0% found this document useful (0 votes)
349 views1 page

Cyber Security Incident Report: Electronic Physical

This 3 sentence summary provides the key details about a cyber security incident report form: The form collects information about a reported security incident including the reporter's contact information, the affected individual or device, a description of the problem, and the type of incident whether it involved unauthorized access, compromised data, theft of identities, or misuse of resources. Security and IT staff would then investigate the incident, collect any evidence, analyze their findings, and recommend further action. The completed form should be emailed to the provided cyber security request address.

Uploaded by

muhammadamir1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
349 views1 page

Cyber Security Incident Report: Electronic Physical

This 3 sentence summary provides the key details about a cyber security incident report form: The form collects information about a reported security incident including the reporter's contact information, the affected individual or device, a description of the problem, and the type of incident whether it involved unauthorized access, compromised data, theft of identities, or misuse of resources. Security and IT staff would then investigate the incident, collect any evidence, analyze their findings, and recommend further action. The completed form should be emailed to the provided cyber security request address.

Uploaded by

muhammadamir1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyber Security Incident Report

Revised 05/31/2016

Office of Technology Services


Security Incident Reporting Form

Reported By:       Phone No.      


Email: Date Reported:      
Agency:       Device Type:      
Name of Individual Affected:       Location/Address of Problem:      
User Description of Problem:      

Incident Type

Electronic Physical
User Compromise Unauthorized Access
Compromised/Stolen/Altered Data Access Control Avoidance
Theft and use of Others ID’s Equipment Stolen or Damaged
Personal Identifying Information (PII) Other
Other If Other Please Explain:
If Other Please Explain:

Misuse of Resources
Unauthorized Use of Remote Control Malicious Code Activity
Unauthorized Use of Software Virus Scan Engine Version _____________
Inappropriate Use of Email DAT Version _____________
Inappropriate Use of State Resources Date of Last Virus Scan ___________
Inappropriate Use of Internet EPO Agent Installed
Unauthorized Solicitation Spam
Illegal Log-in Attempt Other
Hoaxes
If Other Please Explain:
Storage and/or Distribution of illegal Software
Other
If Other Please Explain:

The below items are to be filled out by Administrative & Program Support Branch only

Investigated by:       Evidence Collected (choose) YES


NO
Number of Intruders:       Number of Hosts:      
Incident Source:       Analysis of Findings:
Recommended Action:      
Additional Comments:      

Please send form to EDU.SECURITYREQUEST@KY.GOV

You might also like