Challenger App

No.1 PSC Learning App

1M+ Downloads
CERT-IN was established in?

A2004

B2005

C2007

D2008

Answer:

A. 2004

Read Explanation:

  • CERT-In (The Indian Computer Emergency Response Team)

  • CERT-In has been operational since January 2004.

  • CERT-In comes under the Ministry of Electronics and Information Technology (MeitY).

  • It regularly issues advisories to organisations and users to enable them to protect their data/information and ICT (Information and Communications Technology) infrastructure.

  • In order to coordinate response activities as well as emergency measures with respect to cyber security incidents, CERT-In calls for information from service providers, intermediaries, data centres and body corporates.

  • It acts as a central point for reporting incidents and provides 24 ✕ 7 security service.

  • It continuously analyses cyber threats and handles cyber incidents tracked and reported to it.

  • It increases the Indian Internet domain’s security defences.

  • CERT-In is leading the implementation of CCMP across Central Government Ministries/Departments/states and critical organisations operating in Indian cyberspace.

  • The Cyber Crisis Management Plan (CCMP) for Countering Cyber Attacks and Cyber Terrorism is a framework document for dealing with cyber-related incidents.

    CERT-In Functions

  • In the IT Amendment Act 2008, CERT-In has been designated to perform the following functions in the area of cyber security –

  • Collection, analysis and dissemination of information on cyber incidents.

  • Forecast and alerts of cyber security incidents.

  • Emergency measures for handling cyber security incidents.

  • Coordination of cyber incident response activities.

  • Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents.

  • Such other functions relating to cyber security as may be prescribed.


Related Questions:

ഒട്ടും സംശയം ജനിപ്പികാതിരിക്കുവാനായി ഒരു സാധാരണ ഫയലിൽ അല്ലെങ്കിൽ സന്ദേശത്തിനുള്ളിൽ രഹസ്യ വിവരങ്ങൾ മറയ്ക്കുന്ന രീതി അറിയപ്പെടുന്നത് ?
The fraudulent attempt to obtain sensitive information such as usernames passwords and credit card details are called as?
എന്താണ് സ്റ്റെഗാനോഗ്രഫി(Steganography)?
Who defined the term 'Computer Virus'?

Which of the following statements are true?

1.A rootkit is a malicious software that allows an unauthorised user to have privileged access to a computer and to restricted areas of it software.

2.A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers,  password stealers,antivirus disablers etc