Talk With an Expert

Reporting Unauthorized Intrusions: A 'How To' Guide

Reporting Unauthorized Intrusions: A 'How To' Guide (PDF, 1.74MB)Published: 26 Jul, 2001
Created by:
Melton Roland

You have spent many hours implementing security on your network. Your firewall is running smoothly, you have installed every service pack and patch available. You could wall paper your office with the audits you have been logging. Yet, despite your best efforts criminal hackers somehow compromise your network. What do you do? When an incident happens you may not have the time or focus to search for the proper way of reporting it or the authorities to which it should be reported. This document will provide such information in a few simple steps. The scope of this document is limited to the actions that should be taken after an illegal infiltration into a private or corporate network. It is assumed that the reader already has a good working knowledge of technology security.