All computer security incidents should be reported to Computer Security Administration. This enables Computer Security Administration to monitor and investigate computer security incidents involving University computers and users. Computer Security Administration is able to draw upon other resources within Computing & Networking Services to protect University networks and systems in order to minimize disruption of services caused by such incidents. In an emergency you can reach us by calling the Security Hotline at 416-978-1354. Computer Security Administration also keeps tracks of the number and type of security incidents in order to provide regular reports to senior management on the state of University networks.
What sort of incidents should be reported? What sort of incidents should be reported?
To whom should incidents be reported? Generally speaking, incidents should be reported through your SYstem/Network Administrator). If you do not have an Administrator or know who your Administrator is, you may contact Computer Security Administration directly by sending e-mail to security.admin@utoronto.ca. If the incident is serious and will cause serious disruption/damage to your network or operation please submit your report to security.emergency@utoronto.ca. This account is monitored 7x24. How should incidents be reported? In order to ensure that Computer Security Administration is able to investigate incidents, it is critical that any system logs (in case of hacking attacks or unauthorized access) and e-mail headers (in case of incidents involving the use of e-mail) are saved. Detailed logs should include information such as date and time of attack, IP numbers, protocols used, etc. Since the forging of e-mail addressed is quite easy to do, it is important that e-mail headers are forwarded to Computer Security Administration in order to enable them to identify the origin of an e-mail message. If you are using MS Outlook or Outlook Express, you can view and copy the e-mail headers of a message as follows:
Incident Response/Tracking Procedure
|
All contents copyright © University of Toronto 2000-2003 This Site is maintained by the Computer Security Administration Group Comments & Questions |