Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
Computer emergency response teams (CERT) are expert
groups that handle computer security incidents. Alternative
names for such groups include computer emergency
readiness team and computer security incident response
team (CSIRT).
1
Computer emergency response teams are the human
counterparts to anti-virus software. When new viruses or
computer security threats are discovered, these teams
document these problems and work to fix them. Because
these teams are made up of people who can react to new
situations, they are much more capable of dealing with new
virus threats than anti-virus programs would be by
themselves. When the computer security experts that make
up the response teams discover a new dangerous virus,
they work around the clock to create a remedy for it. They
often work closely with anti-virus software companies to
establish virus definitions and solutions, and they work with
other software makers to help plug up any security holes
that allowed the virus to propagate itself.
2
BACKGROUND
3
Gaining, or attempting to gain, unauthorized access to
a computer system or its data.
4
2. OBJECTIVES OF CERT
According to CERT's website, its goals include the following:
5
In addition to CERT/CC and the organizations that make up
FIRST, many private anti-virus software companies also
have divisions that play the role of the emergency response
team.
6
3. THE PROCESS OF RESPONDING TO A
NEW THREAT
7
After receiving information about a virus or security hole,
response teams then begin reviewing it to determine how
dangerous it is and how difficult it will be to fix. In the
process of reviewing a new virus, groups can build a virus
profile or definition, which they can then post on their web
site in order to spread awareness about the virus. For every
significant virus it reviews, the research team at Symantec
(which also produces Norton Anti-Virus software) puts
together a detailed profile which includes assessments on
how much damage the virus causes, how fast it can
replicate and distribute itself, and how widespread it is.
Some teams, like the team at www.sophos.com, also put up
profiles of viruses hoaxes when they receive virus alerts
that they determine to be inaccurate.
8
Of course, recovery tools are only useful to people whose
systems have already been infected. They are useful for
helping people recover, but insufficient when it comes to
containing the virus. For this reason, the virus definitions
built by response teams during the review phase are
eventually included in updates to anti-virus programs, so
that people can protect their systems from being
compromised in the first place.
9
4. COMPARATIVE STUDY OF CERT
U.S.A.
U.K.
INDIA
10
its mission was expanded to include providing boundary
protection for the federal civilian executive domain and
cybersecurity leadership. This shared responsibility has
evolved over time to make US-CERT a trusted partner and
authoritative source in cyberspace for the Federal
Government; SLTT governments; private industry; and
international organizations. US-CERT strives for a safer,
stronger Internet for all Americans by responding to major
incidents, analysing threats, and exchanging critical
cybersecurity information with trusted partners around the
world.
Digital analytics
Operations
12
techniques, if applicable, to ensure constituents are made
aware and can protect their organization appropriately.
Communications
International
14
tend to be more focused on an implementation area such as
Military, Business, Academia or government.
15
The NCSC will help ensure that the people, public and
private sector organisations and the critical national
infrastructure of the UK are safer online.
CERT in India
What is CERT-IN?
16
CERT-In (the Indian Computer Emergency Response Team) is
a government-mandated information technology (IT)
security organization. The purpose of CERT-In is to respond
to computer security incidents, report on vulnerabilities and
promote effective IT security practices throughout the
country.
17
Legal Recognition Of CERT-IN
Section 70B empowers Indian Computer emergency
response team as a national focal point for gathering
information on threats and facilitating the Central
Governments response to computer based incidents.
Role of CERT-IN is in the area of cyber security
include :-
a) Collection, analysis and dissemination of
information on cyber incidents;
b)Forecast and alerts of cyber security incidents;
c) Emergency measures for handling cyber security
incidents;
18
5. CONCLUSION
Since IT is spreading so fast more machinery and
cooperation is required. Other statutes must be framed
in order to tackle the cyber threat. By incorporating
sections 66F,70,70A and 70B, the lawmakers have filled
in the most crucial missing links in the legal apparatus.
Cyber terrorism is a reality, and so is cyber security. If
former is to be checkmated, one needs the latter. Many
different countries are working collaborately and
cooperatively. India too is working with other countries
to check the cyber threat.
19
6. BIBLIOGRAPHY
BOOKS
Vakul sharma , Information and technology law and practice, forth edition
WEBSITES
https://cs.stanford.edu/people/eroberts/cs201/projects/viruses/c
ert.html
https://en.wikipedia.org/wiki/Computer_emergency_response_te
am#Global
http://www.cert-in.org.in/
https://cs.stanford.edu/people/eroberts/cs201/projects/viruses/c
ert.html
https://www.us-cert.gov/
https://www.gov.uk/government/news/uk-launches-first-
national-cert
20