Security Policies Incident Response Plans

Unauthorized System and Network Access.  

Risk Description

Unauthorized access to systems, programs or databases  

Existing Controls

Basic Control 

Risk Mitigation Policy

  1. Availability of safety and security measures for information 
  1. Develop information security procedures and policies subject to international standards and best practices that set entry procedures and policies 
  2. Raise awareness of information security and save passwords  
  3. Conducting periodic tests to check the possibility of entry of unauthorized person
  4.  Enable Network Access Control (NAC) services 
  5. Make sure the network administrator can monitor all of the network traffic and activities. 
  6. Collect Infrastructure logs in the SIEM system to analyze and detect any suspect activities.   

Location/Contact Person details

The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om

Risk Management Authority

Risk Management Committee in UTAS-SUR

Risk Likelihood

High 

Risk Impact

High 

Risk Level

High 

Risk Incident Response Procedures

  1. Minimize breach impact by isolating affected systems and securing unaffected ones. 
  2. Temporarily suspend the account or change the password 
  3. Prepare the appropriate security team based on the type of breach, whether in network or supporting systems. 
  4. Investigate the breach to identify its causes, assess the damage, and develop alternative solutions. 
  5. Resolve issues and implement measures to prevent future hacks. 
  6. Send a report detailing the breach, its damage, solutions, and provide education to users and employees. 

Risk Termination

By sending the final report explained the problem causes and how we can mitigate next times.