Responding to computer security incidents, generally, is not a simple matter. Virus or Trojan’s requires technical knowledge, communication, and coordination among personnel who respond to the incident. Accordingly, the goals of this plan are:
- Helping affected entities recover quickly and efficiently from security incidents.
- Minimizing the impact due to the loss or theft of information or disruption of critical computing services when incidents occur.
Responding, systematically, following proven procedures, which will dramatically decrease the likelihood of reoccurrence.
Balancing the operational and security requirements within realistic budgetary constraints.
For additional information please see University Policy 11210 Responsible Use of University Computing Resources.