




全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Security Incident Reporting FormInstructions: To enhance mutual support, Texas Administrative Code Chapter 202.26 and 202.76, Security Incidents requires each state agency and institution of higher education (agency/IHE) to report all security incidents in a timely and secure manner to the Texas Department of Information Resources (DIR). Each agency/IHE is responsible for assessing the significance of a security incident within their organization and for submitting this report to DIR based on the business impact on affected resources and the current and potential technical effect of the incident (e.g., loss of revenue, productivity, access to services, reputation, unauthorized disclosure of confidential information, or propagation to other networks). Please use the following form to document relevant security incident information.Depending on the criticality of the incident, gathering all information prior to reporting to DIR may not always be feasible. In such cases, incident response teams should make an initial report and then continue to report information to the DIR as it is collected.All security incident reports provided to DIR in response to TAC 202 requirements will be classified and handled as Confidential per Chapter 2059.055 Texas Government Code (TGC) andChapter 552.139 Texas Business and Commerce Code (TB&CC).If criminal action is suspected, (e.g., violations of Chapter 33, Penal Code, Computer Crimes, or Chapter 33A, Penal Code, Telecommunications Crimes), the agency/IHE is also responsible for contacting the appropriate law enforcement and investigative authorities. 1. Contact InformationFull name:Job title:Agency/IHE:Division or office:Work phone:Mobile phone:E-mail address:Fax number:Additional contact information:2. Type of Incident (Check all that apply)c Account compromise (e.g., lost password)c Denial-of-Service (including distributed)c Malicious code (e.g., virus, worm, Trojan)c Misuse of systems (e.g., acceptable use)c Reconnaissance (e.g., scanning, probing)c Social engineering (e.g., phishing, scams)c Technical vulnerability (e.g., 0-day attacks)c Theft/loss of equipment or mediac Unauthorized access (e.g., systems, devices)c Unknown/Other (Please describe below)Description of incident:3. Scope of Incident (Check one)c Critical (e.g., affects public safety or state-wide information resources)c High (e.g., affects agency/IHEs entire network or critical business or mission systems)NOTE: All incidents deemed critical or high require additional notification by phone.c Medium (e.g., affects agency/IHEs network infrastructure, servers, or admin accounts)c Low (e.g., affects agency/IHEs workstations or user accounts only)c Unknown/Other (Please describe below)Estimated quantity of systems affected:Estimated quantity of users affected:Third parties involved or affected:(e.g., vendors, contractors, partners)Additional scope information:4. Impact of Incident (Check all that apply)c Loss of access to servicesc Loss of productivityc Loss of reputationc Loss of revenuec Propagation to other networksc Unauthorized disclosure of data/information c Unauthorized modification of data/informationc Unknown/Other (Please describe below)Estimated total cost incurred:(e.g., cost to contain incident, restore systems, notify data owners)Additional impact information:5. Sensitivity of Affected Data/Information (Check all that apply)c Confidential/sensitive data/infoc Non-sensitive data/infoc Publicly available data/infoc Financial data/infoc Personally identifiable information (PII)c Intellectual property/copyrighted data/infoc Critical infrastructure/key resourcesc Unknown/other (Please describe below)Data encrypted? Yes _ No _Quantity of data/information affected:(e.g., file sizes, number of records)Additional affected data information:6. Systems Affected by Incident (Provide as much detail as possible)Attack sources (e.g., IP address, port):Attack destinations (e.g., IP address, port):IP addresses of affected systems:Domain names of affected systems:Primary functions of affected systems:(e.g., web server, domain controller)Operating systems of affected systems:(e.g., version, service pack, configuration)Patch level of affected systems:(e.g., latest patches loaded, hotfixes)Security software loaded on affected systems:(e.g., anti-virus, anti-spyware, firewall, versions, date of latest definitions)Physical location of affected systems:(e.g., state, city, building, room, desk)Additional system details:7. Users Affected by Incident (Provide as much detail as possible)Names and job titles of affected users:System access levels or rights of affected users:(e.g., regular user, domain administrator, root)Additional user details:8. Timeline of Incident (Provide as much detail as possible)a. Date and time when agency/IHE first detected, discovered, or was notified about the incident:b. Date and time when the actual incident occurred:(estimate if exact date and time unknown)c. Date and time when the incident was contained or when all affected systems or functions were restored:(use latest date and time)Elapsed time between the incident and discovery:(e.g., difference between a. and b. above)Elapsed time between the discovery and restoration:(e.g., difference between a. and c. above)Detailed incident timeline:9. Remediation of Incident (Provide as much detail as possible)Actions taken to identify affected resources:Actions taken to remediate incident:Actions planned to prevent similar incidents:Additional remediation details:10. Miscellaneous (Provide any other relevant information)Additional information:PLEASE NOTE: All Security Incident Reporting Forms and accompanying documentation must be transmitted to
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 协议书离职的离职证明
- 代持股票协议书
- 2025共同租赁土地合作种植合同
- 早教签协议书
- 转租合同协议书
- 婚后罚款协议书
- 离婚协议书范本成都
- 大专协议书班
- 合伙购房协议书
- 2025网站买卖合同
- 咸阳社区面试题及答案
- 年产3万吨生物基PTT聚合项目环评资料环境影响
- 电力工程施工进度及安全保障措施
- GB/T 19973.2-2025医疗产品灭菌微生物学方法第2部分:用于灭菌过程的定义、确认和维护的无菌试验
- 装修合同意向协议书
- 鸡蛋分拣培训课件
- 浙江省家庭居室装饰装修施工合同(示范文本)(2021版)
- 安全隐患整改回复单
- 桂林旅游学院新生入馆教育学习通超星期末考试答案章节答案2024年
- 2025年慢性阻塞性肺疾病全球创议GOLD指南修订解读课件
- 2024年国家宪法日知识竞赛考试题库500题(含答案)
评论
0/150
提交评论