SlideShare a Scribd company logo
1 of 8
Bhaskaracharya Institute for Space Applications and
                 Geo-informatics

               "We serve the Society“

    Securing Applications and Data




     Department of Science and Technology
             Government of Gujarat
BISAG
Follows International Standards :
  ISO     9001:2008          (Quality Management)

  ISO    27001:2005
     (Security, Confidentiality, Integrity, Availability )

  CMMI LEVEL-3
     (Software Development, Periodic Audits)
BISAG – Functional Units
 GUJSAT (Gujarat SATCOM Network )
         …Distance interactive education, training and extension

 Centre for Geo-informatics Applications
          …Conceptualization, creation and organization of multi
             purpose common geospatial digital database for
      sectoral / integrated planning and decision supportsystems

 Centre for Informatics and Training

          …Product, E-governance, Low cost end to end solutions

  Academy of Geo-informatics for Sustainable Development

           …Education, Training and Research
BISAG – ISO 27001:2005
Information Security Management System
• Safeguard organizational and user assets
  (documents, project data, user department
  data, etc.)
• A layered approach to systematically
  manage the security of sensitive and
  confidential data
BISAG – Information Security

• Security is a process.
• Testing, verification and validation of
  websites, software and applications
  developed at BISAG using Open Source
  tools.
BISAG – Web-application Security

• OWASP (Open Web Application Security
  Project ).
• VAPT (Vulnerability Assessment and
  Penetration Testing) cell conducts security
  audits as per OWASP Application Security
  Code of Conduct.
• Securing online data from unauthorized
  access.
BISAG – Network Security



• Open Source IDPS (Intrusion Detection and
  Prevention System) configuration and
  testing.
• Open source framework is used to develop
  and execute exploit code against a remote
  target machine.
• Other Open source tools are used for
  Network auditing and server security testing
BISAG – Training



• Regular trainings are conducted for
  awareness regarding latest threats as per
  OWASP.
• Countermeasures and related solutions are
  shared.

More Related Content

Viewers also liked

Presentacióblog alejandro
Presentacióblog alejandroPresentacióblog alejandro
Presentacióblog alejandro
jocbolainicial
 
Ens ha visitat la mare del biel
Ens ha visitat la mare del bielEns ha visitat la mare del biel
Ens ha visitat la mare del biel
jocbolainicial
 
20131116 creators meetup
20131116 creators meetup20131116 creators meetup
20131116 creators meetup
Seigo Tanaka
 
Guidance
GuidanceGuidance
Guidance
Zyra Ü
 

Viewers also liked (18)

Presentacióblog alejandro
Presentacióblog alejandroPresentacióblog alejandro
Presentacióblog alejandro
 
BUILD A HOUSE-2
BUILD A HOUSE-2BUILD A HOUSE-2
BUILD A HOUSE-2
 
Presentation KOROSI BESI
Presentation KOROSI BESIPresentation KOROSI BESI
Presentation KOROSI BESI
 
Relative clauses
Relative clausesRelative clauses
Relative clauses
 
Ens ha visitat la mare del biel
Ens ha visitat la mare del bielEns ha visitat la mare del biel
Ens ha visitat la mare del biel
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super Resolution
 
20131116 creators meetup
20131116 creators meetup20131116 creators meetup
20131116 creators meetup
 
Visita de 2n a p5
Visita de 2n a p5Visita de 2n a p5
Visita de 2n a p5
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar Application
 
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
 
Evaluation Question 7
Evaluation Question 7Evaluation Question 7
Evaluation Question 7
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3
 
Guidance
GuidanceGuidance
Guidance
 
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
 
F0554050
F0554050F0554050
F0554050
 
Mermelada de sabores
Mermelada de saboresMermelada de sabores
Mermelada de sabores
 
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのかいちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
 
20140920 CreatorsMeetup20
20140920 CreatorsMeetup2020140920 CreatorsMeetup20
20140920 CreatorsMeetup20
 

Similar to Securing Applications and Data

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
ijtsrd
 
Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
Ramesh VG
 

Similar to Securing Applications and Data (20)

SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCESURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
Quality 4.0 and reimagining quality
Quality 4.0 and reimagining qualityQuality 4.0 and reimagining quality
Quality 4.0 and reimagining quality
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
 
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen HypervisorSafety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCEONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Doing Science Properly In The Digital Age - Rutgers Seminar
Doing Science Properly In The Digital Age - Rutgers SeminarDoing Science Properly In The Digital Age - Rutgers Seminar
Doing Science Properly In The Digital Age - Rutgers Seminar
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Securing Applications and Data

  • 1. Bhaskaracharya Institute for Space Applications and Geo-informatics "We serve the Society“ Securing Applications and Data Department of Science and Technology Government of Gujarat
  • 2. BISAG Follows International Standards :  ISO 9001:2008 (Quality Management)  ISO 27001:2005 (Security, Confidentiality, Integrity, Availability )  CMMI LEVEL-3 (Software Development, Periodic Audits)
  • 3. BISAG – Functional Units  GUJSAT (Gujarat SATCOM Network ) …Distance interactive education, training and extension  Centre for Geo-informatics Applications …Conceptualization, creation and organization of multi purpose common geospatial digital database for sectoral / integrated planning and decision supportsystems  Centre for Informatics and Training …Product, E-governance, Low cost end to end solutions  Academy of Geo-informatics for Sustainable Development …Education, Training and Research
  • 4. BISAG – ISO 27001:2005 Information Security Management System • Safeguard organizational and user assets (documents, project data, user department data, etc.) • A layered approach to systematically manage the security of sensitive and confidential data
  • 5. BISAG – Information Security • Security is a process. • Testing, verification and validation of websites, software and applications developed at BISAG using Open Source tools.
  • 6. BISAG – Web-application Security • OWASP (Open Web Application Security Project ). • VAPT (Vulnerability Assessment and Penetration Testing) cell conducts security audits as per OWASP Application Security Code of Conduct. • Securing online data from unauthorized access.
  • 7. BISAG – Network Security • Open Source IDPS (Intrusion Detection and Prevention System) configuration and testing. • Open source framework is used to develop and execute exploit code against a remote target machine. • Other Open source tools are used for Network auditing and server security testing
  • 8. BISAG – Training • Regular trainings are conducted for awareness regarding latest threats as per OWASP. • Countermeasures and related solutions are shared.

Editor's Notes

  1. Goverment of Gujarat