<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Testing Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<atom:link href="https://threatsys.co.in/nproject-tag/cyber-security-testing/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatsys.co.in/nproject-tag/cyber-security-testing/</link>
	<description>We Defend, We Protect, We Secure</description>
	<lastBuildDate>Sat, 07 Jun 2025 10:39:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://threatsys.co.in/wp-content/uploads/2021/05/cropped-Final-1-Logo-PNG-32x32.png</url>
	<title>Cyber Security Testing Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<link>https://threatsys.co.in/nproject-tag/cyber-security-testing/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ensuring Data Security for One Crore Women Under Subhadra Yojana</title>
		<link>https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:01:29 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=647</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Subhadra Yojana, launched by Prime Minister Narendra Modi on his birthday i.e. September 17, 2024, is a groundbreaking initiative by the Government of Odisha aimed at empowering over 1 crore women between the ages of 21 to 60. Named after Goddess Subhadra, this scheme provides financial assistance of ₹50,000 over a five-year period to eligible beneficiaries, with funds directly transferred to their bank accounts in bi-annual installments of ₹10,000.</p>
<p>Subhadra scheme is the largest, single women-centric scheme and is expected to cover more than 1 crore women. Under the scheme, all eligible beneficiaries between the age of 21-60 years would receive Rs. 50,000/- over a period of 5 years between 2024-25 to 2028-29</p>
<p>An amount of ₹10,000 per annum in two equal instalments will be credited directly to the bank accounts of the beneficiaries. As many as 76 lakh women have so far registered in the scheme.</p>
<p>During the programme, over ₹1,250 crore was transferred to the bank accounts of more than 25 lakh women beneficiaries under the Subhadra scheme.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Subhadra Yojana<br>
<h6 style="margin:6px 0;display:inline-block;">Department:</h6> Department of Women and Child Development, Govt of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Woman and Child Development <br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-in Audit, Mobile Apps Penetration Testing, Web Application Security Audit, API Security Testing, AADHAR UIDAI AUA&KAU Audit <br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> E Square System & Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The Subhadra Yojana, a flagship initiative of the newly formed BJP government in Odisha, is launched on September 17, 2024, coinciding with Prime Minister Narendra Modi’s birthday. With the BJP coming to power in Odisha after 24 years of BJD rule, the government aimed to roll out this transformative program within the first 100 days of governance. This ambitious timeline posed significant challenges in completing the full cybersecurity assessment, including Aadhar-based verification audits.</p>
<p>The project required the collection of applications through Jana Seba Kendra/Common Service Centres, where all submissions would be verified against government databases and through field enquiries as needed. Beneficiaries were required to complete e-KYC formalities, preferably through face-authentication via the SUBHADRA Mobile Application, using their Aadhaar numbers. They could also opt to pass on the benefits to fellow women in Odisha through the SUBHADRA Portal.</p>
<p>With the complexity of the applications and the Aadhaar-based e-KYC system, ensuring robust security and compliance under these tight deadlines was a monumental task. The integration of the Aadhaar system, involving sensitive biometric data and authentication, added another layer of urgency to the assessment. Despite these challenges, we successfully ensured that the data infrastructure for Subhadra Yojana met the highest standards of security and compliance, enabling the government to empower over 1 crore women across the state.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>To meet the tight deadlines and extensive requirements of securing the Subhadra Yojana project, <strong>Threatsys</strong>, one of India’s leading cybersecurity firms, deployed a specialized team of experts. The team comprised eight security researchers, a Project and Delivery Manager, and a Chief Auditor for <a href="https://threatsys.co.in/security-consulting-and-compliance/cert-in-cyber-security-audit/"><strong>CERT-IN Cyber Security Testing and Audit</strong></a>. Additionally, three dedicated auditors were assigned to ensure <strong>UIDAI KUA and AUA Compliance</strong>.</p>
<p>Before initiating any security testing, the team thoroughly analyzed the workflow of the four critical modules within the Subhadra Yojana application, ensuring a deep understanding of the system architecture and data flow.</p>
<p>Security testing was conducted on a dedicated staging server to mirror real-world conditions without affecting the live environment. The use of diverse commercial cybersecurity tools, including <strong>Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Netsparker, HCL Appscan, Qualys Web Apps Scanner, OWASP Zap, SAINT</strong>, and <strong>Tenable</strong>, allowed for a comprehensive assessment of vulnerabilities in the web and mobile applications, as well as API security.</p>
<p>Threatsys followed the <strong>OWASP, CERT IN, NIST, SANS</strong> testing guide and <strong>ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM)</strong>. This approach simulated potential external attacks as well as actions taken by authenticated users, identifying several <strong>critical, high, medium, and low-level bugs</strong>. Threatsys team  closely collaborated with the development team to address and patch security issues in the mobile and web applications, as well as at the API level.</p>
<p>For the <strong>UIDAI KUA and AUA audit</strong>, Threatsys conducted a <strong>GAP Assessment</strong>, gathering essential evidence in line with the  <strong>UIDAI Audit Checklist 3.0</strong>. After completing the necessary testing and verifications, comprehensive reports were prepared, detailing findings and ensuring compliance. The <strong>Audit Certificate</strong> for the Aadhaar compliance was issued after all proper audits, evidence gathering, and documentation were completed.</p>
<p>Following thorough assessments, <strong>CERT-IN Certificates</strong> were issued to the Department for both the <strong>Subhadra Mobile Application</strong> and the <strong>Web Application</strong>, marking the completion of all required cybersecurity audits. These certifications confirm that both platforms are secure and compliant with Indian cybersecurity standards, further reinforcing the integrity of the Subhadra Yojana initiative.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Through a meticulous and well-coordinated approach, Threatsys successfully delivered and <strong>Secured Data for 1 Crore Women</strong>:</p>
<p>By implementing advanced cybersecurity measures, <a href="https://threatsys.co.in/"><strong>Threatsys</strong></a> ensured the safe handling of sensitive data for over 1 crore women beneficiaries in Odisha, safeguarding personal information and preventing unauthorized access.</p>
<p>Threatsys successfully completed the <strong>UIDAI KUA and AUA Audits</strong>, ensuring full compliance with Aadhaar-related security and privacy requirements. The issuance of the <strong>Audit Certificate</strong> confirmed that all security measures aligned with UIDAI’s stringent guidelines.</p>
<p>Both the <strong>Subhadra Mobile Application</strong> and <strong>Web Application</strong> received <strong>CERT-IN Certificates</strong>, validating that the platforms met national cybersecurity standards and were safe for large-scale use.</p>
<p>Despite the tight deadline set by the newly formed Odisha government, Threatsys completed the full cybersecurity assessment, Aadhar audits, and necessary documentation within the required timeframe, supporting the successful launch of the Subhadra Yojana. The secure integration of Aadhaar-based e-KYC through face-authentication on the Subhadra Mobile Application ensured smooth onboarding for beneficiaries, enhancing user experience while maintaining robust security.</p>
<p>These results not only supported the successful launch of Subhadra Yojana but also set a benchmark for secure implementation of large-scale government initiatives, ensuring both data integrity and compliance with regulatory standards.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting 1.7M+ Users along with SEBI Compliance for Marketwolf</title>
		<link>https://threatsys.co.in/projects/sebi-compliance-cyber-security-case-studies-for-brokrage-company/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 16 May 2024 08:49:23 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=5647</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/sebi-compliance-cyber-security-case-studies-for-brokrage-company/">Protecting 1.7M+ Users along with SEBI Compliance for Marketwolf</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>MarketWolf Securities Private Limited is a prominent trading platform, catering to 1.7M+ users, offering an engaging and fast trading experience. Being a SEBI-registered trading company, compliance with regulatory directives, particularly regarding cybersecurity, is paramount. Following the SEBI Circular SEBI/HO/ITD_VAPT/P/CIR/2023/033, MarketWolf identified the need to strengthen its cybersecurity infrastructure, particularly focusing on SOC solutions with SIEM and SOAR capabilities, as well as conducting quarterly audits and VAPT assessments. To ensure compliance with SEBI regulations and enhance its cybersecurity posture, MarketWolf partnered with Threatsys, a trusted cybersecurity firm specializing in SOC solutions and compliance services along with cyber security testing services. Through its flagship product CYQER, Threatsys offers comprehensive SOC as a Service, providing MarketWolf with advanced real-time 24&#215;7 threat detection and monitoring, incident response, and regulatory compliance capabilities with FIM, SOAR, UEBA, etc.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Marketwolf Securities Private Limited<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> SEBI Registered Stock Brokrage Company<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing and VAPT, SEBI Compliances,SOC as a Services, DLP Solutions,  <abbr title="cert-in cyber security audit in bhubaneswar">CERT-IN Cyber Security Audit</abbr>, vCISO Consulting Services <br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>MarketWolf faced the challenge of ensuring robust cybersecurity measures to safeguard its users&#8217; data, financial transactions, and overall infrastructure. Compliance with SEBI regulations necessitated a comprehensive approach to cybersecurity, including the implementation of SOC solutions, conducting regular audits and assessments, and ensuring data localization.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The scope of the collaboration between MarketWolf and Threatsys extended beyond mere compliance to proactive cybersecurity measures. It included:</p>
<ul>
<li><strong>Cyber Security as a Service (CSaaS):</strong> Threatsys delivers CSaaS through CYQER, offering MarketWolf round-the-clock monitoring, threat intelligence analysis, and incident response capabilities. This comprehensive approach enhances MarketWolf&#8217;s cybersecurity posture and enables proactive threat management.</li>
<li><strong>SEBI Compliance Audit:</strong> Conduct audits aligned with SEBI regulations, including VAPT assessments, system audits, and data localization audits, to ensure adherence to regulatory requirements.</li>
<li><strong>Collaborative Partnership: </strong> Threatsys and MarketWolf establish a collaborative partnership aimed at long-term cyber resilience. By sharing expertise, knowledge, and best practices, both parties work together to address emerging cybersecurity threats and stay ahead of regulatory changes.</li>
<li><strong>SOC as a Service:</strong> Providing SOC solutions encompassing SIEM and SOAR capabilities, offering real-time monitoring, threat detection, and incident response services to proactively mitigate cybersecurity risks.</li>
<li><strong>CERT-in Cybersecurity Audit and ISO 27001 Compliance:</strong> Conduct regular CERT-in cybersecurity audits to assess the effectiveness of existing controls, identify potential weaknesses, and implement remediation measures. Conducted ISO 27001:2022 ISMS Compliance and issued the Certification from UAF Accrediation with our certification body.</li>
<li><strong>DLP Solutions:</strong> Implementing DLP solutions to prevent unauthorized data exfiltration, ensuring the confidentiality and integrity of sensitive information.</li>
</ul>
<p><strong>Securing 1.7M Users of MarketWolf and Protecting MarketWolf with <a href="http://www.cyqer.in">CYQER</a> and our efficent vCISO Services:</strong> CYQER&#8217;s holistic cybersecurity approach, encompassing SOC solutions, compliance audits, and DLP measures, played a pivotal role in safeguarding MarketWolf&#8217;s users and infrastructure. Through proactive threat management, regulatory compliance, and ongoing collaboration, MarketWolf and CYQER demonstrated their commitment to cybersecurity excellence, setting a benchmark for the industry and ensuring a secure trading experience for millions of users.</p>
<p>Mr. Deepak Kumar Nath serves as the virtual Chief Information Security Officer (vCISO) for Marketwolf. His role encompassed developing robust security strategies, conducting risk assessments, ensuring compliance with industry regulations, and protecting digital assets against cyber threats.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The collaboration between MarketWolf Securities Private Limited and Threatsys yielded tangible results:</p>
<ul>
<li><strong>Enhanced Cybersecurity Posture with Cyber Security Testing :</strong> MarketWolf strengthened its cybersecurity defenses, mitigating risks, and vulnerabilities identified through comprehensive assessments and audits.</li>
<li><strong>SEBI Compliance with Security Audit and it&#8217;s Review :</strong> MarketWolf achieved full compliance with SEBI regulations, thanks to CYQER&#8217;s expertise in conducting audits, implementing controls, and facilitating regulatory adherence.</li>
<li><strong>Long-Term Cyber Resilience with SOC Solutions:</strong> The strategic partnership between MarketWolf and CYQER laid the foundation for long-term cyber resilience, enabling proactive threat management, continuous improvement, and adaptation to evolving cybersecurity challenges.</li>
<li><strong>Improved User Trust with Regular Monitoring and Security Updates:</strong> By prioritizing cybersecurity and regulatory compliance, MarketWolf reinforced user trust, assuring its 1.7M+ users of a safe, secure, and compliant trading environment.</li>
</ul>
<p>In conclusion, the collaboration between MarketWolf Securities Private Limited and Threatsys, powered by CYQER and its Cyber Security as a Service, represents a significant milestone in bolstering cybersecurity measures and ensuring SEBI compliance in India. By leveraging Threatsys’ expertise and CYQER’s advanced capabilities, MarketWolf successfully navigated the SEBI CERT-IN Cyber Security Audit process in bhubaneswar, demonstrating adherence to regulatory standards and commitment to user protection.</p>
<p>The implementation of SOC as a Service provided round-the-clock security monitoring and incident response capabilities, enabling proactive threat detection and mitigation. Additionally, the deployment of DLP solutions further fortified MarketWolf&#8217;s defenses, safeguarding sensitive data from unauthorized access and ensuring compliance with SEBI regulations.</p>
<p>Through comprehensive cybersecurity audits, including VAPT assessments and application security evaluations, MarketWolf proactively addressed vulnerabilities and enhanced its resilience against cyber threats. Furthermore, CYQER&#8217;s focus on mobile app security ensured the integrity and safety of MarketWolf&#8217;s trading platform across various endpoints.</p>
<p>In essence, the partnership between MarketWolf and Threatsys, supported by CYQER, exemplifies a proactive approach to cybersecurity, driving continuous improvement, regulatory compliance, and user trust. As the landscape of cyber threats continues to evolve, MarketWolf remains well-equipped to navigate the dynamic challenges of cybersecurity in the financial industry, safeguarding its operations and protecting the interests of its 1.7M+ users.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/sebi-compliance-cyber-security-case-studies-for-brokrage-company/">Protecting 1.7M+ Users along with SEBI Compliance for Marketwolf</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Penetration Testing &#038; CERT-IN Audit for FSCW Dept,Govt of Odisha</title>
