Computer Security Incident FAQs
What are the indications of a
compromised system or a system under attack?
What do I do if I suspect my system is
How do I report
suspected security incidents - e.g. probes or attacks on my
What happens when UD IT-Security detects a compromised
system on the network?
Employees - What do I do if my network access has
Employees - What happens when my
computer's security is breached and it contains others' personal
Students - What do I do if my network access has
What steps should I take to prevent this from
What should I do if my computer or hard drive
Who should I contact if I am being harassed or threatened
via e-mail, IM or other electronic communications?
Copyright ©2006, University of Delaware