SlideShare uma empresa Scribd logo
1 de 25
Sanjay Sahay, IPS.,
ADGP, Police Computer Wing,
Bangalore
Text
Presentation Structure
• Introduction
• Attack Methods
• Hacking groups
• Best Security model
• KSP Security model
• Tool and technology in use
• Challenges / Bottleneck
• Gaps
• Wish list
• Conclusion.
•
Information Security: Preservation of confidentiality, integrity and
availability of information
Protection from what ?
Protection from whom ?
Text
Is technology is enough ?
Text
PEOPLE
PROCESSES
TECHNOLOGY
•User Awareness
•Guidance
•Administration
•Monitor
• Policies
•Standards
•Guidelines
•Audit
•IPS
•Firewall
•AV
•DLP
•SIEM
What builds the best information security
Text
KSP Infrastructure and Security solution
KSP Computerization Model
Enterprise Model
People Process Technology Infrastructure Governance
• Internal
Champions
• Capacity
Building
• Nodal
Officers
• Sys Admins
• Handholding
• BPR
• Integration
• Automation
• ERP
• Web Service
• Active
Directory
• SMS
Gateway
• e-Pen
• KSP DC
• KSP WAN
• DR Centre
• EMS
• Centralized
AV
• Automated
Backup
• Core Team
• SCRB Nodal
Officer
• District Nodal
Officer
• Central NOC
• Helpdesk
Text
Core Infrastructure
KSP Wide Area Network
Text
45 locations
1,2 & 4 Mbps leased line
1458 locations
512 Kbps and 1 Mbps
VPNoBB
45 Mbps
aggregation bandwidth
16 Mbps
Internet leased line
KSPWAN
• LAN infrastructure at All locations
• Fixed IP for all VPNoBB
connections
• Network Monitoring Software to
monitor the availability.
• End router security through ACL
• Zone based LAN architecture
through VLANs
• MAC authentication servers
• Hardening of Network Devices
• SOP for network management.
• Warranty / Support
Text
Karnataka State Police Wide Area Network
Type of Network Number of
Links at
Initiation
Number of
Links at
Present
MPLS 39 45
VPNoBB 1350 1458
ILL 2 2
• Karnataka State Police Wide Area Network, (KSPWAN) was created in the year 2009 with BSNL
• This was successfully implemented jointly by BSNL and the Karnataka State Police.
• This Network is a combination of 45 MPLS and 1458 VPNoBB connections
• Connects all police station and higher offices across the state.
• Fixed IP has been implemented on VPNoBB connection
• In addition 16 Mbps Internet leased line has also been provided.
10
Mbps
16
Mbps
32
Mbps
45
Mbps
DC Aggregation Bandwidth
Up-gradation
Core Functionalities
• Crime
• Law & Order
• Traffic
Administration
• Administration
• Finance
• Stores
Ancillary support
• Armed Reserve
• Motor Transport
• Training
Technical Modules
• Wireless
• Forensic Science
• Laboratory
Police IT - ERP
11
Modules
64
Roles
522
Screen
417
Reports MIS
Police IT - ERP
Police IT - ERP
 Layered architecture
 Authentication and Authorization process
 Encrypted communication
 Fail over Clustering to avoid single point of failure.
 .Net Framework used to develop the application for
better availability, performance and security.
Police IT – ERP Security Guidelines
 Prevention of un-authorized access, Role based access
 Auditing should be enabled for DML statements.
 User name and password for authentication
 Standard password policy.
 The process for removing unnecessary code from the application after it is released should
be documented
 Application code should not contain invalid references to network resources The solution
should not display the entire path of URL in the browser based application
 The solution should support multi-tier authentication where required
 Solution should provide logout option to terminate the session
 Data Encryption at traveling and at rest.
 All the credentials and sensitive data always will store at Database end
 The Solution should not be vulnerable for OWASP top 10 attacks.
Text
Security Solution of KSP
Defense in Depth technology has been adopted for KSP to ensure the
maximum protection at each layer from attacks.
• IT Security Policy
• Regular audits.
• End user awareness program.
• DC protected with surveillance and biometric access
• Two Tier Security Architecture.
• Full fledge Intrusion Prevention System.
• SIEM for log management and Event Analysis for real time alerts.
• Internal Zone are created based on the functionality
• Centralized End point protection antivirus for Servers and Desktops
• Centralized Authentication and Authorization through LDAP Server.
• Role based Access.
• Hardening of OS, Applications and Network devices.
• Regular patch management.
• Data Stored in Encrypted format
DC / DR Technology / Tools used
Unified Threat Management
System
Network Intrusion Prevention
System
Firewall
Security Information and Event
Management
Centralized Antivirus Software
Patch Management Software
LDAP Server
IP Sec Tunnel Between Branch and
DC
Access Control List for end router
security
Network Monitoring Software
Traffic Monitoring Software
Role Based Access
Hosted in Secured zone and
accessible only on Intranet
Role based Access
Audit logs
CAB to control the changes
Application Monitoring Software
Stored in Encrypted mode
Stringent testing policy
Security layer Network layer Application layer
End Computer/ User Security
• Computers are under the supervision of LDAP Server
• Centralized Authentication, Authorization and Accounting through LDAP Server
• Computers are operated with least Privileged account.
• Local administrator and user accounts are restricted.
• End Point Protection installed on all computers to battle against the advance threat.
• Stringent Policies to enforce end computer security through LDAP and Centralize AV
Management Server.
• Regular patch management to fix the OS and application level Vulnerabilities.
• SOP for computer usage
• Usage of External Device is strictly prohibited.
• Authorized / Approved applications are allowed to use.
• Centralized Log monitoring through SIEM to identify and mitigate the internal threats.
• Computer security is a part of Basic computer training program.
• Regular Security awareness program to end users.
Text
Internal Resources of KSP
Resources Number
Key Security resources
MCSE, CCNA, VCP, CEH, CHFI
3
Middle tier security resources
System Administrators (MCSE and CCNA)
75
Security Enforcement Team 120
Police IT Operators 3000
Text
Operation Principals of KSP
Secure
MonitorAudit/Test
Manage/
Improve
Policy
Training
Awareness
Text
• Challenges / Bottleneck
Challenges
• Creating of security
awareness.
• Resistance to change
• Management skill
• Regular Monitoring
• Knowledge upgradation
• Rediness for DDoS attack
• Fighting against distruptive
attacks.
•
Bottlenecks
• No Direct control on the
other country cyber
criminals
• Zero day attack
• TOR based communication
•
Safe and Seurece
Internet
Forensic Rediness
Security
Awereness
Program.
Wish list
 Security architecture should be a dynamic process that
consistently enforces security among all users to protect
corporate information.
 Regular IT security audit would help the organization to find the
vulnerabilities and gaps to fix it proactively before it get
exploited by an hacker.
 People are the major pillar of the security, should be trained
regularly better security.
 As 100% security is impossible, you need to decide what
needs to be secured and how well it needs to be secured.
Conclusion
Secure IT 2014

Mais conteúdo relacionado

Mais procurados

Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxAnurag Srivastava
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...ManageEngine, Zoho Corporation
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
AWS Community Day - Vitaliy Shtym - Pragmatic Container SecurityAWS Community Day - Vitaliy Shtym - Pragmatic Container Security
AWS Community Day - Vitaliy Shtym - Pragmatic Container SecurityAWS Chicago
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisManageEngine, Zoho Corporation
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyPragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyAmazon Web Services
 
System analyst
System analystSystem analyst
System analystreturnasap
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform ServiceSoumitra Bhattacharyya
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureCloudPassage
 

Mais procurados (20)

Optimize application performance - Mumbai Seminar
Optimize application performance - Mumbai Seminar Optimize application performance - Mumbai Seminar
Optimize application performance - Mumbai Seminar
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptx
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
AWS Community Day - Vitaliy Shtym - Pragmatic Container SecurityAWS Community Day - Vitaliy Shtym - Pragmatic Container Security
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit SydneyPragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
 
System analyst
System analystSystem analyst
System analyst
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
NetGains Infrastructure Security
NetGains Infrastructure SecurityNetGains Infrastructure Security
NetGains Infrastructure Security
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 

Semelhante a Secure IT 2014

Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...NetworkCollaborators
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics NetworkCollaborators
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystemdevalnaik
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Eryk Budi Pratama
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainPriyanka Aash
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesAhmad Sharaf
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume todayNana Owusu
 

Semelhante a Secure IT 2014 (20)

Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystem
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 

Mais de ADGP, Public Grivences, Bangalore

Mais de ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 

Último

ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.Christina Parmionova
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23JSchaus & Associates
 
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxPETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxCrisAnnBusilan
 
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...MartMantilla1
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Christina Parmionova
 
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityPope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityEnergy for One World
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONShivamShukla147857
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...Energy for One World
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...Christina Parmionova
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaTrinity Care Foundation
 
Build Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsBuild Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsSERUDS INDIA
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsBeat Estermann
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfAndrew Griffith
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportEnergy for One World
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programmeChristina Parmionova
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.Christina Parmionova
 

Último (20)

ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
ECOSOC YOUTH FORUM 2024 Side Events Schedule-18 April.
 
