security incident.
Section I – What to Report
For the purposes of this policy an "IT security incident" is any accidental or malicious act with the
potential to:
Result in misappropriation or misuse of confidential information (social security number,
grades, health records, financial transactions, etc.) of an individual or individuals
Significantly imperil the functionality of the information technology infrastructure of the
ASC campus
Provide for unauthorized access to College resources or information
Allow ASC information technology resources to be used to launch attacks against the
resources and information of other individuals or organizations
Section II - How to Report
ASC faculty and staff should report all suspected computer security incidents to the Computing
Services Help Desk at 587-7741. A help desk representative will record the caller’s contact
information and data about the incident and forward it to the Computing Services Security Working
Group (SWG). It’s recommended that the telephone be used for reporting purposes, rather than e-
mail or other electronic means.
If the person reporting the incident wishes to maintain anonymity, the information may be sent via
the college mail system to the Chief Information Officer. However, be advised that the effectiveness
and timeliness of the response may be hampered if additional necessary information cannot be
attained.
If a security incident is suspected, take the following steps to minimize any potential damage:
Don’t turn the computer off
Isolate the computer by disconnecting the (blue or yellow) network cable connecting the
computer to the data port on the wall
1
DOWNLOAD HERE


One finds limits by pushing them. | Herbert Simon