0 оценок0% нашли этот документ полезным (0 голосов)
76 просмотров1 страница
CERT-In provides a single point of contact for reporting local problems. Provide a 24 x 7 security service. Offer recovery procedures. Share information and lessons learned with CERT / CC, other CERTs, response teams, organisations and sites.
CERT-In provides a single point of contact for reporting local problems. Provide a 24 x 7 security service. Offer recovery procedures. Share information and lessons learned with CERT / CC, other CERTs, response teams, organisations and sites.
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате PDF, TXT или читайте онлайн в Scribd
CERT-In provides a single point of contact for reporting local problems. Provide a 24 x 7 security service. Offer recovery procedures. Share information and lessons learned with CERT / CC, other CERTs, response teams, organisations and sites.
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате PDF, TXT или читайте онлайн в Scribd
CERT-In:Indian Computer Emergency Response Team Page 1 of 1
HOME > ABOUT CERT-In
ROLES & FUNCTIONS
Charter & Mission Securing Home Roles & Functions Computers Roles (CISG-2005-03) Advisory Committee SQL Injection Techniques Authority Reactive & Countermeasures Press (CIWP-2005-06) Tender 1. Provide a single point of contact for reporting local CERT-In @ IISc problems. 2. Assist the organisational constituency and general Incident Reporting Download Brochure computing community in preventing and handling Contact Us computer security incidents. Vulnerability Reporting 3. Share information and lessons learned with CERT/CC, other CERTs, response teams, organisations and sites. Guidelines 4. Incident Response. Presentations 5. Provide a 24 x 7 security service. 6. Offer recovery procedures. White Papers 7. Artifact analysis 8. Incident tracing
Proactive
1. Issue security guidelines, advisories and timely
advise. 2. Vulnerability analysis and response 3. Risk Analysis Implementing Central 4. Security Product evaluation Logging Server using 5. Collaboration with vendors syslog-ng 6. National Repository of, and a referral agency for, (CISG-2004-03) World CERTs cyber-intrusions. Web Server Security Security Sites 7. Profiling attackers. Guidelines Security Tools 8. Conduct training, research and development. (CISG-2004-04) Antivirus Resources 9. Interact with vendors and others at large to investigate and provide solutions for incidents. Analysis of Defaced Indian websites under .in ccTLD (CIWP-2004-01) Functions
Reporting
Central point for reporting incidents
Database of incidents
Analysis
Analysis of trends and patterns of intruder activity
Develop preventive strategies for the whole constituency In-depth look at an incident report or an incident activity to determine the scope, priority and threat of the incident.
Response
Incident response is a process devoted to restoring
affected systems to operation Send out recommendations for recovery from, and containment of damage caused by the incidents. Help the System Administrators take follow up action to prevent recurrence of similar incidents
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing