<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Website security Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<atom:link href="https://threatsys.co.in/nproject-tag/website-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatsys.co.in/nproject-tag/website-security/</link>
	<description>We Defend, We Protect, We Secure</description>
	<lastBuildDate>Fri, 06 Jun 2025 06:30:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://threatsys.co.in/wp-content/uploads/2021/05/cropped-Final-1-Logo-PNG-32x32.png</url>
	<title>Website security Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<link>https://threatsys.co.in/nproject-tag/website-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ensuring Data Security for One Crore Women Under Subhadra Yojana</title>
		<link>https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:01:29 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=647</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Subhadra Yojana, launched by Prime Minister Narendra Modi on his birthday i.e. September 17, 2024, is a groundbreaking initiative by the Government of Odisha aimed at empowering over 1 crore women between the ages of 21 to 60. Named after Goddess Subhadra, this scheme provides financial assistance of ₹50,000 over a five-year period to eligible beneficiaries, with funds directly transferred to their bank accounts in bi-annual installments of ₹10,000.</p>
<p>Subhadra scheme is the largest, single women-centric scheme and is expected to cover more than 1 crore women. Under the scheme, all eligible beneficiaries between the age of 21-60 years would receive Rs. 50,000/- over a period of 5 years between 2024-25 to 2028-29</p>
<p>An amount of ₹10,000 per annum in two equal instalments will be credited directly to the bank accounts of the beneficiaries. As many as 76 lakh women have so far registered in the scheme.</p>
<p>During the programme, over ₹1,250 crore was transferred to the bank accounts of more than 25 lakh women beneficiaries under the Subhadra scheme.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Subhadra Yojana<br>
<h6 style="margin:6px 0;display:inline-block;">Department:</h6> Department of Women and Child Development, Govt of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Woman and Child Development <br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-in Audit, Mobile Apps Penetration Testing, Web Application Security Audit, API Security Testing, AADHAR UIDAI AUA&KAU Audit <br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> E Square System & Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The Subhadra Yojana, a flagship initiative of the newly formed BJP government in Odisha, is launched on September 17, 2024, coinciding with Prime Minister Narendra Modi’s birthday. With the BJP coming to power in Odisha after 24 years of BJD rule, the government aimed to roll out this transformative program within the first 100 days of governance. This ambitious timeline posed significant challenges in completing the full cybersecurity assessment, including Aadhar-based verification audits.</p>
<p>The project required the collection of applications through Jana Seba Kendra/Common Service Centres, where all submissions would be verified against government databases and through field enquiries as needed. Beneficiaries were required to complete e-KYC formalities, preferably through face-authentication via the SUBHADRA Mobile Application, using their Aadhaar numbers. They could also opt to pass on the benefits to fellow women in Odisha through the SUBHADRA Portal.</p>
<p>With the complexity of the applications and the Aadhaar-based e-KYC system, ensuring robust security and compliance under these tight deadlines was a monumental task. The integration of the Aadhaar system, involving sensitive biometric data and authentication, added another layer of urgency to the assessment. Despite these challenges, we successfully ensured that the data infrastructure for Subhadra Yojana met the highest standards of security and compliance, enabling the government to empower over 1 crore women across the state.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>To meet the tight deadlines and extensive requirements of securing the Subhadra Yojana project, <strong>Threatsys</strong>, one of India’s leading cybersecurity firms, deployed a specialized team of experts. The team comprised eight security researchers, a Project and Delivery Manager, and a Chief Auditor for <a href="https://threatsys.co.in/security-consulting-and-compliance/cert-in-cyber-security-audit/"><strong>CERT-IN Cyber Security Testing and Audit</strong></a>. Additionally, three dedicated auditors were assigned to ensure <strong>UIDAI KUA and AUA Compliance</strong>.</p>
<p>Before initiating any security testing, the team thoroughly analyzed the workflow of the four critical modules within the Subhadra Yojana application, ensuring a deep understanding of the system architecture and data flow.</p>
<p>Security testing was conducted on a dedicated staging server to mirror real-world conditions without affecting the live environment. The use of diverse commercial cybersecurity tools, including <strong>Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Netsparker, HCL Appscan, Qualys Web Apps Scanner, OWASP Zap, SAINT</strong>, and <strong>Tenable</strong>, allowed for a comprehensive assessment of vulnerabilities in the web and mobile applications, as well as API security.</p>
<p>Threatsys followed the <strong>OWASP, CERT IN, NIST, SANS</strong> testing guide and <strong>ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM)</strong>. This approach simulated potential external attacks as well as actions taken by authenticated users, identifying several <strong>critical, high, medium, and low-level bugs</strong>. Threatsys team  closely collaborated with the development team to address and patch security issues in the mobile and web applications, as well as at the API level.</p>
<p>For the <strong>UIDAI KUA and AUA audit</strong>, Threatsys conducted a <strong>GAP Assessment</strong>, gathering essential evidence in line with the  <strong>UIDAI Audit Checklist 3.0</strong>. After completing the necessary testing and verifications, comprehensive reports were prepared, detailing findings and ensuring compliance. The <strong>Audit Certificate</strong> for the Aadhaar compliance was issued after all proper audits, evidence gathering, and documentation were completed.</p>
<p>Following thorough assessments, <strong>CERT-IN Certificates</strong> were issued to the Department for both the <strong>Subhadra Mobile Application</strong> and the <strong>Web Application</strong>, marking the completion of all required cybersecurity audits. These certifications confirm that both platforms are secure and compliant with Indian cybersecurity standards, further reinforcing the integrity of the Subhadra Yojana initiative.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Through a meticulous and well-coordinated approach, Threatsys successfully delivered and <strong>Secured Data for 1 Crore Women</strong>:</p>
<p>By implementing advanced cybersecurity measures, <a href="https://threatsys.co.in/"><strong>Threatsys</strong></a> ensured the safe handling of sensitive data for over 1 crore women beneficiaries in Odisha, safeguarding personal information and preventing unauthorized access.</p>
<p>Threatsys successfully completed the <strong>UIDAI KUA and AUA Audits</strong>, ensuring full compliance with Aadhaar-related security and privacy requirements. The issuance of the <strong>Audit Certificate</strong> confirmed that all security measures aligned with UIDAI’s stringent guidelines.</p>
<p>Both the <strong>Subhadra Mobile Application</strong> and <strong>Web Application</strong> received <strong>CERT-IN Certificates</strong>, validating that the platforms met national cybersecurity standards and were safe for large-scale use.</p>
<p>Despite the tight deadline set by the newly formed Odisha government, Threatsys completed the full cybersecurity assessment, Aadhar audits, and necessary documentation within the required timeframe, supporting the successful launch of the Subhadra Yojana. The secure integration of Aadhaar-based e-KYC through face-authentication on the Subhadra Mobile Application ensured smooth onboarding for beneficiaries, enhancing user experience while maintaining robust security.</p>
<p>These results not only supported the successful launch of Subhadra Yojana but also set a benchmark for secure implementation of large-scale government initiatives, ensuring both data integrity and compliance with regulatory standards.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/securing-data-of-one-crore-women-under-subhadra-yojanaa-odisha/">Ensuring Data Security for One Crore Women Under Subhadra Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</title>
		<link>https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2024 10:49:24 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=5821</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana (BSKY) is a health insurance scheme that the Government of Odisha launched in India in 2018. The scheme aims to provide affordable and accessible healthcare to the people of Odisha, especially to those who are economically disadvantaged or belong to vulnerable sections of society. Under the BSKY scheme, eligible beneficiaries can avail of cashless treatment at empanelled hospitals for various medical conditions, including hospitalisation, surgery, and pre and post-hospitalisation expenses. The scheme also covers the cost of diagnostic tests, medicines, and other medical supplies.</p>
<p>BSKY provides health insurance coverage for medical expenses (up to Rs. 5 lakhs for families and up to Rs. 10 lakhs for women) incurred for treatment in hospitals and health centres across the state of Odisha. Around 4,036 medical treatments and 255 surgical procedures are covered under this scheme.</p>
<p>Insights of BSKY Project under Department of Health and Family Welfare, Goverenment of Odisha. Beneficiary 4.79 Cr. Total Households 119.5 Lakhs, Card Holders 3.34 Cr., Households Covered 96.42 Lakhs (81%), Hospitals 9,324, where as Govt. 8,530 Private 794 No. of Treatments Done 1.19 Cr., Govt 1.17 Cr., Private 2,76,240. 2023 Reimbursement (Pvt) 628.02 Cr.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> Biju Swasthya Kalyan Yojana(BSKY)<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government, Healthcare Industry<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Cyber Security Testing, VAPT, CERT-IN Audit, WAPT, Mobile Apps Penetration Testing<br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Private Limited<br>
		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Biju Swasthya Kalyan Yojana Projects consists of several Modules like BSKY Portal, Hospital Empanelment Portal, BSKY Citizen Dashboard, Grievance Portal, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more.</p>
<p>BSKY Healthcare data is highly sensitive, and there is a significant risk of data breaches, which can lead to identity theft and other serious consequences of each Biju Swashthya Kalyan Card Holders. Threatsys is ensuring that data privacy is maintained and that sensitive information is adequately secured.</p>
<p>BSKY Portals and applications are the prime target for cybercriminals due to the vast amount of sensitive data they store. All the Web and Mobile Applications are heavily regulated, and compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act) and <strong><a href="https://threatsys.co.in/security-consulting-and-compliance/gdpr-compliance/">GDPR</a></strong> (General Data Protection Regulation) is crucial. Threatsys needs to complete the whole project of 10+ Applications within 1 month of timeline.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys, the well-known Cyber Security Firm of Bhubaneswar, Odisha, has appointed ten security researchers under the Project and Delivery Manager. In order to gain a better understanding of the application, the team thoroughly studied the workflow of the four modules before conducting any security testing. The testing was carried out on a host that was hosted on the staging server, using a variety of commercial cyber security tools, including Burp Suite, IBM App Scan, WhiteHat DAST, Veracode, Acunetix, Intruder, Netsparker, HCL Appscan, Qualsys Web Apps Scanner, OWASP Zap, SAINT, and Tenable.</p>
<p>Threatsys used a combination of the Open Web Application Security Project (OWASP) testing guide and ISECOM&#8217;s Open-Source Security Testing Methodology Manual (OSSTMM) for conducting penetration test of the server and applications. The testing was done to simulate as closely as possible the viewpoint of completely external attacker and Application user.</p>
<p>the threatsys team identified more than 50+ bugs across all the portals i.e BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application, including 15+ critical and 23 high-level vulnerabilities. All projects were delivered and retested within the set deadline, with the development team taking three weeks to fix all the raised security gaps. Threatsys remains committed to ensuring the integrity and confidentiality of the data and applications it works on, helping to safeguard sensitive BSKY Card holders information and online citizen services managed by the Government of Odisha.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys has successfully completed the cyber security testing and CERT-IN Security audit project with the utmost diligence and professionalism. Threatsys provided Initial Version 1 and Final Version 2 Reports with the appropriate support on time for 10+ Applications, and according to the proper security implementation, which has helped to issue the CERT-In VAPT certificate for all four modules of the Biju Swasthya Kalyan Yojana(BSKY), Odisha Government</p>
