Despite having originated as a military project, the internet was not born safe. In fact, it is about three decades since the appearance of the Morris worm, the first malware in history that, in 1988, infected almost 10% of the 66,000 computers that made up the network of networks at that time. In response to this first worm, the first Computer Emergency Response Team, also known as CERT, also emerged that same year.

Something we should know is that there is some confusion in the use of the acronyms that give names to computer security emergency response teams. It should be noted that in the world there are only two CERTs as such: one is the CERT / CC (CERT Coordination Center), which is part of the Institute of Software Engineering at Carnegie Mellon University, in Pennsylvania, United States, and the other It is the US-CERT, the response team of the US Department of Homeland Security.

CERT

In all other countries in the world, cybersecurity teams are called Computer Security Incident Response Team also known as CSIRT, which upon obtaining the certification offered by Carnegie Mellon University can include the acronym CERT in their name. . In addition, it is necessary to distinguish between CSIRTs that belong to public institutions, such as the CERT – UNAM, and those that are part of the supply of private companies, such as CERT – IQSec.

We must know that each CERT or CSIRT is different and depending on its resources and its target audience, it establishes priorities and decides to provide different services, but the main objectives of these are:

▸They are in charge of the search for vulnerabilities to the companies that have hired them

▸They are in charge of notifying possible security problems

▸They will be doing audits and security evaluations

▸They will be in charge of the configuration and maintenance of security tools, applications and infrastructures

▸They will develop security tools

Hire our services and contact us at: https://cert.truxgo.com

CERT Truxgo

Related information:
Why is Cybersecurity so relevant in our lifes
The History of Cybersecurity – and how it has evolved


Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *