Typical indications of security incidents include any or all of the following:

(a) A system alarm or similar indication from an intrusion detection tool

(b) Suspicious entries in system or network accounting (e.g., a UNIX user obtains root access without going through the normal sequence necessary to obtain this access)

(c) Accounting discrepancies (e.g., someone notices an 18-minute gap in the accounting log in which no entries whatsoever appear)

(d) Unsuccessful logon attempts

(e) Unexplained, new user accounts

(f) Unexplained, new files or unfamiliar file names

(g) Unexplained modifications to file lengths or/or dates, especially in system executable files

(h) Unexplained attempts to write to system files or changes in system files

(i) Unexplained modification or deletion of data

(j) Denial of service or inability of one or more users to login to an account

(k) System crashes

(l) Poor system performance

(m) Unauthorized operation of a program or sniffer device to capture network traffic

(n) "Door knob rattling" (e.g., use of attack scanners, remote requests for information about systems and/or users, or social engineering attempts)

(o) Unusual time of usage (remember, more security incidents occur during non-working hours than any other time)

(p) An indicated last time of usage of a user account that does not correspond to the actual last time of usage for that user

(q) Unusual usage patterns (e.g., programs are being compiled in the account of a user who does not know how to program)

Although no single one of these typical symptoms of security incidents is generally by itself conclusive, observing one or more of these symptoms should prompt you to investigate events more closely. You should in this vein work with other personnel at your organization who possess the appropriate technical and computer security knowledges to determine exactly what has occurred. Collective judgment is typically better than a single person's judgment when it comes to identifying incidents.