Procedures and tools for reporting network and information security incidents
Spam and Phishing
Most spam is automatically blocked by campus spam filters. However, about 15% of spam email can not be identified enough confidence to block. Instead, "spammy" (but possibly legitimate) emails are tagged with
[Spam] in the subject. For more information, please see the support article on setting up a inbox filter for spam.
If you receive an legitimate email that is mistakenly tagged as spam (a "false positive"), please contact the Technology Support Center so that we may better configure our spam filters.
Abuse or Malicious Activity
As per RFC 2142 several email addresses are available for those wishing to report abusive or malicious activity involving a CSUSB computer:
- in the
2607:f380:a61::/48IP address ranges
- assigned a name (resource record) under the
In most cases, a reporter will use one of the following common mailboxes:
|firstname.lastname@example.org||Computer crime, unauthorized access, virus/worm propagation
Be sure to include log information. At a minimum this should include time zone information, timestamps, IP addresses, and protocol information.
or Inappropriate use of resources (i.e. bandwidth).
If reporting SPAM, be sure to include a sample message with full-headers.
|email@example.com||Web pages and HTTP|
|firstname.lastname@example.org||Email and SMTP|
Copyright infringement and piracy
If in doubt, send your report to email@example.com.