		<link>https://threatsys.co.in/projects/penetration-testing-and-cert-in-cyber-security-audit-food-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:17:00 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=650</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/penetration-testing-and-cert-in-cyber-security-audit-food-odisha/">Penetration Testing &#038; CERT-IN Audit for FSCW Dept,Govt of Odisha</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Food, Supplies and Consumer Welfare Department is a composite Department with the status of both Secretariat and Directorate. Hon’ble Minister, F.S. &amp; C.W. is Minister in charge of the Department. Food, Supplies and Consumer Welfare Department, Government of Odisha created the 4 pillar systems i.e PDS System, Directorate of Legal Metrology, Grievance Redressal System, Food Odisha Portal.</p>
<p>PDS ( Public Distribution System ) Welfare Scheme, The system identifies &amp; categories the weaker section of the population as targeted beneficiaries under various schemes. They receive ration cards from the government to claim their entitlements in the form of specific quantities of essential commodities from the retail outlets every month. The significance of PDS lies in its effort to distribute food grains equitably, &amp; at a fairly low price to the poor of the society. Rice, Levy Sugar and APL Wheat are distributed through public distribution system</p>
<p>Directorate of Legal Metrology, The Legal Metrology wing of the state of Odisha is functioning at the Directorate of Legal Metrology under the Food, supplies &amp; Consumer Welfare Department of Government Headed by a senior most administrative officer designated as Controller of Legal Metrology. All the consumers generally purchase the goods either in Weight or in volume or in length or in numbers etc and the responsibility has been cast upon this organization to ensure that the consumer gets the correct quantity whether it is in Weight, in volume, in length or in numbers for which he has paid the money to the consumer. The Department is engaged in regulating use of correct weighing and measuring instruments in production, trade and commerce to ensure that exact weight, measure and number of any commodity is provided to any customer as contracted for, or paid for by him. It also safeguards consumers&#8217; interest by ensuring mandatory declarations on packaged commodities.</p>
<p>Grievance Redressal System, primarily covers the receipt and processing of complaints from citizens and consumers, a wider definition includes actions taken on any issue raised by them to avail services more effectively for Ration Card under Food, Supplies and Consumer Welfare Department.</p>
<p>Food Odisha Portal, that consists of Transparency Portal with PDS Depots and FPS Delaer and Procurement Societies and Registration. One Portal that managed all Ration Card Management with Farmer Registration, Verified Famer, Procurement Status under PPAS, Farmerwise Payment Status, Societies Engaged, Dealer List, Stock Management, Dealer List and all.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Food, Supplies and Consumer Welfare Department<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing and CERT-IN Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Projects:</h6>  PDS System,  Directorate of Legal Metrology, Grievance Redressal System, Food Odisha Portal for Citizens<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The Food Supplies and Consumer Welfare (FSCW) Department of the Government of Odisha is responsible for managing critical information related to food supplies and consumer welfare, including the Public Distribution System (PDS) welfare scheme, which benefits a large number of citizens. The PDS scheme deals with sensitive information that pertains to the management of ration cards for 2.5 crore citizens under the One Nation One Card initiative. Given the high level of sensitivity of this information, accessing and testing it can be challenging, as it requires the maintenance of strict confidentiality measures.</p>
<p>To address this challenge, the FSCW Odisha has developed four major applications, including the Directorate of Legal Metrology, <a href="https://grs.pdsodisha.gov.in/index.aspx">Grievance Redressal System</a>, Ration Card Management System, and the FSCW PDS Application, each of which must be tested separately to ensure that they meet the necessary security requirements by <a href="https://threatsys.co.in">Threatsys Technologies, The Leading Cyber Security Testing Service Provider in Odisha, India</a>. The primary objective of this testing is to perform a <abbr title="pen testing company in bhubaneswar">penetration testing</abbr> and cybersecurity audit on all modules, in accordance with the CERT-in Security Guidelines and other security frameworks such as the OWASP Top 10 and SANS Top 25 Vulnerabilities.</p>
<p>The primary focus of this <a href="https://threatsys.co.in/cyber-security-testing/web-application-security-testing/">web application security testing</a> is to ensure the integrity and confidentiality of the data and application, enabling all online citizen services provided by the Government of Odisha to be securely managed throughout the state. Given that the portal deals with different levels of privileges, it is crucial to thoroughly check the permission-based access controls within different user access controls for each of the applications. By doing so, the FSCW Odisha can ensure that its applications are secure, safeguarding sensitive information, and providing reliable and secure services to the citizens of Odisha.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys, the well-known CERT-IN Cyber Security company of India, has appointed eight security researchers under the Project and Delivery Manager. In order to gain a better understanding of the application, the team thoroughly studied the workflow of the four modules before conducting any security testing. The testing was carried out on a host that was hosted on the staging server, using a variety of commercial cyber security tools, including Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Intruder, Netsparker, HCL Appscan, Qualsys Web Apps Scanner, OWASP Zap, SAINT, and Tenable.</p>
