UD Computer Security

Computer Security Incident FAQs

 

 
  Security Breach Procedures

Protecting Personal Non-Public Information

Responsible Computing
A Manual for:

   Staff
   Students

Student Guide to University Policies

Computer Security Home

What are the indications of a compromised system or a system under attack?

What do I do if I suspect my system is compromised?

How do I report suspected security incidents - e.g. probes or attacks on my system?

What happens when UD IT-Security detects a compromised system on the network?

Employees - What do I do if my network access has been terminated?

Employees - What happens when my computer's security is breached and it contains others' personal non-public information?

Students - What do I do if my network access has been terminated?

What steps should I take to prevent this from happening again?

What should I do if my computer or hard drive is stolen?

Who should I contact if I am being harassed or threatened via e-mail, IM or other electronic communications?



Questions / comments?
Copyright ©2006, University of Delaware