Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1207 Apr 2015 - 13:30ThomasMisa 
1104 Mar 2015 - 12:16ThomasMisa 
1004 Mar 2015 - 12:16ThomasMisaAttached file CERT_p108-fithen-1994.pdf 
919 Dec 2014 - 15:12ThomasMisa 
819 Dec 2014 - 15:09ThomasMisa 
719 Dec 2014 - 15:06ThomasMisa 
610 Dec 2014 - 16:25ThomasMisa 
518 Nov 2014 - 08:33ThomasMisa 
419 Feb 2014 - 19:44norqu036? 
303 Oct 2013 - 15:17norqu036? 
earlier first

Render style:     Context:

 History: r12 < r11 < r10 < r9 < r8
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Programs>ProgramsCERT (07 Apr 2015, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Carnegie Mellon CERT


In 1988, the Morris worm, the first widespread incidence of malware on the Internet to capture the public's attention, pressed several United States government agencies to mobilize against future attacks. The National Security Agency (NSA) convened a workshop consisting of numerous academic and governmental organizations, including MIT, Harvard, the University of California-Berkeley, the FBI, the Defense Communications Agency, and DARPA, with the goal of unraveling how the Morris worm attack occurred, and how it was ultimately defeated. The convening organizations determined that an informal group of UNIX computer professionals were responsible for neutralizing the Morris worm. This finding spurred an effort to create a formal group of professionals that could coordinate efforts in the event of future attacks. Shortly thereafter, DARPA established the Computer Emergency Response Team (CERT) to provide a centralized response to computer security problems. CERT had several responsibilities beyond responding to computer security attacks, including security research, educating users about computer security, and reporting security incidents.(1)

Although CERT was a Department of Defense-funded organization, the group operated at Carnegie Mellon University under the Software Engineering Institute (SEI) research center, an existing DARPA-funded organization oriented towards defense-related software development. Despite being launched in an attempt to create a centralized coordination center, each major branch of the Internet, such as ARPANET, NSFnet, and Bitnet, would have its own branch of CERT, with the DARPA-funded CERT reporting on the activities of ARPANET and Milnet. Beginning in 1988, CERT issued briefings regarding security incidents, discussing vulnerabilities in computer systems most commonly in use at the time, including those of Digital Equipment Corporation (DEC) and Sun Microsystems. Other CERT advisories covered issues like worms, dispelling inaccurate media reports about computer security issues, and publicizing security practices to users.(2)



1 , 2 : Laura DeNardis, "A History of Internet Security," 684-686 in Karl de Leeuw and Jan Bergstra, eds., The History of Information Security: A Comprehensive Handbook (Oxford, UK: Elsevier, 2007), 681-704.

Topic attachments
I Attachment Action Size Date Who Comment
pdfpdf CERT_p108-fithen-1994.pdf manage 3177.2 K 04 Mar 2015 - 12:16 ThomasMisa CERT 1994
Topic revision: r12 - 07 Apr 2015 - 13:30:56 - ThomasMisa
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback