{"id":687,"date":"2020-10-07T16:44:17","date_gmt":"2020-10-07T16:44:17","guid":{"rendered":"https:\/\/sites.rutgers.edu\/soc\/?page_id=687"},"modified":"2020-10-07T18:20:50","modified_gmt":"2020-10-07T18:20:50","slug":"how-do-i-respond-to-a-computer-abuse-incident","status":"publish","type":"page","link":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/","title":{"rendered":"How do I respond to a computer abuse incident?"},"content":{"rendered":"<p>Rutgers University employs a distributed security model. The RU CIRT reviews incident reports and dispatches them to the appropriate departmental computing staff for resolution. In other words, notification and data collection are centralized while execution and resolution are decentralized.<\/p>\n<p>The RU CIRT reviews and forwards reports to departmental computing staff for resolution. A response from the department is expected within 3 days. Devices that impact the operation of RUNet are subject to blocking and\/or removal from RUNet.<br \/>\nA response by departmental computing staff to\u00a0<a href=\"mailto:abuse@rutgers.edu\">abuse@rutgers.edu<\/a>\u00a0indicating that the issue has been resolved is appreciated. Please reply as to:<\/p>\n<ul>\n<li>whether\u00a0Restricted or Internal information stored on the device? If\n<div>so, please briefly describe the data. \u00a0See Rutgers University policy on<\/div>\n<div><a href=\"http:\/\/policies.rutgers.edu\/sites\/policies\/files\/70.1.2%20-%20current.pdf\">Information Classification<\/a><\/div>\n<div><\/div>\n<\/li>\n<li>what you found upon your investigation of the problem<\/li>\n<li>what steps were taken to fix the problem<\/li>\n<li>whether the report was valid or a false positive<\/li>\n<\/ul>\n<p><strong>Note:<\/strong>\u00a0Please do not send sensitive information in email.<br \/>\n<em>Please retain the subject line so that we can more easily track responses to issues.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rutgers University employs a distributed security model. The RU CIRT reviews incident reports and dispatches them to the appropriate departmental computing staff for resolution. In other words, notification and data &hellip; <a href=\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\" class=\"\">Read More<\/a><\/p>\n","protected":false},"author":112,"featured_media":0,"parent":694,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-687","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How do I respond to a computer abuse incident? - Security Operations Center<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do I respond to a computer abuse incident? - Security Operations Center\" \/>\n<meta property=\"og:description\" content=\"Rutgers University employs a distributed security model. The RU CIRT reviews incident reports and dispatches them to the appropriate departmental computing staff for resolution. In other words, notification and data &hellip; Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Operations Center\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-07T18:20:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\",\"url\":\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\",\"name\":\"How do I respond to a computer abuse incident? - Security Operations Center\",\"isPartOf\":{\"@id\":\"https:\/\/sites.rutgers.edu\/soc-archive\/#website\"},\"datePublished\":\"2020-10-07T16:44:17+00:00\",\"dateModified\":\"2020-10-07T18:20:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sites.rutgers.edu\/soc-archive\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incident Response\",\"item\":\"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How do I respond to a computer abuse incident?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sites.rutgers.edu\/soc-archive\/#website\",\"url\":\"https:\/\/sites.rutgers.edu\/soc-archive\/\",\"name\":\"Security Operations Center\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sites.rutgers.edu\/soc-archive\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do I respond to a computer abuse incident? - Security Operations Center","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/","og_locale":"en_US","og_type":"article","og_title":"How do I respond to a computer abuse incident? - Security Operations Center","og_description":"Rutgers University employs a distributed security model. The RU CIRT reviews incident reports and dispatches them to the appropriate departmental computing staff for resolution. In other words, notification and data &hellip; Read More","og_url":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/","og_site_name":"Security Operations Center","article_modified_time":"2020-10-07T18:20:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/","url":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/","name":"How do I respond to a computer abuse incident? - Security Operations Center","isPartOf":{"@id":"https:\/\/sites.rutgers.edu\/soc-archive\/#website"},"datePublished":"2020-10-07T16:44:17+00:00","dateModified":"2020-10-07T18:20:50+00:00","breadcrumb":{"@id":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/how-do-i-respond-to-a-computer-abuse-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sites.rutgers.edu\/soc-archive\/"},{"@type":"ListItem","position":2,"name":"Incident Response","item":"https:\/\/sites.rutgers.edu\/soc-archive\/incident_response\/"},{"@type":"ListItem","position":3,"name":"How do I respond to a computer abuse incident?"}]},{"@type":"WebSite","@id":"https:\/\/sites.rutgers.edu\/soc-archive\/#website","url":"https:\/\/sites.rutgers.edu\/soc-archive\/","name":"Security Operations Center","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sites.rutgers.edu\/soc-archive\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/pages\/687"}],"collection":[{"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/comments?post=687"}],"version-history":[{"count":4,"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/pages\/687\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/pages\/687\/revisions\/711"}],"up":[{"embeddable":true,"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/pages\/694"}],"wp:attachment":[{"href":"https:\/\/sites.rutgers.edu\/soc-archive\/wp-json\/wp\/v2\/media?parent=687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}