App Logo

No.1 PSC Learning App

1M+ Downloads
CERT-IN was established in?

A2004

B2005

C2007

D2008

Answer:

A. 2004

Read Explanation:

  • CERT-In (The Indian Computer Emergency Response Team)

  • CERT-In has been operational since January 2004.

  • CERT-In comes under the Ministry of Electronics and Information Technology (MeitY).

  • It regularly issues advisories to organisations and users to enable them to protect their data/information and ICT (Information and Communications Technology) infrastructure.

  • In order to coordinate response activities as well as emergency measures with respect to cyber security incidents, CERT-In calls for information from service providers, intermediaries, data centres and body corporates.

  • It acts as a central point for reporting incidents and provides 24 ✕ 7 security service.

  • It continuously analyses cyber threats and handles cyber incidents tracked and reported to it.

  • It increases the Indian Internet domain’s security defences.

  • CERT-In is leading the implementation of CCMP across Central Government Ministries/Departments/states and critical organisations operating in Indian cyberspace.

  • The Cyber Crisis Management Plan (CCMP) for Countering Cyber Attacks and Cyber Terrorism is a framework document for dealing with cyber-related incidents.

    CERT-In Functions

  • In the IT Amendment Act 2008, CERT-In has been designated to perform the following functions in the area of cyber security –

  • Collection, analysis and dissemination of information on cyber incidents.

  • Forecast and alerts of cyber security incidents.

  • Emergency measures for handling cyber security incidents.

  • Coordination of cyber incident response activities.

  • Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents.

  • Such other functions relating to cyber security as may be prescribed.


Related Questions:

കംപ്യൂട്ടറുകളിലെ പ്രവർത്തനങ്ങൾ താറുമാറാക്കുവാൻ കഴിവുള്ള കമ്പ്യൂട്ടർ പ്രോഗ്രാമുകൾ ഏതാണ് ?
Section 66A of Information Technology Act, 2000 is concerned with
എത്ര തരം ഹാക്കേഴ്സ് ഉണ്ട് ?
മോഷ്ടിച്ച കമ്പ്യൂട്ടർ റിസോഴ്സ് അല്ലെങ്കിൽ ആശയവിനിമയ ഉപകരണം സ്വീകരിക്കുന്നതിനുള്ള ശിക്ഷ എന്താണ്?
കരുതിക്കൂട്ടി ഇരയെ ഭയപ്പെടുത്താനോ അപകീർത്തിപ്പെടുത്താനോ അപമാനിക്കാനോ, ഭീഷണിപ്പെടുത്താനോ സൈബർ സംവിധാനങ്ങൾ ഉപയോഗിക്കുന്നത് അറിയപ്പെടുന്നത് ?