App Logo

No.1 PSC Learning App

1M+ Downloads
CERT-IN was established in?

A2004

B2005

C2007

D2008

Answer:

A. 2004

Read Explanation:

  • CERT-In (The Indian Computer Emergency Response Team)

  • CERT-In has been operational since January 2004.

  • CERT-In comes under the Ministry of Electronics and Information Technology (MeitY).

  • It regularly issues advisories to organisations and users to enable them to protect their data/information and ICT (Information and Communications Technology) infrastructure.

  • In order to coordinate response activities as well as emergency measures with respect to cyber security incidents, CERT-In calls for information from service providers, intermediaries, data centres and body corporates.

  • It acts as a central point for reporting incidents and provides 24 ✕ 7 security service.

  • It continuously analyses cyber threats and handles cyber incidents tracked and reported to it.

  • It increases the Indian Internet domain’s security defences.

  • CERT-In is leading the implementation of CCMP across Central Government Ministries/Departments/states and critical organisations operating in Indian cyberspace.

  • The Cyber Crisis Management Plan (CCMP) for Countering Cyber Attacks and Cyber Terrorism is a framework document for dealing with cyber-related incidents.

    CERT-In Functions

  • In the IT Amendment Act 2008, CERT-In has been designated to perform the following functions in the area of cyber security –

  • Collection, analysis and dissemination of information on cyber incidents.

  • Forecast and alerts of cyber security incidents.

  • Emergency measures for handling cyber security incidents.

  • Coordination of cyber incident response activities.

  • Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents.

  • Such other functions relating to cyber security as may be prescribed.


Related Questions:

2000- ലെഇൻഫർമേഷൻ ടെക്നോളജി ആക്‌ടിലെ വ്യവസ്ഥകൾ പ്രകാരം, ഐഡന്റിറ്റി മോഷണത്തിനുള്ള ശിക്ഷ ഇവയാണ് :
Any computer program or set of programs designed expressly to facilitate illegal activity online is called?
2019 ൽ ആൻഡ്രോയിഡ് ഓപ്പറേറ്റിംഗ് സിസ്റ്റത്തെ ബാധിച്ച ബഗ് ഏതാണ് ?
_____ refers to E-Mail that appears to have been originated from one source when it was actually sent from another source
_______ are a bundle of exclusive rights over creations of the mind, both artistic and commercial: