SlideShare uma empresa Scribd logo
1 de 25
Sanjay Sahay, IPS.,
ADGP, Police Computer Wing,
Bangalore
Text
Presentation Structure
• Introduction
• Attack Methods
• Hacking groups
• Best Security model
• KSP Security model
• Tool and technology in use
• Challenges / Bottleneck
• Gaps
• Wish list
• Conclusion.
•
Information Security: Preservation of confidentiality, integrity and
availability of information
Protection from what ?
Protection from whom ?
Text
Is technology is enough ?
Text
PEOPLE
PROCESSES
TECHNOLOGY
•User Awareness
•Guidance
•Administration
•Monitor
• Policies
•Standards
•Guidelines
•Audit
•IPS
•Firewall
•AV
•DLP
•SIEM
What builds the best information security
Text
KSP Infrastructure and Security solution
KSP Computerization Model
Enterprise Model
People Process Technology Infrastructure Governance
• Internal
Champions
• Capacity
Building
• Nodal
Officers
• Sys Admins
• Handholding
• BPR
• Integration
• Automation
• ERP
• Web Service
• Active
Directory
• SMS
Gateway
• e-Pen
• KSP DC
• KSP WAN
• DR Centre
• EMS
• Centralized
AV
• Automated
Backup
• Core Team
• SCRB Nodal
Officer
• District Nodal
Officer
• Central NOC
• Helpdesk
Text
Core Infrastructure
KSP Wide Area Network
Text
45 locations
1,2 & 4 Mbps leased line
1458 locations
512 Kbps and 1 Mbps
VPNoBB
45 Mbps
aggregation bandwidth
16 Mbps
Internet leased line
KSPWAN
• LAN infrastructure at All locations
• Fixed IP for all VPNoBB
connections
• Network Monitoring Software to
monitor the availability.
• End router security through ACL
• Zone based LAN architecture
through VLANs
• MAC authentication servers
• Hardening of Network Devices
• SOP for network management.
• Warranty / Support
Text
Karnataka State Police Wide Area Network
Type of Network Number of
Links at
Initiation
Number of
Links at
Present
MPLS 39 45
VPNoBB 1350 1458
ILL 2 2
• Karnataka State Police Wide Area Network, (KSPWAN) was created in the year 2009 with BSNL
• This was successfully implemented jointly by BSNL and the Karnataka State Police.
• This Network is a combination of 45 MPLS and 1458 VPNoBB connections
• Connects all police station and higher offices across the state.
• Fixed IP has been implemented on VPNoBB connection
• In addition 16 Mbps Internet leased line has also been provided.
10
Mbps
16
Mbps
32
Mbps
45
Mbps
DC Aggregation Bandwidth
Up-gradation
Core Functionalities
• Crime
• Law & Order
• Traffic
Administration
• Administration
• Finance
• Stores
Ancillary support
• Armed Reserve
• Motor Transport
• Training
Technical Modules
• Wireless
• Forensic Science
• Laboratory
Police IT - ERP
11
Modules
64
Roles
522
Screen
417
Reports MIS
Police IT - ERP
Police IT - ERP
 Layered architecture
 Authentication and Authorization process
 Encrypted communication
 Fail over Clustering to avoid single point of failure.
 .Net Framework used to develop the application for
better availability, performance and security.
Police IT – ERP Security Guidelines
 Prevention of un-authorized access, Role based access
 Auditing should be enabled for DML statements.
 User name and password for authentication
 Standard password policy.
 The process for removing unnecessary code from the application after it is released should
be documented
 Application code should not contain invalid references to network resources The solution
should not display the entire path of URL in the browser based application
 The solution should support multi-tier authentication where required
 Solution should provide logout option to terminate the session
 Data Encryption at traveling and at rest.
 All the credentials and sensitive data always will store at Database end
 The Solution should not be vulnerable for OWASP top 10 attacks.
Text
Security Solution of KSP
Defense in Depth technology has been adopted for KSP to ensure the
maximum protection at each layer from attacks.
• IT Security Policy
• Regular audits.
• End user awareness program.
• DC protected with surveillance and biometric access
• Two Tier Security Architecture.
• Full fledge Intrusion Prevention System.
• SIEM for log management and Event Analysis for real time alerts.
• Internal Zone are created based on the functionality
• Centralized End point protection antivirus for Servers and Desktops
• Centralized Authentication and Authorization through LDAP Server.
• Role based Access.
• Hardening of OS, Applications and Network devices.
• Regular patch management.
• Data Stored in Encrypted format
DC / DR Technology / Tools used
Unified Threat Management
System
Network Intrusion Prevention
System
Firewall
Security Information and Event
Management
Centralized Antivirus Software
Patch Management Software
LDAP Server
IP Sec Tunnel Between Branch and
DC
Access Control List for end router
security
Network Monitoring Software
Traffic Monitoring Software
Role Based Access
Hosted in Secured zone and
accessible only on Intranet
Role based Access
Audit logs
CAB to control the changes
Application Monitoring Software
Stored in Encrypted mode
Stringent testing policy
Security layer Network layer Application layer
End Computer/ User Security
• Computers are under the supervision of LDAP Server
• Centralized Authentication, Authorization and Accounting through LDAP Server
• Computers are operated with least Privileged account.
• Local administrator and user accounts are restricted.
• End Point Protection installed on all computers to battle against the advance threat.
• Stringent Policies to enforce end computer security through LDAP and Centralize AV
Management Server.
• Regular patch management to fix the OS and application level Vulnerabilities.
• SOP for computer usage
• Usage of External Device is strictly prohibited.
• Authorized / Approved applications are allowed to use.
• Centralized Log monitoring through SIEM to identify and mitigate the internal threats.
• Computer security is a part of Basic computer training program.
• Regular Security awareness program to end users.
Text
Internal Resources of KSP
Resources Number
Key Security resources
MCSE, CCNA, VCP, CEH, CHFI
3
Middle tier security resources
System Administrators (MCSE and CCNA)
75
Security Enforcement Team 120
Police IT Operators 3000
Text
Operation Principals of KSP
Secure
MonitorAudit/Test
Manage/
Improve
Policy
Training
Awareness
Text
• Challenges / Bottleneck
Challenges
• Creating of security
awareness.
• Resistance to change
• Management skill
• Regular Monitoring
• Knowledge upgradation
• Rediness for DDoS attack
• Fighting against distruptive
attacks.
•
Bottlenecks
• No Direct control on the
other country cyber
criminals
• Zero day attack
• TOR based communication
•
Safe and Seurece
Internet
Forensic Rediness
Security
Awereness
Program.
Wish list
 Security architecture should be a dynamic process that
consistently enforces security among all users to protect
corporate information.
 Regular IT security audit would help the organization to find the
vulnerabilities and gaps to fix it proactively before it get
exploited by an hacker.
 People are the major pillar of the security, should be trained
regularly better security.
 As 100% security is impossible, you need to decide what
needs to be secured and how well it needs to be secured.
Conclusion
Secure IT 2014

Mais conteúdo relacionado

Mais procurados

2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 

Mais procurados (20)

Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small business
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
WhyNormShield
WhyNormShieldWhyNormShield
WhyNormShield
 

Destaque (7)

Computational Journalism
Computational JournalismComputational Journalism
Computational Journalism
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 

Semelhante a Secure IT 2014

Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystem
devalnaik
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
Sectricity
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
Nana Owusu
 

Semelhante a Secure IT 2014 (20)

Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Element Management Subsystem
Element Management SubsystemElement Management Subsystem
Element Management Subsystem
 
Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014Career in IT - HMTIF UB Platform 2014
Career in IT - HMTIF UB Platform 2014
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 

Mais de ADGP, Public Grivences, Bangalore

Mais de ADGP, Public Grivences, Bangalore (20)

Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 
LTC - 1
LTC - 1LTC - 1
LTC - 1
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
LTC - 2
LTC - 2LTC - 2
LTC - 2
 
Unreached
UnreachedUnreached
Unreached
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
Geopolitics HLS Article
Geopolitics HLS ArticleGeopolitics HLS Article
Geopolitics HLS Article
 

Último

VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Agra 7001035870 Whatsapp Number, 24/07 Booking
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Akurdi ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Akurdi ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Secure IT 2014

  • 1. Sanjay Sahay, IPS., ADGP, Police Computer Wing, Bangalore
  • 2. Text Presentation Structure • Introduction • Attack Methods • Hacking groups • Best Security model • KSP Security model • Tool and technology in use • Challenges / Bottleneck • Gaps • Wish list • Conclusion. •
  • 3. Information Security: Preservation of confidentiality, integrity and availability of information
  • 8. Text KSP Infrastructure and Security solution
  • 9. KSP Computerization Model Enterprise Model People Process Technology Infrastructure Governance • Internal Champions • Capacity Building • Nodal Officers • Sys Admins • Handholding • BPR • Integration • Automation • ERP • Web Service • Active Directory • SMS Gateway • e-Pen • KSP DC • KSP WAN • DR Centre • EMS • Centralized AV • Automated Backup • Core Team • SCRB Nodal Officer • District Nodal Officer • Central NOC • Helpdesk
  • 11. KSP Wide Area Network Text 45 locations 1,2 & 4 Mbps leased line 1458 locations 512 Kbps and 1 Mbps VPNoBB 45 Mbps aggregation bandwidth 16 Mbps Internet leased line KSPWAN • LAN infrastructure at All locations • Fixed IP for all VPNoBB connections • Network Monitoring Software to monitor the availability. • End router security through ACL • Zone based LAN architecture through VLANs • MAC authentication servers • Hardening of Network Devices • SOP for network management. • Warranty / Support
  • 12. Text Karnataka State Police Wide Area Network Type of Network Number of Links at Initiation Number of Links at Present MPLS 39 45 VPNoBB 1350 1458 ILL 2 2 • Karnataka State Police Wide Area Network, (KSPWAN) was created in the year 2009 with BSNL • This was successfully implemented jointly by BSNL and the Karnataka State Police. • This Network is a combination of 45 MPLS and 1458 VPNoBB connections • Connects all police station and higher offices across the state. • Fixed IP has been implemented on VPNoBB connection • In addition 16 Mbps Internet leased line has also been provided. 10 Mbps 16 Mbps 32 Mbps 45 Mbps DC Aggregation Bandwidth Up-gradation
  • 13. Core Functionalities • Crime • Law & Order • Traffic Administration • Administration • Finance • Stores Ancillary support • Armed Reserve • Motor Transport • Training Technical Modules • Wireless • Forensic Science • Laboratory Police IT - ERP 11 Modules 64 Roles 522 Screen 417 Reports MIS
  • 14. Police IT - ERP
  • 15. Police IT - ERP  Layered architecture  Authentication and Authorization process  Encrypted communication  Fail over Clustering to avoid single point of failure.  .Net Framework used to develop the application for better availability, performance and security.
  • 16. Police IT – ERP Security Guidelines  Prevention of un-authorized access, Role based access  Auditing should be enabled for DML statements.  User name and password for authentication  Standard password policy.  The process for removing unnecessary code from the application after it is released should be documented  Application code should not contain invalid references to network resources The solution should not display the entire path of URL in the browser based application  The solution should support multi-tier authentication where required  Solution should provide logout option to terminate the session  Data Encryption at traveling and at rest.  All the credentials and sensitive data always will store at Database end  The Solution should not be vulnerable for OWASP top 10 attacks.
  • 17. Text Security Solution of KSP Defense in Depth technology has been adopted for KSP to ensure the maximum protection at each layer from attacks. • IT Security Policy • Regular audits. • End user awareness program. • DC protected with surveillance and biometric access • Two Tier Security Architecture. • Full fledge Intrusion Prevention System. • SIEM for log management and Event Analysis for real time alerts. • Internal Zone are created based on the functionality • Centralized End point protection antivirus for Servers and Desktops • Centralized Authentication and Authorization through LDAP Server. • Role based Access. • Hardening of OS, Applications and Network devices. • Regular patch management. • Data Stored in Encrypted format
  • 18. DC / DR Technology / Tools used Unified Threat Management System Network Intrusion Prevention System Firewall Security Information and Event Management Centralized Antivirus Software Patch Management Software LDAP Server IP Sec Tunnel Between Branch and DC Access Control List for end router security Network Monitoring Software Traffic Monitoring Software Role Based Access Hosted in Secured zone and accessible only on Intranet Role based Access Audit logs CAB to control the changes Application Monitoring Software Stored in Encrypted mode Stringent testing policy Security layer Network layer Application layer
  • 19. End Computer/ User Security • Computers are under the supervision of LDAP Server • Centralized Authentication, Authorization and Accounting through LDAP Server • Computers are operated with least Privileged account. • Local administrator and user accounts are restricted. • End Point Protection installed on all computers to battle against the advance threat. • Stringent Policies to enforce end computer security through LDAP and Centralize AV Management Server. • Regular patch management to fix the OS and application level Vulnerabilities. • SOP for computer usage • Usage of External Device is strictly prohibited. • Authorized / Approved applications are allowed to use. • Centralized Log monitoring through SIEM to identify and mitigate the internal threats. • Computer security is a part of Basic computer training program. • Regular Security awareness program to end users.
  • 20. Text Internal Resources of KSP Resources Number Key Security resources MCSE, CCNA, VCP, CEH, CHFI 3 Middle tier security resources System Administrators (MCSE and CCNA) 75 Security Enforcement Team 120 Police IT Operators 3000
  • 21. Text Operation Principals of KSP Secure MonitorAudit/Test Manage/ Improve Policy Training Awareness
  • 22. Text • Challenges / Bottleneck Challenges • Creating of security awareness. • Resistance to change • Management skill • Regular Monitoring • Knowledge upgradation • Rediness for DDoS attack • Fighting against distruptive attacks. • Bottlenecks • No Direct control on the other country cyber criminals • Zero day attack • TOR based communication •
  • 23. Safe and Seurece Internet Forensic Rediness Security Awereness Program. Wish list
  • 24.  Security architecture should be a dynamic process that consistently enforces security among all users to protect corporate information.  Regular IT security audit would help the organization to find the vulnerabilities and gaps to fix it proactively before it get exploited by an hacker.  People are the major pillar of the security, should be trained regularly better security.  As 100% security is impossible, you need to decide what needs to be secured and how well it needs to be secured. Conclusion