<p>During the manual testing phase, the team engaged in both black box and white box testing and identified significant security issues in the four applications managed by the Food Supplies and Consumer Welfare (FSCW) Department of the Government of Odisha. One of the applications was found to be vulnerable to Account Takeover due to a misconfiguration, which enabled the team to tamper with the victim&#8217;s email and redirect the reset link to the attacker&#8217;s email address. To remedy this issue, the team recommended implementing server-side validation of emails sent in response to a request, in order to verify whether they belonged to the requested user or not. With the coordination of the development team, this issue was resolved by adding server-side validation and removing the email parameter from the request.</p>
<p>The team also discovered multiple privilege escalation issues due to the lack of access controls in API requests. As a result, low-end users were able to access admin functionalities, compromising the system&#8217;s security. In addition, several other bugs were discovered and reported to the developers with detailed reports on their impact, evidence, and remediation strategies. The team worked closely with the developers to ensure they had a clear understanding of the issues and could address them promptly.</p>
<p>Overall, the team identified more than 35 bugs across all the portals of FSCW, including six critical and 13 high-level vulnerabilities. All projects were delivered and retested within the set deadline, with the development team taking three weeks to fix all the raised security gaps. Threatsys remains committed to ensuring the integrity and confidentiality of the data and applications it works on, helping to safeguard sensitive information and online citizen services managed by the Government of Odisha.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys has successfully completed the cyber security testing and CERT-IN Security audit project with the utmost diligence and professionalism. The company provided Initial Version 1 and Final Version 2 Reports with the appropriate support on time, and according to the proper security implementation, which has helped to issue the CERT-In VAPT certificate for all four modules of the Food, Supplies and Consumer Welfare Department, Odisha Government</p>
<p>All the modules of Food, Supplies and Consumer Welfare Departments are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that citizens of Odisha can now use the Ration Card Management, PDS System, and Grievance System applications securely. These applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the No.1 Cyber Security Testing Company in bhubaneshwar that protects the data of all the citizens of Odisha and responsible for their security, integrity and privacy.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/penetration-testing-and-cert-in-cyber-security-audit-food-odisha/">Penetration Testing &#038; CERT-IN Audit for FSCW Dept,Govt of Odisha</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security Testing for Union Bank of Nigeria</title>
		<link>https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 14 Jan 2023 12:45:51 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3748</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/">Cyber Security Testing for Union Bank of Nigeria</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="1193" height="489" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353.png" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-14 182353" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353.png 1193w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-300x123.png 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-1024x420.png 1024w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-768x315.png 768w" sizes="(max-width: 1193px) 100vw, 1193px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Union Bank of Nigeria (UBN) is one of the oldest and largest commercial banks in Nigeria. The bank was founded in 1917 and has since grown to become a major player in the Nigerian banking industry. UBN provides a wide range of banking and financial services, including corporate banking, retail banking, and investment banking. The bank has a strong presence in Nigeria, with over 300 branches and ATMs nationwide. Union Bank also operates in other African countries like Ghana, Sierra Leone, The Gambia and Liberia. The bank has also built a notable reputation for its Corporate Social Responsibility initiatives and its support of the Nigerian economy.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Union Bank of Nigeria (UBN)<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Banking And Finance<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Web Application Security Testing<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  Union Bank of Nigeria</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CEVA Ltd., Nigeria<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Union Bank of Nigeria is a large banking organisation having complex functionalities with a diverse range of systems and networks. As it has a large user base processes , stores and uses user’s financial data, it should be safe from all kind of threats. Union Bank of Nigeria is subject to various laws and regulations that govern the banking sector. While testing we need to keep in mind about the laws as well. Except that the error percentage during the test should be zero, our major focus towards the unauthorised data leaks and financial losses that can harm the organisation</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>As this is a sensitive project dealing finance and banking services, we have followed our own security checklist specially designed for banking sectors