CERT Coordination Center

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for Internet security incidents. The first center of its kind, it was created in Pittsburgh in November 1988 at DARPA's direction in response to the Morris worm incident. The CERT/CC is now part of the CERT Program, which has more than 150 cybersecurity professionals working on projects that take a proactive approach to securing systems. The CERT Program partners with government, industry, law enforcement, and academia to develop advanced methods and technologies to counter large-scale, sophisticated cyber threats.

The CERT Program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University's main campus in Pittsburgh. CERT is a registered trademark of Carnegie Mellon University.[1]

In 2003, the Department of Homeland Security entered into an agreement with CMU to create US-CERT.[2] US-CERT is the national computer security incident response team (CSIRT) for the United States of America. The CERT/CC coordinates information with US-CERT and other computer security incident response teams, some of which are licensed to use the name “CERT.” The CERT Program runs the CERT Knowledgebase containing a collection of Internet security incident information.[3][4]

CERT was key in the news of de-anonymization of Tor (anonymity network) in the summer of 2014.[5][6][7]

In the fall of 2014, it may have assisted the FBI in taking down SilkRoad 2.0.[8]

See also[edit]

References[edit]

  1. ^ "Trademarks and Service Marks". Software Engineering Institute. Carnegie Mellon University. Retrieved 2014-12-07. 
  2. ^ "U.S. Department of Homeland Security Announces Partnership with Carnegie Mellon’s CERT Coordination Center". SEI Press Release. Carnegie Mellon University. September 15, 2003. Retrieved 2014-12-07. 
  3. ^ "CERT Knowledgebase". Software Engineering Institute. Carnegie Mellon University. Retrieved 2014-12-07. 
  4. ^ Cory Bennett. "New initiative aims to fix software security flaws". TheHill. Retrieved 6 December 2014. 
  5. ^ "Why was the Black Hat talk on Tor de-anonymization mysteriously canceled?". Washington Post. Retrieved 6 December 2014. 
  6. ^ "How (& why) feds killed a talk on Tor-hacking at Black Hat (exclusive)". VentureBeat. Retrieved 6 December 2014. 
  7. ^ "Tor Has Been Breached - What Now?". Technewsworld.com. Retrieved 6 December 2014. 
  8. ^ "How the FBI Took Down Silk Road 2.0 and 400 Other Dark Web Sites". PCMAG. Retrieved 6 December 2014. 

External links[edit]