{"id":479,"date":"2022-10-19T23:17:44","date_gmt":"2022-10-19T20:17:44","guid":{"rendered":"https:\/\/www.govcert.bg\/?page_id=479"},"modified":"2024-02-13T11:02:49","modified_gmt":"2024-02-13T09:02:49","slug":"%d0%b7%d0%b0-%d0%bd%d0%b0%d1%81","status":"publish","type":"page","link":"https:\/\/www.govcert.bg\/en\/","title":{"rendered":"About us"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"479\" class=\"elementor elementor-479\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cb843c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1cb843c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68d2059\" data-id=\"68d2059\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d9e08c elementor-widget elementor-widget-text-editor\" data-id=\"0d9e08c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">CERT Bulgaria is the National Reaction Center for Incidents in Connection with Information Security. The mission of the Center is to support its service users in proactive activities to reduce the risks of information security incidents and to assist in resolving such incidents in the event that they have already occurred.<\/span><\/p><p style=\"margin-bottom: 0cm; text-align: justify; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">The Center provides a centralized database of information related to providing a secure and secure information environment.<\/span><\/p><p style=\"margin-bottom: 0cm; text-align: justify; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">\u00a0<\/span><\/p><p style=\"margin-bottom: 0cm; text-align: justify; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 13pt; font-family: Roboto;\">\u00a0<\/span><\/p><p style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">The goals to be achieved include:<\/span><\/b><\/p><ul><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">protection of information and technological assets; <\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">limiting the direct impact of security incidents on the information society; <\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">help in recovering from incidents;<\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"> assessing the impact of security incidents; <\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">collecting and disseminating technical information related to information security incidents, as well as vulnerabilities in the security of the systems and ways to prevent them;<\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"> conducting research related to new technologies in network and information security;<\/span><\/li><li style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">conducting training related to information security and incident management.\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d09e997 elementor-widget elementor-widget-text-editor\" data-id=\"d09e997\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">The National&nbsp;<\/span><span style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Accident Response Action Center<\/span><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"> provides its users with the re-active and proactive services described below.<\/span><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><br><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 13pt; font-family: Roboto;\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Emergency warning and warning:<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">The service offers the dissemination of information that describes attacks, security vulnerabilities, unlawful interference alarms, computer viruses, or scams, and offering short-term recommended action to address and resolve issues. Alerts, warnings, or tips are sent in response to a current problem in order to provide information on this activity and to provide advice on preventing or restoring the systems if they have been affected.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 13pt; font-family: Roboto;\">&nbsp;<\/span><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 13pt; font-family: Roboto;\"><br><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Vulnerability Management:<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Vulnerability Management Services in addition to signaling and warning services include:<\/span><\/p>\n<ul>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">receiving and processing information about vulnerabilities in hardware and software systems and applications;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">analysis of the nature, mechanism and consequences of vulnerabilities and development of strategies for action to detect and correct vulnerabilities;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">identifying appropriate actions to mitigate or correct vulnerability. It may include searching for software patches and patches and notifying users of mitigation measures. Get help with software patch installation and patch actions.<\/span><\/span><\/li>\n<\/ul>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><br><\/span><\/b><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Security incidents management:<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Incident management includes receiving, sorting, and responding to queries as well as analyzing incidents and events. Specific management actions may include:<\/span><\/p>\n<ul>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">Take action to protect systems and networks affected or threatened by unwanted attacks offering solutions and risk reduction strategies as a result of similar events;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">offering solutions and risk reduction strategies as a result of similar events;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">checks for attacks on other parts of the network;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">filtering network traffic;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">system recovery;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">updating and updating systems;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><span lang=\"BG\">developing other responses or alternative strategies to resolve problems.