All computer security incidents should be reported to the Information Security and Enterprise Architecture Group. This enables ISEA to monitor and investigate computer security incidents involving University hardware and users. ISEA is able to draw upon other resources within ITS to protect University networks and systems in order to minimize disruption of services caused by such incidents.
ISEA keeps tracks of the number and type of security incidents in order to provide regular reports to senior management on the state of University networks.
In order to ensure that ISEA is able to investigate incidents, it is critical that any system logs (in case of hacking attacks or unauthorized access) and e-mail headers (in case of incidents involving the use of e-mail) are saved. Detailed logs should include information such as date and time of attack, IP numbers, protocols used, etc. Since the forging of e-mail addresses is quite easy to do, it is important that e-mail headers are forwarded to ISEA in order to enable them to identify the origin of an e-mail message. If you are using Outlook, you can view and copy the e-mail headers of a message as follows:
Generally speaking, incidents should be reported through your local System/Network Administrator. If you do not have an Administrator or know who your Administrator is, you may contact ISEA directly by sending us an e-mail.