Housing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice ReportHousing For All - Fair Housing Choice Report
Housing For All - Fair Housing Choice Report
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
 
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptxPETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
PETTY CASH FUND - GOVERNMENT ACCOUNTING.pptx
 
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
Republic Act 11032 (Ease of Doing Business and Efficient Government Service D...
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
Youth shaping sustainable and innovative solution - Reinforcing the 2030 agen...
 
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human DignityPope Francis Teaching: Dignitas Infinita- On Human Dignity
Pope Francis Teaching: Dignitas Infinita- On Human Dignity
 
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATIONGOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
GOVERNMENT OF NCT OF DELHI DIRECTORATE OF EDUCATION
 
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
European Court of Human Rights: Judgment Verein KlimaSeniorinnen Schweiz and ...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...2024 ECOSOC YOUTH FORUM -logistical information -  United Nations Economic an...
2024 ECOSOC YOUTH FORUM -logistical information - United Nations Economic an...
 
ISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, IndiaISEIDP in Chikkaballapura, Karnataka, India
ISEIDP in Chikkaballapura, Karnataka, India
 
Build Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor StudentsBuild Tomorrow’s India Today By Making Charity For Poor Students
Build Tomorrow’s India Today By Making Charity For Poor Students
 
Digital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical ImplicationsDigital Transformation of the Heritage Sector and its Practical Implications
Digital Transformation of the Heritage Sector and its Practical Implications
 
Canadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdfCanadian Immigration Tracker - Key Slides - February 2024.pdf
Canadian Immigration Tracker - Key Slides - February 2024.pdf
 
UN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 ReportUN DESA: Finance for Development 2024 Report
UN DESA: Finance for Development 2024 Report
 
23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme23rd Infopoverty World Conference - Agenda programme
23rd Infopoverty World Conference - Agenda programme
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
ECOSOC YOUTH FORUM 2024 - Side Events Schedule -16 April.
 

