Cybersecurity wings under the governmentGovernment HM Govt consists of the Prime Minister, their Cabinet, and junior ministers, supported by the teams of non-political civil servants that work in government departments. The American Federal Government consists of the Legislative, Executive, and Judicial branches. of IndiaIndia Hind/ hend >hindia. Bharat Varsha (Jambudvipa used in Mahavamsha) is the name of this land mass. The people of this land are Sanatan Dharmin and they always defeated invaders. Indra (10000 yrs) was the oldest deified King of this land. Manu's jurisprudence enlitened this land. Vedas have been the civilizational literature of this land. Guiding principles of this land are : เคธเคคเฅเคฏเค เคตเคฆ เฅค เคงเคฐเฅเคฎเค เคเคฐ เฅค เคธเฅเคตเคพเคงเฅเคฏเคพเคฏเคพเคจเฅเคฎเคพ เคชเฅเคฐเคฎเคฆเค เฅค The place also been called Hindusthan in Pesia. The word Hendu is mentioned in Avesta. Read more
Cybersecurity in India affects both the public and the private sectorPrivate Sector The term means all persons or entities in the United States, including individuals, partnerships, associations, corporations, and educational and nonprofit institutions, but shall not include State, local, or tribal governments. [CONGRESSIONAL BUDGET ACT OF 1974] and spans a broad range of issues related toย IndianIndia Hind/ hend >hindia. Bharat Varsha (Jambudvipa used in Mahavamsha) is the name of this land mass. The people of this land are Sanatan Dharmin and they always defeated invaders. Indra (10000 yrs) was the oldest deified King of this land. Manu's jurisprudence enlitened this land. Vedas have been the civilizational literature of this land. Guiding principles of this land are : เคธเคคเฅเคฏเค เคตเคฆ เฅค เคงเคฐเฅเคฎเค เคเคฐ เฅค เคธเฅเคตเคพเคงเฅเคฏเคพเคฏเคพเคจเฅเคฎเคพ เคชเฅเคฐเคฎเคฆเค เฅค The place also been called Hindusthan in Pesia. The word Hendu is mentioned in Avesta. Read more national security, whether through terrorism, crimeCrime A positive or negative act in violation of penal law; an offense against the state classified either as a felony or misdemeanor. or state and industrial espionage.
E-crime, or cybercrime, whether relating to theft, hacking or denial of service to vital systems, has become a reality of life. The risk of industrial cyber espionage, in which one company makes active attacks on another, through cyberspace, to acquire high-value information is also a factFact Something เคคเคฅเฅเคฏ (In-formation) that truly exists or happens or some-thing that has actual existence. Circumstances: a fact or event that makes a situation the way it is. Indian Evidence Act:ย It means and includesโ (i) anything, state of things, or relation of things, capable of being perceived by the senses; (ii) any mental condition of which any person is conscious. โfacts in issueโ means and includes any fact from which, either by itself or in connection with other facts, the existence, non-existence, nature or extent of any right, liability or disability, asserted or denied in any suit or proceeding, necessarily follows..
Cyberterrorism presents challenges for the future no only for India but for the worldWorld ฮฯฯฮผฮฟฯ . CERT is prepared for terroristTerrorist The term refers to any natural person who: (i) commits, or attempts to commit, terrorist acts by any means, directly or indirectly, unlawfully and wilfully; (ii) participates as an accomplice in terrorist acts ; (iii) organises or directs others to commit terrorist acts; or (iv) contributes to the commission of terrorist acts by a group of persons acting with a common purpose where the contribution is made intentionally and to further the terrorist act or with the knowledge of the intention of the group to commit a terrorist act. attacks through the internet of Indian key military or space installations or disables key information systems.

Functions :
Keep a currentย empanelled listย of IT securityย auditors
(i) Receiving andย scrutiny ofย applications
(ii) Off-line in-houseย Practical Skills Testย for successfulย applications
(iii) Online Practicalย Skills Test for theย applicationsย successfullyย qualifying steps
(iv) Personalย Interaction sessionย for the applicantsย successful in allย earlier steps
(v) Backgroundย verification by a suitable Governmentย agency forย successfulย applications.
Respond to a Security Incident
(i) Reporting of cybersecurity incidents toย Incident Responseย Helpdesk via.
(a) emailincident@certin.org.in,
(b) Tel:-ย 1 800-11- 4949 (Tollย free)
Incidentย Reportingย form
(c) Fax:- 011-24368546 1800- 11- 6969 (Toll-free)
(ii) Initial examination and registration of cybersecurity incidents.
(iii) Analysis andย response of cybersecurityย incident
Issuance ofย security alertsย on the latestย threats andย vulnerabilities
(i) Tracking of latestย threats &ย vulnerabilities
(ii) Preparation ofย security alerts,ย advisories &ย vulnerability notes
(iii) Publishing ofย security alerts,ย advisories &ย vulnerability notes onย CERT-In websites
(iv) sending securityย alerts, advisories &ย vulnerability notesย via email toย registered users
through mailing list
Government Computer Emergency Response Team [CERT]
Read also:ย
- Initiative to Bolster Cybersecurity of U.S. Ports (20/02/2024)
- Enhancing National Cybersecurity: Remarks by Christopher Painter (19/09/2016)
- Australia, India, Japan and the Unitedย States of Quad recognize the need for improving cybersecurity-25/03/2022
- Improving the Nationโs Cybersecurity-EO 12/05/2021