Content with label attack in IS&T Contributions (See content from all spaces)
Related Labels:
reflection, breach, c-security-network, udp, c-computer-security, a, abuse, security, received, notice
Page:
I received a UDP reflection attack notice
Q: Answer Periodically, IS&T's Security Operations Team will scan MITnet for known bad behaviors that indicate a system compromise. When these behaviors are detected, notices are sent to registered host owners asking them to investigate and address the issue. Why did ...
Other labels:
c-security-network, received, a, udp, reflection, notice
|
Page:
My computer is under attack. Whom should I tell?
Answer Network breaches / abuses / vulnerabilities are handled by IT Security Systems & Services. See http://ist.mit.edu/security
Other labels:
breach, abuse, security, c-computer-security
|
|
|
|
|