along with other popular security frameworks like OWASP , SANS25, PCI DSS security Guidlines . At first we have gone through the workflow of that application to understand it better before doing any security testing there. Each and every test was done under a host hosted on the staging server. We have started the audit With a team of highly experienced penetration testers, we divide each memebr with separate modules for completing the project before the deadline. As per procedures we initiated an automation scan( using paid enterprise tools) against the target and found several low hanging bugs. During the time of manual testing , our team first engaged themselves with black box testing and found several bugs , but worth mentioning here, the application is vulnerable for dBlind Xss During one signup which was executing directly on the banking administrator portal , this leads to the total account takeover of the admin portal. Then during white box test, we found one malicious user can have access to all other user’s personal financial Information. In total we found several bugs from the portal.</p>
<p>The team now has all the required evidences , root causes and preventions for the bugs we have found. We made a detailed security report v1.0 and coordinated continuously with the team of developers for fixing out all the raised security issues. After few days we confirmed the raised issues to be addressed by the dev team and provided them the final 2.0 version.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys have completed the security testing on time successfully and the application code was updated with the fixed code in the live server . Now the portal is running securely and providing financial services to thousands of users flawlessly.</p>
<p>That means Threatsys is protecting the banking users of Nigeria and making the whole UBN secure enough.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/">Cyber Security Testing for Union Bank of Nigeria</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</title>
		<link>https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 10:49:24 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=5821</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana (BSKY) is a health insurance scheme that the Government of Odisha launched in India in 2018. The scheme aims to provide affordable and accessible healthcare to the people of Odisha, especially to those who are economically disadvantaged or belong to vulnerable sections of society. Under the BSKY scheme, eligible beneficiaries can avail of cashless treatment at empanelled hospitals for various medical conditions, including hospitalisation, surgery, and pre and post-hospitalisation expenses. The scheme also covers the cost of diagnostic tests, medicines, and other medical supplies.</p>
<p>BSKY provides health insurance coverage for medical expenses (up to Rs. 5 lakhs for families and up to Rs. 10 lakhs for women) incurred for treatment in hospitals and health centres across the state of Odisha. Around 4,036 medical treatments and 255 surgical procedures are covered under this scheme.</p>
<p>Insights of BSKY Project under Department of Health and Family Welfare, Goverenment of Odisha. Beneficiary 4.79 Cr. Total Households 119.5 Lakhs, Card Holders 3.34 Cr., Households Covered 96.42 Lakhs (81%), Hospitals 9,324, where as Govt. 8,530 Private 794 No. of Treatments Done 1.19 Cr., Govt 1.17 Cr., Private 2,76,240. 2023 Reimbursement (Pvt) 628.02 Cr.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Biju Swasthya Kalyan Yojana(BSKY)<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Healthcare Industry<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-IN Audit, WAPT, Mobile Apps Penetration Testing<br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana Projects consists of several Modules like BSKY Portal, Hospital Empanelment Portal, BSKY Citizen Dashboard, Grievance Portal, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more.</p>
<p>BSKY Healthcare data is highly sensitive, and there is a significant risk of data breaches, which can lead to identity theft and other serious consequences of each Biju Swashthya Kalyan Card Holders. Threatsys is ensuring that data privacy is maintained and that sensitive information is adequately secured.</p>
<p>BSKY Portals and applications are the prime target for cybercriminals due to the vast amount of sensitive data they store. All the Web and Mobile Applications are heavily regulated, and compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act) and <strong><a href="https://threatsys.co.in/security-consulting-and-compliance/gdpr-compliance/">GDPR</a></strong> (General Data Protection Regulation) is crucial. Threatsys needs to complete the whole project of 10+ Applications within 1 month of timeline.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys, the well-known Cyber Security Firm of Bhubaneswar, Odisha, has appointed ten security researchers under the Project and Delivery Manager. In order to gain a better understanding of the application, the team thoroughly studied the workflow of the four modules before conducting any security testing. The testing was carried out on a host that was hosted on the staging server, using a variety of commercial cyber security tools, including Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Intruder, Netsparker, HCL Appscan, Qualsys Web Apps Scanner, OWASP Zap, SAINT, and Tenable.</p>
<p>Threatsys used a combination of the Open Web Application Security Project (OWASP) testing guide and ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM) for conducting penetration test of the server and applications. The testing was done to simulate as closely as possible the viewpoint of completely external attacker and Application user.</p>
