SlideShare a Scribd company logo
1 of 8
Bhaskaracharya Institute for Space Applications and
                 Geo-informatics

               "We serve the Society“

    Securing Applications and Data




     Department of Science and Technology
             Government of Gujarat
BISAG
Follows International Standards :
  ISO     9001:2008          (Quality Management)

  ISO    27001:2005
     (Security, Confidentiality, Integrity, Availability )

  CMMI LEVEL-3
     (Software Development, Periodic Audits)
BISAG – Functional Units
 GUJSAT (Gujarat SATCOM Network )
         …Distance interactive education, training and extension

 Centre for Geo-informatics Applications
          …Conceptualization, creation and organization of multi
             purpose common geospatial digital database for
      sectoral / integrated planning and decision supportsystems

 Centre for Informatics and Training

          …Product, E-governance, Low cost end to end solutions

  Academy of Geo-informatics for Sustainable Development

           …Education, Training and Research
BISAG – ISO 27001:2005
Information Security Management System
• Safeguard organizational and user assets
  (documents, project data, user department
  data, etc.)
• A layered approach to systematically
  manage the security of sensitive and
  confidential data
BISAG – Information Security

• Security is a process.
• Testing, verification and validation of
  websites, software and applications
  developed at BISAG using Open Source
  tools.
BISAG – Web-application Security

• OWASP (Open Web Application Security
  Project ).
• VAPT (Vulnerability Assessment and
  Penetration Testing) cell conducts security
  audits as per OWASP Application Security
  Code of Conduct.
• Securing online data from unauthorized
  access.
BISAG – Network Security



• Open Source IDPS (Intrusion Detection and
  Prevention System) configuration and
  testing.
• Open source framework is used to develop
  and execute exploit code against a remote
  target machine.
• Other Open source tools are used for
  Network auditing and server security testing
BISAG – Training



• Regular trainings are conducted for
  awareness regarding latest threats as per
  OWASP.
• Countermeasures and related solutions are
  shared.

More Related Content

Viewers also liked

Presentacióblog alejandro
Presentacióblog alejandroPresentacióblog alejandro
Presentacióblog alejandro
jocbolainicial
 
Ens ha visitat la mare del biel
Ens ha visitat la mare del bielEns ha visitat la mare del biel
Ens ha visitat la mare del biel
jocbolainicial
 
20131116 creators meetup
20131116 creators meetup20131116 creators meetup
20131116 creators meetup
Seigo Tanaka
 
Guidance
GuidanceGuidance
Guidance
Zyra Ü
 

Viewers also liked (18)

Presentacióblog alejandro
Presentacióblog alejandroPresentacióblog alejandro
Presentacióblog alejandro
 
BUILD A HOUSE-2
BUILD A HOUSE-2BUILD A HOUSE-2
BUILD A HOUSE-2
 
Presentation KOROSI BESI
Presentation KOROSI BESIPresentation KOROSI BESI
Presentation KOROSI BESI
 
Relative clauses
Relative clausesRelative clauses
Relative clauses
 
Ens ha visitat la mare del biel
Ens ha visitat la mare del bielEns ha visitat la mare del biel
Ens ha visitat la mare del biel
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super Resolution
 
20131116 creators meetup
20131116 creators meetup20131116 creators meetup
20131116 creators meetup
 
Visita de 2n a p5
Visita de 2n a p5Visita de 2n a p5
Visita de 2n a p5
 
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar ApplicationReduction of Side Lobes by Using Complementary Codes for Radar Application
Reduction of Side Lobes by Using Complementary Codes for Radar Application
 
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
 
Evaluation Question 7
Evaluation Question 7Evaluation Question 7
Evaluation Question 7
 
Evaluation Question 3
Evaluation Question 3Evaluation Question 3
Evaluation Question 3
 
Guidance
GuidanceGuidance
Guidance
 
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
 
F0554050
F0554050F0554050
F0554050
 
Mermelada de sabores
Mermelada de saboresMermelada de sabores
Mermelada de sabores
 
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのかいちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
 
20140920 CreatorsMeetup20
20140920 CreatorsMeetup2020140920 CreatorsMeetup20
20140920 CreatorsMeetup20
 

Similar to Securing Applications and Data

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
ijtsrd
 
Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
Ramesh VG
 

Similar to Securing Applications and Data (20)

SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCESURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
SURVEY ON ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Cissp exam-outline
Cissp exam-outlineCissp exam-outline
Cissp exam-outline
 
Quality 4.0 and reimagining quality
Quality 4.0 and reimagining qualityQuality 4.0 and reimagining quality
Quality 4.0 and reimagining quality
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
 
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen HypervisorSafety-Certifying Open Source Software: The Case of the Xen Hypervisor
Safety-Certifying Open Source Software: The Case of the Xen Hypervisor
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCEONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
ONLINE EXAMINATION SYSTEM USING ARTIFICIAL INTELLIGENCE
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Application_security_Strategic
Application_security_StrategicApplication_security_Strategic
Application_security_Strategic
 
Cissp certified information systems security professional - 27 th february ...
Cissp   certified information systems security professional - 27 th february ...Cissp   certified information systems security professional - 27 th february ...
Cissp certified information systems security professional - 27 th february ...
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Doing Science Properly In The Digital Age - Rutgers Seminar
Doing Science Properly In The Digital Age - Rutgers SeminarDoing Science Properly In The Digital Age - Rutgers Seminar
Doing Science Properly In The Digital Age - Rutgers Seminar
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Securing Applications and Data

  • 1. Bhaskaracharya Institute for Space Applications and Geo-informatics "We serve the Society“ Securing Applications and Data Department of Science and Technology Government of Gujarat
  • 2. BISAG Follows International Standards :  ISO 9001:2008 (Quality Management)  ISO 27001:2005 (Security, Confidentiality, Integrity, Availability )  CMMI LEVEL-3 (Software Development, Periodic Audits)
  • 3. BISAG – Functional Units  GUJSAT (Gujarat SATCOM Network ) …Distance interactive education, training and extension  Centre for Geo-informatics Applications …Conceptualization, creation and organization of multi purpose common geospatial digital database for sectoral / integrated planning and decision supportsystems  Centre for Informatics and Training …Product, E-governance, Low cost end to end solutions  Academy of Geo-informatics for Sustainable Development …Education, Training and Research
  • 4. BISAG – ISO 27001:2005 Information Security Management System • Safeguard organizational and user assets (documents, project data, user department data, etc.) • A layered approach to systematically manage the security of sensitive and confidential data
  • 5. BISAG – Information Security • Security is a process. • Testing, verification and validation of websites, software and applications developed at BISAG using Open Source tools.
  • 6. BISAG – Web-application Security • OWASP (Open Web Application Security Project ). • VAPT (Vulnerability Assessment and Penetration Testing) cell conducts security audits as per OWASP Application Security Code of Conduct. • Securing online data from unauthorized access.
  • 7. BISAG – Network Security • Open Source IDPS (Intrusion Detection and Prevention System) configuration and testing. • Open source framework is used to develop and execute exploit code against a remote target machine. • Other Open source tools are used for Network auditing and server security testing
  • 8. BISAG – Training • Regular trainings are conducted for awareness regarding latest threats as per OWASP. • Countermeasures and related solutions are shared.

Editor's Notes

  1. Goverment of Gujarat