ITSC Security Notices and Action
Common ITSO security notices are given below for reference:
Compromised Host
ITSO has strong evidence that attackers have gained unauthorized access to the computer.
ITSO action
- Host blocked from network access to prevent further damage.
- ITSO emails relevant network log message and location host information to Cyber Security Cordinators.
Your action
- Read the log message that triggered the ITSO notice.
- Reply to ITSO if you believe the alert is “false-positive”.
Otherwise
- Check and clean up the infection or re-install the machine.
- Reply to ITSO with evidence that the above action has been taken.
- ITSO will re-enable network access.
- Reset users’ passwords compromised by using this host.
ITSO will enforce re-installation if the host is found to be compromised again.
Suspicious Host
ITSO detects suspicious network activities but is not sure the host has been compromised. This may be due to rogue software or adware, ill-fate downloader being installed, or malware being downloaded.
ITSO action
- ITSO emails related network log message and host location information to Cyber Security Coordinators.
Your action
- Check if the host is infected.
- If the host has been infected, clean it up.
There is no need to reply to ITSO unless you have other questions.
Vulnerable Host
ITSO scans detect that the host has flaws, which may allow attackers to compromise it. This is usually caused by outdated patches, or if the system configuration is not secure.
ITSO action
- ITSO emails relevant vulnerable information, remedial steps, and host location information to the Cyber Security Coordinators.
Your action
- Apply related patches or the proper secure configurations.
- Reply to ITSO that remedial action has been taken.