<p>the threatsys team identified more than 50+ bugs across all the portals i.e BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application, including 15+ critical and 23 high-level vulnerabilities. All projects were delivered and retested within the set deadline, with the development team taking three weeks to fix all the raised security gaps. Threatsys remains committed to ensuring the integrity and confidentiality of the data and applications it works on, helping to safeguard sensitive BSKY Card holders information and online citizen services managed by the Government of Odisha.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys has successfully completed the cyber security testing and CERT-IN Security audit project with the utmost diligence and professionalism. Threatsys provided Initial Version 1 and Final Version 2 Reports with the appropriate support on time for 10+ Applications, and according to the proper security implementation, which has helped to issue the CERT-In VAPT certificate for all four modules of the Biju Swasthya Kalyan Yojana(BSKY), Odisha Government</p>
<p>All the modules of Department of Health and Family Welfare Departments that is BSKY applications are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that citizens of Odisha can now use the BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more. These web and mobile applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the Best Cyber Security Service Provider that protects the data of all the BSKY Card Holders Data of Odisha and responsible for their security, integrity and privacy.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 11:19:53 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3851</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="869" height="400" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-23 170848 (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg 869w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-300x138.jpg 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-768x354.jpg 768w" sizes="(max-width: 869px) 100vw, 869px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The UT dashboard is a groundbreaking endeavor by the Government of Jammu and Kashmir to use Big Data and Analytics to drive crucial administrative decisions. This technology-first strategy is driven by the government&amp;#39;s determination to seamlessly integrate transparency and governance by facilitating the rapid flow of information from the grassroots to the upper rungs of the UT machinery.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> UT Dashboard<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Jammu and Kashmir<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  Government of Jammu and Kashmir</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The &amp;quot;UT Dashboard&amp;quot; web platform serves the requirement for real-time monitoring. The UT<br />
Dashboard was established to collect detailed data on ground-level effect, which supports the state administration&amp;#39;s two important goals of openness and accountability. The examination of the ground-level impact assists in keeping track of how various administrative departments are operating. The dashboard promotes the flow of information from the lowest to the top of the state administrative hierarchy.</p>
<p>Our task was to test the website for the top ten OWASP vulnerabilities and to assist the developers in addressing any potential risks in accordance with CERT-IN and Threatsys Web Apps Penetration Testing Guidelines. The application must handle sensitive data and may be required to consider data privacy and security considerations.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Technologies assigned 2 Cyber Security Resources under the Guidance of our CEO, Deepak Kumar Nath. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</p>
<p>After testing the Web Application from the production URL, we discovered many problems that have been classified as Critical, High, Medium, and Low based on their severity. Our team is always striving to provide developer-friendly reports that are readily readable and include clear proof of ideas. We create proof-of-concept video with adequate evidence so that security problems may be simply understood and corrected. We have assigned a time frame to each Severity category in<br />
which the issue must be resolved. During that time, our staff was often assisting the developers in resolving such difficulties as rapidly as possible. After the patch was performed, our team reaudited the application to ensure that the fixes were done correctly.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys issued the CERT-IN Safe to Host Certificate, and the UT Dashboard is successfully hosted in the State Data Center. Because it belongs to the government of Jammu and Kashmir, it is safely managed to authenticate with all of Jammu and Kashmir&amp;#39;s departments for their monitoring process, perfect management and procedure, and secure information storage for everyone.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:50:27 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=653</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/">SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper"><h2 style="text-align: center;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading vc_custom_1689260306915" >Best Cyber Security Company of Odisha</h2>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Student Academic Management System (SAMS) is an integrated portal which provides a common platform for admission into various courses across the State through e-Admission and also several e-Services to students at institution level through e-Administration.</p>
