CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-nw19LW2mPWaDT4Puy0YsUg' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:46:15 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Tue, 07 Oct 2025 07:46:28 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210037-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759823187.172255,VS0,VE1152
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8921
TWCERT/CC
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
TWCERT/CC
Team Information | |
---|---|
Team name | TWCERT/CC |
Official team name | Taiwan Computer Emergency Response Team/Coordination Center |
Member since | November 13, 2001 |
Country of team | Taiwan (Province of China) TW |
Date of establishment | 1998-09-01 |
Website | https://www.twcert.org.tw/ |
Business Hours | |
---|---|
Timezone | UTC+0800 |
Description of business hours | Monday to Sunday: 08:00 - 17:00 (UTC+8) |
How to contact outside business hours | Send the E-mail to twcert@cert.org.tw |
Constituency | |
---|---|
Type of Constituency | Government, Private and Public sectors |
Source of Constituency | Internal to host |
Description of Constituency | Taiwan - Internet .tw domain and IP addresses assigned to Taiwan |
Cryptography | |
---|---|
PGP key id | 0x1C03A71F1E9D1F1B |
PGP fingerprint | 7613322EBBC5C37A7EFAED0E1C03A71F1E9D1F1B |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=0L1o
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.