Reactive
- Provide a single point of contact for reporting local problems.
- Assist the computing community in preventing and handling computer security incidents.
- Share information with CSIRT/CC, other CERTs, response teams , organisations and sites.
- Incident Response.
- Provide a 24 x 7 security service.
- Offer recovery procedures.
- Artifact analysis
- Incident tracing
Proactive
- Issue security guidelines, advisories and timely advise.
- Vulnerability analysis and response
- Risk Analysis
- Collaboration with vendors
- National Repository of, and a referral agency for, cyber-intrusions.
- Profiling attackers.
- Conduct Training
- Interact with vendors and others at large to investigate and provide solutions for incidents.
Reporting
- Central point for reporting incidents
- Database of incidents
Analysis
- Analysis of trends and patterns of intruder activity
- Develop preventive strategies for the whole constituency
- In-depth look at an incident report or an incident activity to determine the scope, priority and threat of the incident.
Response
- Incident response is a process devoted to restoring affected systems to operation
- Send out recommendations for recovery from, and containment of damage caused by the incidents.
- Help the System Administrators take follow up action to prevent recurrence of similar incidents
Tip of the week!
Use Two-Factor Authentication
It’s important to have a strong password, but it’s even more imperative to have two-factor, or multi-factor, authentication. This method provides two layers of security measures so if a hacker can accurately guess your password, there is still an additional security measure in place to ensure that your account is not breached.
044-24962400, 044-24962411, 044-24962412, 044-24962413 Ext:303 (Working Hours 09:00 - 18:00)
9092871476, 9443428795(Off-hours Contact)
Do you have any questions? Please do not hesitate to contact us directly. Our team will come back to you At the earliest.
→
info[DOT]csatn[At]tn[DOT]gov[DOT]in
→