Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing Applications and Data

Bhaskaracharya Institute for Space Applications and
Geo-informatics (BISAG)

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

  • Be the first to like this

Securing Applications and Data

  1. 1. Bhaskaracharya Institute for Space Applications and Geo-informatics "We serve the Society“ Securing Applications and Data Department of Science and Technology Government of Gujarat
  2. 2. BISAGFollows International Standards :  ISO 9001:2008 (Quality Management)  ISO 27001:2005 (Security, Confidentiality, Integrity, Availability )  CMMI LEVEL-3 (Software Development, Periodic Audits)
  3. 3. BISAG – Functional Units GUJSAT (Gujarat SATCOM Network ) …Distance interactive education, training and extension Centre for Geo-informatics Applications …Conceptualization, creation and organization of multi purpose common geospatial digital database for sectoral / integrated planning and decision supportsystems Centre for Informatics and Training …Product, E-governance, Low cost end to end solutions  Academy of Geo-informatics for Sustainable Development …Education, Training and Research
  4. 4. BISAG – ISO 27001:2005Information Security Management System• Safeguard organizational and user assets (documents, project data, user department data, etc.)• A layered approach to systematically manage the security of sensitive and confidential data
  5. 5. BISAG – Information Security• Security is a process.• Testing, verification and validation of websites, software and applications developed at BISAG using Open Source tools.
  6. 6. BISAG – Web-application Security• OWASP (Open Web Application Security Project ).• VAPT (Vulnerability Assessment and Penetration Testing) cell conducts security audits as per OWASP Application Security Code of Conduct.• Securing online data from unauthorized access.
  7. 7. BISAG – Network Security• Open Source IDPS (Intrusion Detection and Prevention System) configuration and testing.• Open source framework is used to develop and execute exploit code against a remote target machine.• Other Open source tools are used for Network auditing and server security testing
  8. 8. BISAG – Training• Regular trainings are conducted for awareness regarding latest threats as per OWASP.• Countermeasures and related solutions are shared.