<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ThreatSys Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<atom:link href="https://threatsys.co.in/nproject-tag/threatsys/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatsys.co.in/nproject-tag/threatsys/</link>
	<description>We Defend, We Protect, We Secure</description>
	<lastBuildDate>Fri, 23 May 2025 07:23:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://threatsys.co.in/wp-content/uploads/2021/05/cropped-Final-1-Logo-PNG-32x32.png</url>
	<title>ThreatSys Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<link>https://threatsys.co.in/nproject-tag/threatsys/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CERT-in Cyber Security Audit of Krushak Odisha</title>
		<link>https://threatsys.co.in/projects/krushak-odisha-cert-in-cyber-security-audit/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 14 Jan 2023 10:36:17 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3735</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/krushak-odisha-cert-in-cyber-security-audit/">CERT-in Cyber Security Audit of Krushak Odisha</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="1024" height="273" src="https://threatsys.co.in/wp-content/uploads/2023/01/banner-Custom.jpg" class="vc_single_image-img attachment-full" alt="" title="banner (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/banner-Custom.jpg 1024w, https://threatsys.co.in/wp-content/uploads/2023/01/banner-Custom-300x80.jpg 300w, https://threatsys.co.in/wp-content/uploads/2023/01/banner-Custom-768x205.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The Krushak Portal Application for Livelihood and Income Augmentation initiative was launched in India on 21 December, 2018 by Department of Agriculture &amp; Farmers&#8217; Empowerment, Government of Odisha . This initiative is launched by Mr. Naveen Patnaik, the chief minister of Odisha for the people of odisha those who live in Odisha permanently.</p>
<p>The Krushak Application program’s main goal is to provide positive outcomes for farmers who are drowning in debt. The only people who qualify for benefits under this scheme are cultivators, farmers, croppers, and landless agricultural workers. Users can only utilise the services of the portal if they have registered. However, users must visit the official website and adhere to its instructions in order to achieve this. In accordance with this programme, agricultural workers without access to land will each get ₹10,000 which may be easily deposited into the account you have set aside for that purpose. Therefore, the scheme will offer two key benefits: financial aid and other debt transfers that are sent straight into their accounts. Total Beneficiares of Kalia Yojona or Krushak Portal is 76,80,611 and still counting.</p>
<p>Overall, Krushak Odisha is a crucial initiative of the Government of Odisha that aims to empower farmers and promote sustainable agriculture in the state.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Krushak Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Cyber Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6> Department of Agriculture and Farmers’ Empowerment</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys, The Leading Infosec Company of India, is assigned on cybersecurity testing and <strong><a href="https://threatsys.co.in/security-consulting-and-compliance/cert-in-cyber-security-audit/">CERT-IN cybersecurity audit</a></strong> projects for Krushak Odisha and Kalia Yojana of the government web applications is complex and challenging process due to various factors.</p>
<p>The web portal of “Krushak Odisha” enrolled farmers include classified informations of the farmers, personal data, adhar card details, financial records, and other sensitive data. It is important to ensure that all data is securely stored and transmitted, which can add to the complexity of the project.  The Web Application needs full security protection with the Cyber Security Audit that can ensure the privacy, inegrity and security of all the farmers in the state.</p>
<p>For Threatsys every challanges are unique, and we know how to tackle it. For Krushak Odisha we have very limited tight timeframes. This is challenging, especially as the application is complex with large user base. Moreover, the time required for fixing the identified security vulnerabilities is often limited, making it difficult to ensure that all issues are addressed.</p>
<p>But Any challenges require careful planning, effective communication, and a thorough understanding of the application&#8217;s security requirements. Overcoming these challenges can be challenging but is crucial for Threatsys to ensuring that Krushak Odisha web application is remain secured and protected from cyber threats.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Technologies, under the guidance of CEO Deepak Kumar Nath, introduced proper roadmap to finish the Whole Project within only 20 Days of timeline. Project Manager assigned three cyber security resources to work on this cyber security project that involved performing black box testing, white box testing, and an industry-centric checklist on a web application from the production URL of Krushak Odisha.</p>
<p>After testing, the Threatsys Red team identified several bugs in the application, categorized into critical, high, medium, and low based on their severity. Threatsys team preapred the Initial Version 1 Report, focused on providing developer-friendly reports with clear proof of concepts, including videos of POC with proper evidence to help developers easily understand and fix the security flaws. Threatsys Team indenfied more than 30+ Vulnerabilities where as more than 60% Bugs are critical and high severity based.</p>
<p>During the cyber security testing of a web application, a team can use various cybersecurity tools to identify and mitigate potential security vulnerabilities. By using a combination of Automation Testing and Manual Testing, Threatsys team was effectively identify and mitigate potential security vulnerabilities in a web application.</p>
<p>Threatsys provided each severity type with a specific time period under which the issue should be fixed. During this period, the company&#8217;s team frequently supported developers in fixing the identified issues quickly. After the fixes were completed, the team re-audited the application to ensure that the issues were fixed perfectly. Team delivered the Final Retest Version 2 Report after the remediation of all the vulnerabilities.</p>
<p>Overall, Threatsys Technologies introduced effective CERT-IN solutions for cyber security testing services in bhubaneswar, including providing clear reports with POC videos and supporting developers in fixing identified issues quickly.<br />
This helped ensure that the web application was secure and protected from potential cyber threats.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys issued the CERT-IN Safe to Host Certificate, The Krushak Odisha is hosted into State Data center successfully. as it belongs to the farmers under Government of Odisha, so it is securely managed to authenticate with the Farmers across odisha for their registration process, flawless management of all the framing details. We are Happy that Threatsys is the Cyber Security Partner of Government of Odisha for protecting the sensitive information of one crore plus farmers of odisha.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/krushak-odisha-cert-in-cyber-security-audit/">CERT-in Cyber Security Audit of Krushak Odisha</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security Testing for Union Bank of Nigeria</title>
		<link>https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 14 Jan 2023 12:45:51 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3748</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/">Cyber Security Testing for Union Bank of Nigeria</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="1193" height="489" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353.png" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-14 182353" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353.png 1193w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-300x123.png 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-1024x420.png 1024w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-182353-768x315.png 768w" sizes="(max-width: 1193px) 100vw, 1193px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Union Bank of Nigeria (UBN) is one of the oldest and largest commercial banks in Nigeria. The bank was founded in 1917 and has since grown to become a major player in the Nigerian banking industry. UBN provides a wide range of banking and financial services, including corporate banking, retail banking, and investment banking. The bank has a strong presence in Nigeria, with over 300 branches and ATMs nationwide. Union Bank also operates in other African countries like Ghana, Sierra Leone, The Gambia and Liberia. The bank has also built a notable reputation for its Corporate Social Responsibility initiatives and its support of the Nigerian economy.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Union Bank of Nigeria (UBN)<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Banking And Finance<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Web Application Security Testing<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  Union Bank of Nigeria</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CEVA Ltd., Nigeria<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Union Bank of Nigeria is a large banking organisation having complex functionalities with a diverse range of systems and networks. As it has a large user base processes , stores and uses user’s financial data, it should be safe from all kind of threats. Union Bank of Nigeria is subject to various laws and regulations that govern the banking sector. While testing we need to keep in mind about the laws as well. Except that the error percentage during the test should be zero, our major focus towards the unauthorised data leaks and financial losses that can harm the organisation</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>As this is a sensitive project dealing finance and banking services, we have followed our own security checklist specially designed for banking sectors along with other popular security frameworks like OWASP , SANS25, PCI DSS security Guidlines . At first we have gone through the workflow of that application to understand it better before doing any security testing there. Each and every test was done under a host hosted on the staging server. We have started the audit With a team of highly experienced penetration testers, we divide each memebr with separate modules for completing the project before the deadline. As per procedures we initiated an automation scan( using paid enterprise tools) against the target and found several low hanging bugs. During the time of manual testing , our team first engaged themselves with black box testing and found several bugs , but worth mentioning here, the application is vulnerable for dBlind Xss During one signup which was executing directly on the banking administrator portal , this leads to the total account takeover of the admin portal. Then during white box test, we found one malicious user can have access to all other user’s personal financial Information. In total we found several bugs from the portal.</p>
<p>The team now has all the required evidences , root causes and preventions for the bugs we have found. We made a detailed security report v1.0 and coordinated continuously with the team of developers for fixing out all the raised security issues. After few days we confirmed the raised issues to be addressed by the dev team and provided them the final 2.0 version.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys have completed the security testing on time successfully and the application code was updated with the fixed code in the live server . Now the portal is running securely and providing financial services to thousands of users flawlessly.</p>
<p>That means Threatsys is protecting the banking users of Nigeria and making the whole UBN secure enough.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/cyber-security-testing-for-union-bank-of-nigeria/">Cyber Security Testing for Union Bank of Nigeria</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CM Dashboard Odisha CERT-in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/cm-dashboard-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 11:32:05 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3853</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/cm-dashboard-odisha/">CM Dashboard Odisha CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="700" height="240" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom.png" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-25 142013 (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom.png 700w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom-300x103.png 300w" sizes="(max-width: 700px) 100vw, 700px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">The Chief Minister Dashboard, Government of Odisha is a flagship technology initiative of the Government of Odisha to achieve the 5T goal. The chief minister&#8217;s office directed that all departments create data dashboards in order to deliver data-driven governance. This project makes use of cutting-edge AI, machine learning, and data science technology to monitor schemes, ensure transparency, and make data-driven decisions.</span></p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> CM Dashboard<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  OCAC Government of Odisha</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">The web portal of “CM Dashboard, Government of Odisha” satisfies the demand for real-time monitoring to find out all security loop holes and protects sensitive information&#8217;s of government. There was a several  user access for different rules and we need to test with the standard of OWASP, SAMS, SANS, OSSTMM, CERT-IN guidelines.</span></p>
<p>The challenges was to complete the whole cyber security audit with in 15 day&#8217;s of time with supporting the developers a all the bug&#8217;s can be fixed.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">Threatsys Technologies assigned 2 Cyber Security Resources under the Guidance of our CEO, Deepak Kumar Nath. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</span></p>
<p><span style="font-weight: 400;">After testing the Web Application from the production URL, we discovered many problems that have been classified as Critical, High, Medium, and Low based on their severity. Our team is always striving to provide developer-friendly reports that are readily readable and include clear proof of ideas.</span></p>
<p><span style="font-weight: 400;"> We create proof-of-concept video with adequate evidence so that security problems may be simply understood and corrected. We have assigned a time frame to each Severity category in which the issue must be resolved. During that time, our staff was often assisting the developers in resolving such difficulties as rapidly as possible. After the patch was performed, our team re-audited the application to ensure that the fixes were done correctly.</span></p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">Threatsys issued the CERT-IN Safe to Host Certificate, and the CM Dashboard, Government of Odisha is successfully hosted in the State Data Center. Because it belongs to the government of Odisha, it is safely managed to authenticate with all of Odisha&#8217;s departments for their monitoring process, perfect management and procedure, and secure information storage for everyone.</span></p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/cm-dashboard-odisha/">CM Dashboard Odisha CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 11:19:53 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3851</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="869" height="400" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-23 170848 (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg 869w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-300x138.jpg 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-768x354.jpg 768w" sizes="auto, (max-width: 869px) 100vw, 869px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The UT dashboard is a groundbreaking endeavor by the Government of Jammu and Kashmir to use Big Data and Analytics to drive crucial administrative decisions. This technology-first strategy is driven by the government&amp;#39;s determination to seamlessly integrate transparency and governance by facilitating the rapid flow of information from the grassroots to the upper rungs of the UT machinery.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> UT Dashboard<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Jammu and Kashmir<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  Government of Jammu and Kashmir</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The &amp;quot;UT Dashboard&amp;quot; web platform serves the requirement for real-time monitoring. The UT<br />
Dashboard was established to collect detailed data on ground-level effect, which supports the state administration&amp;#39;s two important goals of openness and accountability. The examination of the ground-level impact assists in keeping track of how various administrative departments are operating. The dashboard promotes the flow of information from the lowest to the top of the state administrative hierarchy.</p>
