UPSC » UPSC CSE Study Materials » Science and Technology » The Indian Computer Emergency Response Team

The Indian Computer Emergency Response Team

Ministry of Electronics and Information Technology, WhatsApp, Facebook, and Indian Computer Emergency Response Team (CERT-In)

  • The Indian Computer Emergency Response Team (CERT-In) is a ministry of India agency situated inside the Department of Information and Communications Technology
  • Under Section 70B of the Information Technology Act of 2000, as amended in 2008, the Indian Computer Emergency Response Team (CERT-In) is the country’s nodal agency (IT Act, 2000) to deal with cyber-threats such as hacking and phishing. It serves as the focal point for responding to cyber security threats such as hacking and phishing. It increases the Indian Internet domain’s security defences
  • CERT-In IT act section in section 70B of the Act, as well as many other functions delegated to it from period to period
  • (CERT-In) detected a major issue in Android Jelly Bean’s VPN functionality in March 2014. CERT-In has been functioning since January 2004. The Indian Cyber Community is CERT-In empanelled 
  • CERT-In empanelled auditors list is a testament to the technical skill of the Security Brigade in performing information security audits. Security Brigade is certified to undertake security assessments of websites, networks, and apps as a CERT-In empanelled auditors list
  • The operational scope of CERT-In includes everything from being the first responder to cybersecurity crises to educating diverse stakeholders on best practises for securing the nation’s cyberinfrastructure. This is the first of a series of articles that will look at the proactive, reactive, and training mandates of CERT-In, noting significant areas where they can be improved and providing normative means to implement those improvements

Functions: 

  • CERT-In cyber security work to get information on cyber events is gathered, analysed, and disseminated
  • Cyber security incident forecasting and alerting
  • Emergency response procedures for cyber security issues
  • Coordination of operations related to cyber incidents
  • Published guidelines, advisories, vulnerability notes, and whitepapers on information security policies, processes, incident prevention, response, and reporting
  • Other cybersecurity-related responsibilities may be required

Recent Cases: 

Whatsapp and Indian Computer Emergency Response Team (CERT-In): 

  • The Indian Computer Emergency Response Team (CERT-In) has given an admonition to WhatsApp clients in India of a few weaknesses in the texting stage that may bring about the trade-off of delicate client information and individual data
  • The CERT-In says in a high seriousness advisory that the weaknesses were found in explicit adaptations of WhatsApp and WhatsApp Business for both the Android and iOS stages
  • As per CERT-In, the weaknesses in WhatsApp happen because of a store arrangement issue and a missing sound unravelling pipeline, which may permit programmers to run discretionary code or access touchy data on a designated machine
  • To mitigate the danger, the government’s cybersecurity office has urged users to upgrade their WhatsApp applications on Android and IOS to the most recent versions. This is not the first time CERT-In has issued an advisory with a “high” severity rating, alerting users of several vulnerabilities in the instant messaging platform
  • Last November, the cybersecurity agency issued a similar warning to consumers, informing them that it had discovered two significant vulnerabilities: notably improper access control and user-after-free
  • CERT-In previously alerted WhatsApp users to a buffer overflow vulnerability in the platform, which enabled an attacker to remotely target a machine using a specially designed MP4 audio or video file
  • At the time, the CERT-In cautioned that successful exploitation of this vulnerability might result in remote code execution or denial of service circumstances for users

Facebook and Indian Computer Emergency Response Team (CERT-In): 

  • The administration’s premier cyber defence organisation, CERT-In, has urged Facebook users to safeguard their profile details after it was discovered that personally identifiable information of 533 million Facebook users worldwide, including 6.1 million users in India, was supposedly leaked on the internet and freely distributed on cyber-attack forums
  • The Computer Emergency Response Team issued a warning stating that it has been reported that a large-scale breach of Facebook profile information occurred internationally
  • Email addresses, profile IDs, complete names, work titles, phone numbers, and birth dates are all revealed
  • According to Facebook, the scraped data does not contain financial, health, or password information
  • Additionally, the firm said based on its analysis, threat actors scraped this data before September 2019 by using Facebook’s “contact Importer” tool, which enables users to locate other members through their phone numbers

Conclusion

For cyber security, the Indian Computer Emergency Response Team (CERT-In) has formed agreements with peers in Malaysia, Singapore, and Japan. The Memorandums of Understanding (MoUs) would foster greater cooperation between India and the three nations for the exchange of information and experience in the detection, resolution, and prevention of surveillance incidents. CERT-In functions to improve the efficacy of cyber security in the country and strives to prevent and respond to Cyber threats.

faq

Frequently asked questions

Get answers to the most common queries related to the UPSC Examination Preparation.

What does CERT mean?

Under Section 70B of the Information Technology Act of 2000, the Indian Computer Emergency Response Team (CERT-In) w...Read full

What is CERT-In certification?

A CERT-IN certification, in basic terms, is a certificate issued by a CERT Empanelled Security Auditor following a t...Read full

What are the Functions of CERT?

CERT-In has been appointed as the national agency in charge of performing the following cyber security functions:...Read full