STANDARD FOR THREAT DETECTION AND PREVENTION

 

The University of Texas at San Antonio

Office of Information Technology

Office of Information Security (OIS) Standards

 

OIS 34 – Standard for Threat Detection and Prevention

 


I.  STANDARD STATEMENT


UTSA's Office of Information Security (OIS) is charged with taking steps to preserve the security of the network and devices which are connected to the UTSA network, and is authorized to monitor network traffic and to probe systems, ports and devices for the purpose of identifying attacks and compromises within the network.

 


II. RATIONALE


This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.

 


III. SCOPE


This standard applies to all UTSA faculty, staff, and students.

 


IV. CONTACTS


If you have any questions about OIS 34 – Standard for Threat Detection and Prevention contact the following office:

 

The Office of Information Security

informationsecurity@utsa.edu

 


 V. PROCEDURES  


1. All devices connected to the UTSA network are subject to this monitoring, including those not owned and operated by the university.
 
2. OIS will monitor patterns and attributes of network traffic, but not the information content, except as needed to identify attacks and compromises or at the request of the UTSA legal staff.
 
3. When potential or confirmed attacks or compromises are detected or threats are identified, OIS may take steps to reduce or eliminate the associated risk. Actions which may be taken include, but are not limited to, blocking access from attack sources, restricting access to targeted UTSA systems, disabling account access, blocking access to vulnerable services and contacting those affected by these actions.

 

______________________________________________________________________________

Effective Date: July 7, 2012

Last Revised: November 12, 2014

Reviewed: July 10, 2017

<< Back