<\/span><\/span><\/li>\n<\/ul>\n<p class=\"MsoNormal\" style=\"margin: 0cm 12pt 0cm 60pt; text-align: justify; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">&nbsp;<\/span><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Artifacts management:<\/span><\/b><\/p>\n\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Artefact management services include obtaining information about the presence and copy of the artifacts used in the offender's attack, intelligence, and other unauthorized or destructive actions. The study of artifacts includes analysis of the character, mechanics, version and use of artifacts, and development (or offering) strategies for action to detect, remove, and protect against them.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 13pt; font-family: Roboto;\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><br><\/span><\/b><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Newsletters:<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">The services include, but are not limited to, vulnerabilities warnings and attempts to attack, as well as advice to increase security. These newsletters provide information about newly discovered vulnerabilities and attack tools. This is intended to protect systems against such vulnerabilities even before they become widespread.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\"><br><\/span><\/b><\/p><p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><b><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">Dissemination of information related to the provision of a secure information environment:<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0cm; text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"BG\" style=\"font-size: 10pt; font-family: Verdana, sans-serif; color: black; padding: 0cm; border: 1pt none windowtext;\">This service provides its users with security enhancement information presented in a comprehensive and comprehensible manner. Information may include:&nbsp;<\/span><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\">\u0434\u0430 \u0432\u043a\u043b\u044e\u0447\u0432\u0430:<\/span><\/p>\n<ul>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">instructions for contacting the CSIRT unit;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">archive with warnings, notifications and other similar messages;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">documents on current good practices in the field;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">basic guidelines on computer security;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">policies, procedures and checklists;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">information on the development and distribution of security patches;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">links to suppliers;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">current statistics and trends in incident detection;<\/span><\/span><\/li>\n<li class=\"MsoNormal\" style=\"text-align: justify; text-indent: 36pt; line-height: normal; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"color: black; font-family: Verdana, sans-serif; font-size: 10pt; text-indent: 36pt; font-weight: var( --e-global-typography-text-font-weight );\"><span lang=\"BG\">other information that could improve overall security practices.<\/span><\/span><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>CERT Bulgaria \u0435 \u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u0435\u043d\u00a0\u0435\u043a\u0438\u043f \u0437\u0430 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043f\u0440\u0438 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438 \u0441 \u043a\u043e\u043c\u043f\u044e\u0442\u044a\u0440\u043d\u0430\u0442\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442. \u041c\u0438\u0441\u0438\u044f\u0442\u0430 \u043d\u0430 \u0435\u043a\u0438\u043f\u0430 \u0435 \u0434\u0430 \u043f\u043e\u0434\u043f\u043e\u043c\u0430\u0433\u0430 \u043f\u043e\u043b\u0437\u0432\u0430\u0442\u0435\u043b\u0438\u0442\u0435 \u043d\u0430 \u0443\u0441\u043b\u0443\u0433\u0438\u0442\u0435 \u043c\u0443 \u0432 \u0438\u0437\u0432\u044a\u0440\u0448\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u043f\u0440\u043e\u0430\u043a\u0442\u0438\u0432\u043d\u0438 \u0434\u0435\u0439\u043d\u043e\u0441\u0442\u0438 \u0437\u0430 \u043d\u0430\u043c\u0430\u043b\u044f\u0432\u0430\u043d\u0435 \u0440\u0438\u0441\u043a\u043e\u0432\u0435\u0442\u0435 \u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438 \u0432 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u0442\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442 \u0438 \u0434\u0430 \u0430\u0441\u0438\u0441\u0442\u0438\u0440\u0430 \u043f\u0440\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0442\u0430\u043a\u0438\u0432\u0430 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0439, \u0447\u0435 \u0432\u0435\u0447\u0435 \u0441\u0430 \u0432\u044a\u0437\u043d\u0438\u043a\u043d\u0430\u043b\u0438. \u0415\u043a\u0438\u043f\u044a\u0442 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u044f \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u0438\u0440\u0430\u043d\u0430 \u0431\u0430\u0437\u0430 \u0434\u0430\u043d\u043d\u0438 \u0441 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f, &#8230; <a title=\"About us\" class=\"read-more\" href=\"https:\/\/www.govcert.bg\/en\/\" aria-label=\"More on \u0417\u0430 \u043d\u0430\u0441\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-479","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=479"}],"version-history":[{"count":43,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/479\/revisions"}],"predecessor-version":[{"id":3961,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/pages\/479\/revisions\/3961"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}