USAFAVA17-201网络事件报告援助

VIP文档

ID:61891

阅读量:0

大小:0.10 MB

页数:1页

时间:2023-06-07

金币:10

上传者:战必胜
NETWORK INCIDENT REPORTING AID
OPSEC DO NOT DISCUSS/TRANSMIT
SENSITIVE INFORMATION OVER
UNAUTHORIZED SYSTEMS
COMPUTER
VIRUS
REPORTING PROCEDURES FOR
USERS
STEP 1
STOP! DISCONNECT THE LAN CABLE.
Discontinue use of the system.
STEP 2
LEAVE THE SYSTEM POWERED UP.
DO NOT click on any prompts, close any windows,
or shut down the system.
STEP 3
REPORT
IT IMMEDIATELY!
Contact your section Cyber Security Liaison (CSL).
If an CSL is unavailable contact the Communications
Focal Point (CFP). (See List on Reverse Side)
STEP 4
If a message appears on the monitor of the affected
system
WRITE
IT DOWN!
STEP 5
WRITE DOWN ALL ACTIONS that occurred during
the suspected virus attack. (i.e. Received suspicious
e-mail with attachments; Inserted unchecked disk;
Downloaded unchecked/unsecured files; etc.)
STEP 6
Answer questions on reverse side of this form.
NOTE: When reporting a suspected virus to your CSL or the CFP ensure
that you answer questions on reverse side of this form and provide the
technician with your name and number.
CLASSIFIED MESSAGE INCIDENT (CMI)
REPORTING PROCEDURES FOR USERS
A CMI is defined as a classified message that has been sent and/or
received over an unclassified network.
STEP 1
STOP!
DISCONNECT THE LAN CABLE
Discontinue use of the system and
DO NOT print the classified message.
STEP 2
REPORT INCIDENT IMMEDIATELY TO UNIT SECURITY
MANAGER. DO NOT discuss details of the CMI over
unsecure lines. Call an IAO, Supervisor, or the
Communications Focal Point (CFP).
STEP 3
SECURE affected system(s) / printer(s), area / room and
wait for CFP personnel to assist. Limit the exposure of
the CMI. DO NOT leave the system until relieved by
IAO or CFP Personnel.
STEP 4
Answer questions on reverse side of this form.
INFOCON
LEVELS
INFOCON presents a structured, coordinated approach to defend against and
react to adversarial attacks on DoD computer/telecommunication systems and
networks. INFOCON levels are as follows:
INFOCON 5: Routine NetOps: Normal readiness of information systems
and networks that can be sustained indefinitely.
INFOCON 4: Increased Vigilance: In preparation for operations or
exercises, with a limited impact to the end user.
INFOCON 3: Enhanced Readiness: Increases the frequency of
validation of information networks and its corresponding
configuration.
Impact
to end user is minor.
INFOCON 2: Greater Readiness: Increases the frequency of validation
of information networks and its corresponding configuration. Impact
to administrators will increase and impact to end user could be
significant.
INFOCON 1: Maximum Readiness: Addresses intrusion techniques that
cannot be identified or defeated at lower readiness levels. Only
implemented in limited cases. Could be significant impact on
administrators and end users.
USAFAVA17-201, 2 Jul 2017
PER AFMAN 17-1301
OPR: HQ USAFA/A6, Releasability: USAFA Personnel Only
CyberSecurity
Is everyone’s business
10 CS IT Service Desk
Bldg: 2354
Fairchild
Hall
USAF Academy,
CO 80840
333-4357
MY CyberSecurity Liason (CSL) IS:
What to tell CSL and/or CFP
Exact File Name including extension:
Subject of the email:
Who sent the file or email:
List of people the file or email was sent to:
Was the file or email forwarded: if so to whom?
DEPLOY/POST THIS AID NEAR
COMPUTER WORKSTATIONS
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