Welcome to the US-CERT Incident Reporting System US-CERT is a partnership between the Department of Homeland Security and the public and private sectors. Established to protect the nation's Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation. This system is used to report cyber-related incidents to US-CERT.
What is an incident? A good but fairly general definition of an incident is The act of violating an explicit or implied security policy. Unfortunately, this definition relies on the existence of a security policy that, while generally understood, varies among organizations. In the questions and answer choices you will see below, we have attempted to characterize below the types of activity we believe are widely recognized as being in violation of a typical security policy. These activities include but are not limited to- attempts (either failed or successful) to gain unauthorized access to a system or its data
- unwanted disruption or denial of service
- the unauthorized use of a system for the processing or storage of data
- changes to system hardware, firmware, or software characteristics without the owner's knowledge, instruction, or consent
We encourage you to report any activities that you feel meet these criteria for an incident. Note that our policy is to keep any information specific to your site confidential unless we receive your permission to release that information. Using the US-CERT Incident Reporting System The system will guide you through a series of questions about your computer security incident. To enable us to provide information that helps you improve your site's security, please answer the questions as completely and accurately as possible. Questions that must be answered are labeled "Required". As always, we will protect your sensitive information. This web site uses Secure Sockets Layer (SSL) to provide secure communications. Your browser must allow at least 40-bit encryption. This method of communication is much more secure than unencrypted email. Special Note: Do NOT use the navigation buttons provided by your browser. This form provides navigation buttons at the bottom of each page.
|