CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-G0pWEBSBJX1FIL2a7CUIkw' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:45:58 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 19:27:02 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210096-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759778821.311356,VS0,VE1164
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8309
NIRS-CERT
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
NIRS-CERT
Team Information | |
---|---|
Team name | NIRS-CERT |
Official team name | National Information Resources Service Computer Emergency Response Team |
Member since | November 14, 2018 |
Host organization | National Information Resources Service, Ministry of the Interior and Safety |
Country of team | Korea (the Republic of) KR |
Date of establishment | 2008-10-10 |
Website | https://www.nirs.go.kr/eng/index.jsp |
Team Contact Information | |
---|---|
Facsimile number | +82-42-250-5559 |
Business Hours | |
---|---|
Timezone | UTC+0900 |
Description of business hours | 24/7/265 |
How to contact outside business hours | +82-1577-0577 nirscert@korea.kr |
Constituency | |
---|---|
Type of Constituency | Government & military |
Source of Constituency | Internal to host |
Description of Constituency | The constituency of NIRS-CERT consists of about 45 central government organizations and K-NET which is a government-us-only communication network. |
Internet Domain Address | some domains with "go.kr" |
Country of Constituency | Korea (the Republic of) KR |
Cryptography | |
---|---|
PGP key id | 0x7A57E2736343ED0C |
PGP fingerprint | D405FF6094274F49E4D5CF2A7A57E2736343ED0C |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=HD4F
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.