Secure IT 2014

  • 1. Sanjay Sahay, IPS., ADGP, Police Computer Wing, Bangalore
  • 2. Text Presentation Structure • Introduction • Attack Methods • Hacking groups • Best Security model • KSP Security model • Tool and technology in use • Challenges / Bottleneck • Gaps • Wish list • Conclusion. •
  • 3. Information Security: Preservation of confidentiality, integrity and availability of information
  • 8. Text KSP Infrastructure and Security solution
  • 9. KSP Computerization Model Enterprise Model People Process Technology Infrastructure Governance • Internal Champions • Capacity Building • Nodal Officers • Sys Admins • Handholding • BPR • Integration • Automation • ERP • Web Service • Active Directory • SMS Gateway • e-Pen • KSP DC • KSP WAN • DR Centre • EMS • Centralized AV • Automated Backup • Core Team • SCRB Nodal Officer • District Nodal Officer • Central NOC • Helpdesk
  • 11. KSP Wide Area Network Text 45 locations 1,2 & 4 Mbps leased line 1458 locations 512 Kbps and 1 Mbps VPNoBB 45 Mbps aggregation bandwidth 16 Mbps Internet leased line KSPWAN • LAN infrastructure at All locations • Fixed IP for all VPNoBB connections • Network Monitoring Software to monitor the availability. • End router security through ACL • Zone based LAN architecture through VLANs • MAC authentication servers • Hardening of Network Devices • SOP for network management. • Warranty / Support
  • 12. Text Karnataka State Police Wide Area Network Type of Network Number of Links at Initiation Number of Links at Present MPLS 39 45 VPNoBB 1350 1458 ILL 2 2 • Karnataka State Police Wide Area Network, (KSPWAN) was created in the year 2009 with BSNL • This was successfully implemented jointly by BSNL and the Karnataka State Police. • This Network is a combination of 45 MPLS and 1458 VPNoBB connections • Connects all police station and higher offices across the state. • Fixed IP has been implemented on VPNoBB connection • In addition 16 Mbps Internet leased line has also been provided. 10 Mbps 16 Mbps 32 Mbps 45 Mbps DC Aggregation Bandwidth Up-gradation
  • 13. Core Functionalities • Crime • Law & Order • Traffic Administration • Administration • Finance • Stores Ancillary support • Armed Reserve • Motor Transport • Training Technical Modules • Wireless • Forensic Science • Laboratory Police IT - ERP 11 Modules 64 Roles 522 Screen 417 Reports MIS
  • 14. Police IT - ERP
  • 15. Police IT - ERP  Layered architecture  Authentication and Authorization process  Encrypted communication  Fail over Clustering to avoid single point of failure.  .Net Framework used to develop the application for better availability, performance and security.
  • 16. Police IT – ERP Security Guidelines  Prevention of un-authorized access, Role based access  Auditing should be enabled for DML statements.  User name and password for authentication  Standard password policy.  The process for removing unnecessary code from the application after it is released should be documented  Application code should not contain invalid references to network resources The solution should not display the entire path of URL in the browser based application  The solution should support multi-tier authentication where required  Solution should provide logout option to terminate the session  Data Encryption at traveling and at rest.  All the credentials and sensitive data always will store at Database end  The Solution should not be vulnerable for OWASP top 10 attacks.
  • 17. Text Security Solution of KSP Defense in Depth technology has been adopted for KSP to ensure the maximum protection at each layer from attacks. • IT Security Policy • Regular audits. • End user awareness program. • DC protected with surveillance and biometric access • Two Tier Security Architecture. • Full fledge Intrusion Prevention System. • SIEM for log management and Event Analysis for real time alerts. • Internal Zone are created based on the functionality • Centralized End point protection antivirus for Servers and Desktops • Centralized Authentication and Authorization through LDAP Server. • Role based Access. • Hardening of OS, Applications and Network devices. • Regular patch management. • Data Stored in Encrypted format
  • 18. DC / DR Technology / Tools used Unified Threat Management System Network Intrusion Prevention System Firewall Security Information and Event Management Centralized Antivirus Software Patch Management Software LDAP Server IP Sec Tunnel Between Branch and DC Access Control List for end router security Network Monitoring Software Traffic Monitoring Software Role Based Access Hosted in Secured zone and accessible only on Intranet Role based Access Audit logs CAB to control the changes Application Monitoring Software Stored in Encrypted mode Stringent testing policy Security layer Network layer Application layer
  • 19. End Computer/ User Security • Computers are under the supervision of LDAP Server • Centralized Authentication, Authorization and Accounting through LDAP Server • Computers are operated with least Privileged account. • Local administrator and user accounts are restricted. • End Point Protection installed on all computers to battle against the advance threat. • Stringent Policies to enforce end computer security through LDAP and Centralize AV Management Server. • Regular patch management to fix the OS and application level Vulnerabilities. • SOP for computer usage • Usage of External Device is strictly prohibited. • Authorized / Approved applications are allowed to use. • Centralized Log monitoring through SIEM to identify and mitigate the internal threats. • Computer security is a part of Basic computer training program. • Regular Security awareness program to end users.
  • 20. Text Internal Resources of KSP Resources Number Key Security resources MCSE, CCNA, VCP, CEH, CHFI 3 Middle tier security resources System Administrators (MCSE and CCNA) 75 Security Enforcement Team 120 Police IT Operators 3000
  • 21. Text Operation Principals of KSP Secure MonitorAudit/Test Manage/ Improve Policy Training Awareness
  • 22. Text • Challenges / Bottleneck Challenges • Creating of security awareness. • Resistance to change • Management skill • Regular Monitoring • Knowledge upgradation • Rediness for DDoS attack • Fighting against distruptive attacks. • Bottlenecks • No Direct control on the other country cyber criminals • Zero day attack • TOR based communication •
  • 23. Safe and Seurece Internet Forensic Rediness Security Awereness Program. Wish list
  • 24.  Security architecture should be a dynamic process that consistently enforces security among all users to protect corporate information.  Regular IT security audit would help the organization to find the vulnerabilities and gaps to fix it proactively before it get exploited by an hacker.  People are the major pillar of the security, should be trained regularly better security.  As 100% security is impossible, you need to decide what needs to be secured and how well it needs to be secured. Conclusion