COMPUTER ATTACK [COMPATK]
LINE 1 — DATE AND TIME______________________________(DTG)
LINE 2 — UNIT________________________________________(Unit Making Report)
LINE 3 — MISSION OF SYSTEM AFFECTED_______________(Commander’s Assessment)
LINE 4 — EQUIPMENT STATUS__________________________(List Type of Equipment Affected)
LINE 5 — DTG ATTACK DETECTED_______________________(DTG Computer System Was Attacked)
LINE 6 — DTG ATTACK ENDED__________________________(DTG Computer Attack Ended)
LINE 7 — SOFTWARE AFFECTED________________________(List Type and Number of System Software Attacked)
LINE 8 — NUMBER OF SYSTEMS AFFECTED______________(List Number of Systems Affected by the Attack)
LINE 9 — TYPE OF ATTACK_____________________________(List Type of Attack (Virus Type))
LINE 10 — ADDRESS OF SOURCE________________________(Address of Attacking Machine)
LINE 11 — INTRUSION METHOD_________________________(Method Used, for Example, Hacked in, From Disk, Internet)
LINE 12 — NARRATIVE_________________________________(Free Text for Information Required for Clarification of Report)
LINE 13 — AUTHENTICATION___________________________(Report Authentication)