Procedures and tools for reporting network and information security incidents
Spam and Phishing
Most spam is automatically blocked by campus spam filters. However, about 15% of spam email can not be identified enough confidence to block. Instead, "spammy" (but possibly legitimate) emails are tagged with
[Spam] in the subject. For more information, please see the support article on setting up a inbox filter for spam.
If you receive an legitimate email that is mistakenly tagged as spam (a "false positive"), please contact the Technology Support Center so that we may better configure our spam filters.
Abuse or Malicious Activity
As per RFC 2142 several email addresses are available for those wishing to report abusive or malicious activity involving a CSUSB computer:
- in the
2607:f380:a62::/48IP address ranges
- assigned a name (resource record) under the
In most cases, a reporter will use one of the following common mailboxes:
|firstname.lastname@example.org||Computer crime, unauthorized access, virus/worm propagation
Be sure to include log information. At a minimum this should include time zone information, timestamps, IP addresses, and protocol information.
See an example email to email@example.com
|firstname.lastname@example.org||Inappropriate use of resources, especially email. This includes reports of spam email, phishing email, or network resources (i.e. bandwidth).
If reporting spam or phishing, be sure to use the Forward as Attachment option. Forward as Attachment includes additional details needed to properly tune the email filtering for the campus.
See an example email to email@example.com
|firstname.lastname@example.org||Web pages and HTTP|
|email@example.com||Operational issues with Email and SMTP. Though, in most cases, firstname.lastname@example.org is more appropriate.|
Copyright infringement and piracy
If in doubt, send your report to email@example.com.