SlideShare a Scribd company logo
Bhaskaracharya Institute for Space Applications and
                 Geo-informatics

               "We serve the Society“

    Securing Applications and Data




     Department of Science and Technology
             Government of Gujarat
BISAG
Follows International Standards :
  ISO     9001:2008          (Quality Management)

  ISO    27001:2005
     (Security, Confidentiality, Integrity, Availability )

  CMMI LEVEL-3
     (Software Development, Periodic Audits)
BISAG – Functional Units
 GUJSAT (Gujarat SATCOM Network )
         …Distance interactive education, training and extension

 Centre for Geo-informatics Applications
          …Conceptualization, creation and organization of multi
             purpose common geospatial digital database for
      sectoral / integrated planning and decision supportsystems

 Centre for Informatics and Training

          …Product, E-governance, Low cost end to end solutions

  Academy of Geo-informatics for Sustainable Development

           …Education, Training and Research
BISAG – ISO 27001:2005
Information Security Management System
• Safeguard organizational and user assets
  (documents, project data, user department
  data, etc.)
• A layered approach to systematically
  manage the security of sensitive and
  confidential data
BISAG – Information Security

• Security is a process.
• Testing, verification and validation of
  websites, software and applications
  developed at BISAG using Open Source
  tools.
BISAG – Web-application Security

• OWASP (Open Web Application Security
  Project ).
• VAPT (Vulnerability Assessment and
  Penetration Testing) cell conducts security
  audits as per OWASP Application Security
  Code of Conduct.
• Securing online data from unauthorized
  access.
BISAG – Network Security



• Open Source IDPS (Intrusion Detection and
  Prevention System) configuration and
  testing.
• Open source framework is used to develop
  and execute exploit code against a remote
  target machine.
• Other Open source tools are used for
  Network auditing and server security testing
BISAG – Training



• Regular trainings are conducted for
  awareness regarding latest threats as per
  OWASP.
• Countermeasures and related solutions are
  shared.

More Related Content

PPT
Epic Sales Presentation
PPS
Presentacióblog gizeh
PDF
H0614448
PPTX
Group 2 malli
PDF
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
PPS
TREBALL AMB MATERALS A P5
PDF
Mechanical Properties of Tere-Phthalic Unsaturated Polyester Resin Reinforced...
PPS
Mondrian
Epic Sales Presentation
Presentacióblog gizeh
H0614448
Group 2 malli
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
TREBALL AMB MATERALS A P5
Mechanical Properties of Tere-Phthalic Unsaturated Polyester Resin Reinforced...
Mondrian

Viewers also liked (18)

PPS
Presentacióblog alejandro
PPS
BUILD A HOUSE-2
PPTX
Presentation KOROSI BESI
PPT
Relative clauses
PPS
Ens ha visitat la mare del biel
PDF
Effective Pixel Interpolation for Image Super Resolution
PDF
20131116 creators meetup
PPS
Visita de 2n a p5
PDF
Reduction of Side Lobes by Using Complementary Codes for Radar Application
PDF
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
PPT
Evaluation Question 7
PPT
Evaluation Question 3
PDF
Guidance
PDF
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
PDF
F0554050
PPTX
Mermelada de sabores
PDF
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
PDF
20140920 CreatorsMeetup20
Presentacióblog alejandro
BUILD A HOUSE-2
Presentation KOROSI BESI
Relative clauses
Ens ha visitat la mare del biel
Effective Pixel Interpolation for Image Super Resolution
20131116 creators meetup
Visita de 2n a p5
Reduction of Side Lobes by Using Complementary Codes for Radar Application
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Evaluation Question 7
Evaluation Question 3
Guidance
“Development of Basic Skills in Swimming Sports Training At Grassroot Level t...
F0554050
Mermelada de sabores
いちフリーランスフロントエンドエンジニアがなぜIoTに触れているのか
20140920 CreatorsMeetup20
Ad

Similar to Securing Applications and Data (15)

PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PPTX
security of information systems
PDF
How to handle multilayered IT security today
PPT
Metholodogies and Security Standards
PDF
123930653 cisa
PDF
Developing And Connecting Cybersecurity Leaders Globally
PDF
Software for ISO/IEC 27001 information security management systems eGAM
PDF
OSCC MAMPU Malaysia Oct 2008 Newsletter1
PDF
BCS ITNow 201309 - Holistic Security
PPT
Presentation on Geographical Information Systems
DOCX
Ethical and security issues on MIS inte 322 assignment.docx
PPTX
IAEM11 2011 CrisisCommons VTC presentation
PPTX
iSARG Security Group
PPT
20100224 Presentation at RGIT Mumbai - Information Security Awareness
security of information systems
How to handle multilayered IT security today
Metholodogies and Security Standards
123930653 cisa
Developing And Connecting Cybersecurity Leaders Globally
Software for ISO/IEC 27001 information security management systems eGAM
OSCC MAMPU Malaysia Oct 2008 Newsletter1
BCS ITNow 201309 - Holistic Security
Presentation on Geographical Information Systems
Ethical and security issues on MIS inte 322 assignment.docx
IAEM11 2011 CrisisCommons VTC presentation
iSARG Security Group
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
A Presentation on Artificial Intelligence
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Securing Applications and Data

  • 1. Bhaskaracharya Institute for Space Applications and Geo-informatics "We serve the Society“ Securing Applications and Data Department of Science and Technology Government of Gujarat
  • 2. BISAG Follows International Standards :  ISO 9001:2008 (Quality Management)  ISO 27001:2005 (Security, Confidentiality, Integrity, Availability )  CMMI LEVEL-3 (Software Development, Periodic Audits)
  • 3. BISAG – Functional Units  GUJSAT (Gujarat SATCOM Network ) …Distance interactive education, training and extension  Centre for Geo-informatics Applications …Conceptualization, creation and organization of multi purpose common geospatial digital database for sectoral / integrated planning and decision supportsystems  Centre for Informatics and Training …Product, E-governance, Low cost end to end solutions  Academy of Geo-informatics for Sustainable Development …Education, Training and Research
  • 4. BISAG – ISO 27001:2005 Information Security Management System • Safeguard organizational and user assets (documents, project data, user department data, etc.) • A layered approach to systematically manage the security of sensitive and confidential data
  • 5. BISAG – Information Security • Security is a process. • Testing, verification and validation of websites, software and applications developed at BISAG using Open Source tools.
  • 6. BISAG – Web-application Security • OWASP (Open Web Application Security Project ). • VAPT (Vulnerability Assessment and Penetration Testing) cell conducts security audits as per OWASP Application Security Code of Conduct. • Securing online data from unauthorized access.
  • 7. BISAG – Network Security • Open Source IDPS (Intrusion Detection and Prevention System) configuration and testing. • Open source framework is used to develop and execute exploit code against a remote target machine. • Other Open source tools are used for Network auditing and server security testing
  • 8. BISAG – Training • Regular trainings are conducted for awareness regarding latest threats as per OWASP. • Countermeasures and related solutions are shared.

Editor's Notes

  • #2: Goverment of Gujarat