<p>Our task was to test the website for the top ten OWASP vulnerabilities and to assist the developers in addressing any potential risks in accordance with CERT-IN and Threatsys Web Apps Penetration Testing Guidelines. The application must handle sensitive data and may be required to consider data privacy and security considerations.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Technologies assigned 2 Cyber Security Resources under the Guidance of our CEO, Deepak Kumar Nath. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</p>
<p>After testing the Web Application from the production URL, we discovered many problems that have been classified as Critical, High, Medium, and Low based on their severity. Our team is always striving to provide developer-friendly reports that are readily readable and include clear proof of ideas. We create proof-of-concept video with adequate evidence so that security problems may be simply understood and corrected. We have assigned a time frame to each Severity category in<br />
which the issue must be resolved. During that time, our staff was often assisting the developers in resolving such difficulties as rapidly as possible. After the patch was performed, our team reaudited the application to ensure that the fixes were done correctly.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys issued the CERT-IN Safe to Host Certificate, and the UT Dashboard is successfully hosted in the State Data Center. Because it belongs to the government of Jammu and Kashmir, it is safely managed to authenticate with all of Jammu and Kashmir&amp;#39;s departments for their monitoring process, perfect management and procedure, and secure information storage for everyone.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>eDespatch Odisha CERT in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/e-despatch-cert-in-web-app-testing-threatsys/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 14 Jan 2023 11:35:41 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3738</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/e-despatch-cert-in-web-app-testing-threatsys/">eDespatch Odisha CERT in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="1363" height="478" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-170654.png" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-14 170654" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-170654.png 1363w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-170654-300x105.png 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-170654-1024x359.png 1024w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-14-170654-768x269.png 768w" sizes="auto, (max-width: 1363px) 100vw, 1363px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>e-Despatch is an online system for tracking and managing the movement of official documents in the Indian state of Odisha. It is designed to streamline the process of sending and receiving official documents between different departments and agencies within the state government. The system allows users to track the status of their documents in real-time, and provides features such as document scanning, digitization, and electronic signature. It aims to improve the efficiency and transparency of the government&#8217;s document management process.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> e-Despatch<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6> Odisha Computer Application Center</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The e-Despatch portal is a crucial application for Govt. Of Odisha through which the official documents are exchanged securely in between different departmental users. This makes it mandatory to have proper security implementations throughout the application as it stores, process and fetch highly confidential state govt Data.</p>
<p>Dealing with any Govt. Assets for security audit is always challenging. The challenge for us to perform a penetration testing against the portal following the Cert-in Security Checklist along with other security frameworks like OWASP top 10 and SANS 25. The security testing is focused with securing the integrity and confidentiality of the data. Additionally , as the portal deals with different number of privileges , we have to check thoroughly for the permission based access controls.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>At first we have gone through the workflow of that application to understand it better before doing any security testing there. Each and every test was done under a host hosted on the staging server. We have started the audit With a team of 4 experienced penetration testeres, we divide each one to separate modules for completing the project before the deadline. As per procedures we initiated an automation scan( using paid enterprise tools) against the target and found several low hanging bugs. During the time of manual testing , our team first engaged themselves with black box testing and found that the application is vulnerable for disclosing sensitive information to the public users and few of the departmental user’s accounts can be taken over. After completing the white-box testing, our team came to an end with a total of 17 bugs including low to critical vulnerabilities.</p>
<p>The team now has all the required evidences , root causes and preventions for the bugs we have found. We made a detailed security report v1.0 and coordinated continuously with the team of developers for fixing out all the raised security issues. After few days we confirmed the raised issues to be addressed by the dev team and provided them the final 2.0 version.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys have completed the security audit on time and was happy to issue the Cert-In Ready to host certificate for that portal. The portal e-Despatch Odisha was being hosted into the state data centre. Now the portal is secure enough from the external threats and the highly sensitive data are processed , stored and fetched flawlessly.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/e-despatch-cert-in-web-app-testing-threatsys/">eDespatch Odisha CERT in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