<p>This initiative was started in 60 Junior Colleges during academic session 2009-10 and expanded to 169 junior college and 53 degree(+3) Colleges during the session 2010-11. After successful implementation of online admission during the session 2010-11 and 2011-12 under the project SAMS it has been decided to cover all junior colleges(including +2 self financed college) and 162 degree colleges (+3) during session 2011-12. After getting good feedback from college and students All junior &amp; Degree/Autonomous students have come to SAMS Fold and it has been approved by Government of Odisha students take online admission into Junior / Higher Secondary School and degree(+3) classes of Arts, Commerce and Science streams along with Vocational &amp; Sanskrit Educational institutions. This admission process, carried out through internet and computers is called as e-Admission. At present, SAMS covers additional courses in addition to the above i.e. it covers Correspondence, ITI, Diploma, Teacher Education, Physical Education of different departments. Besides e-Admission, SAMS also maintains the academic and financial records of each student admitted into the different educational institutions.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> SAMS ODISHA<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6>Department of Higher Education, Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Web Application Security Audit, CERT-IN Cyber Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6> Odisha Computer Application Center</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>SAMS Application Project consists of Several modules i.r for Higher Education, School &amp; Mass Education, Skill Dev and Tech Education, Sports and Youth Services, Odia Language, Literature and Culture. Right now the Application consists of 4,392 Colleges, 12,49,895 Online Applications, Admission Strength 9,74,802, Admission Taken 7,36,535. The web Applications of &#8220;SAMS Odisha&#8221; was containing all the academic informations of old student and current students. The web portal also have different panels for college authorities and boards which includes numerous financial and academic data of students. The Web Application needs full security protection with the Cyber Security Audit.</p>
<p>Our challenge was to test the website for OWASP top 10 vulnerabilities and to fix for all possible threats as per CERT-IN Guidelines within short time period. The Application needs to be free from all the bugs with the CERT in audit certification as it will be hosted in the State Data Center. The Web Application need to be continuously monitored and will be free from security flaws. With the Ready to Host Certificate from CERT-IN Empanelled Company, The Possible Cyber Security Audit can be initiated. Threatsys &#8216;s challenge is to complete SAMS applications of Degree, Post Graduation, Teacher Education &amp; BHED, Higher Secondary School. Teacheer Education and SCERT, Corresponsence CHSE, ITI, Dipmoa, Post Diploma in industrial Safety, Physical Education, Utkal Sangeet Mahavidyalaya within 30 Days.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Appointed 6 Cyber Security Resources under the Guidance of our Lead Security Engineer. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</p>
<p>Threatsys primarily follows the Open Web Application Security Project (OWASP) guidelines as a bench mark. However, over time we have developed our own Hybrid Methodology that brings together the best of OWASP, OSSTM, WASC and NIST standards as well as to the CERT-IN guidelines. This hybrid methodology involves a set of comprehensive checks which ensures that no vulnerabilities are missed during testing.</p>
<p>The process involves an active analysis of the SAMS applications for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution.</p>
<p>Our methodology is designed to be exhaustive in two dimensions.<br />
Testing for all known attacks &amp; Testing on all possible points of entry.</p>
<p>After Testing The SAMS Web Application from the production url, We have found Several bugs which are further categorised into Critical, High, Medium &amp; Low as per their severity. Our Threatsys team is always focused to make developer friendly reports which can be easily understandable with clear given proof of concepts. We make videos POC with the proper evidances as the security flaws can be easily understood and fixed.</p>
<p>We have provided Each Severity type with a certain time period under which that issue should be fixed. During That period Our team was frequently supporting the developers in order to fix those issues quickly. After the fix was completed our team re-audited the application again to check whether the fixes are done perfectly or not.</p>
<p>Our Team has issued the Re-Audited Reports and coordinated with our CERT-IN Associates for the Verification of the Reports. along with the reports and fixings were verified and we have successfully provided Ready to Host CERT-IN Certificate within the timeline.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>All the modules of SAMS Odisha are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that Students of Odisha can use Degree, Post Graduation, Teacher Education and BHED, Higher Secondary School, Teacher Education, ITI, Diploma, Post Diploma in Industrial Safety, Physical Education, USM applications securely. These applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the No.1 Cyber Security Testing Company that protects the data of all the citizens of Odisha and responsible for their security, integrity and privacy.</p>
<p>“Threatsys&#8217;s team went deep down into the rabbit hole to understand the product and find several bugs with a business logic rule that took engineering several weeks to analyze within the code.” concluded Saroj Swain, IT Manager, CSM Technologies Pvt. Ltd..</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/">SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