<p>All the modules of Department of Health and Family Welfare Departments that is BSKY applications are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that citizens of Odisha can now use the BSKY Portal, Hospital Empanelment Portal for both Government Hospitals and Private Hospitals, BSKY Citizen Dashboard for all Odisha People, Grievance Portal for all BSKY Card Holders, BSKYTMS Portal, BSKY Mitra Assistance AI Platform, BSKY Mobile Application and more. These web and mobile applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the Best Cyber Security Service Provider that protects the data of all the BSKY Card Holders Data of Odisha and responsible for their security, integrity and privacy.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/case-studies-cyber-security-services-bsky-biju-swasthya-kalyan-yojana-odisha-goverenment/">Securing 1.2Cr BSKY Card Holders Data under Biju Swasthya Kalyan Yojana</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 03:50:27 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=653</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/">SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper"><h2 style="text-align: center;font-family:Abril Fatface;font-weight:400;font-style:normal" class="vc_custom_heading vc_do_custom_heading vc_custom_1689260306915" >Best Cyber Security Company of Odisha</h2>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Student Academic Management System (SAMS) is an integrated portal which provides a common platform for admission into various courses across the State through e-Admission and also several e-Services to students at institution level through e-Administration.</p>
<p>This initiative was started in 60 Junior Colleges during academic session 2009-10 and expanded to 169 junior college and 53 degree(+3) Colleges during the session 2010-11. After successful implementation of online admission during the session 2010-11 and 2011-12 under the project SAMS it has been decided to cover all junior colleges(including +2 self financed college) and 162 degree colleges (+3) during session 2011-12. After getting good feedback from college and students All junior &amp; Degree/Autonomous students have come to SAMS Fold and it has been approved by Government of Odisha students take online admission into Junior / Higher Secondary School and degree(+3) classes of Arts, Commerce and Science streams along with Vocational &amp; Sanskrit Educational institutions. This admission process, carried out through internet and computers is called as e-Admission. At present, SAMS covers additional courses in addition to the above i.e. it covers Correspondence, ITI, Diploma, Teacher Education, Physical Education of different departments. Besides e-Admission, SAMS also maintains the academic and financial records of each student admitted into the different educational institutions.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> SAMS ODISHA<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6>Department of Higher Education, Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> Web Application Security Audit, CERT-IN Cyber Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6> Odisha Computer Application Center</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>SAMS Application Project consists of Several modules i.r for Higher Education, School &amp; Mass Education, Skill Dev and Tech Education, Sports and Youth Services, Odia Language, Literature and Culture. Right now the Application consists of 4,392 Colleges, 12,49,895 Online Applications, Admission Strength 9,74,802, Admission Taken 7,36,535. The web Applications of &#8220;SAMS Odisha&#8221; was containing all the academic informations of old student and current students. The web portal also have different panels for college authorities and boards which includes numerous financial and academic data of students. The Web Application needs full security protection with the Cyber Security Audit.</p>
<p>Our challenge was to test the website for OWASP top 10 vulnerabilities and to fix for all possible threats as per CERT-IN Guidelines within short time period. The Application needs to be free from all the bugs with the CERT in audit certification as it will be hosted in the State Data Center. The Web Application need to be continuously monitored and will be free from security flaws. With the Ready to Host Certificate from CERT-IN Empanelled Company, The Possible Cyber Security Audit can be initiated. Threatsys &#8216;s challenge is to complete SAMS applications of Degree, Post Graduation, Teacher Education &amp; BHED, Higher Secondary School. Teacheer Education and SCERT, Corresponsence CHSE, ITI, Dipmoa, Post Diploma in industrial Safety, Physical Education, Utkal Sangeet Mahavidyalaya within 30 Days.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Appointed 6 Cyber Security Resources under the Guidance of our Lead Security Engineer. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</p>
<p>Threatsys primarily follows the Open Web Application Security Project (OWASP) guidelines as a bench mark. However, over time we have developed our own Hybrid Methodology that brings together the best of OWASP, OSSTM, WASC and NIST standards as well as to the CERT-IN guidelines. This hybrid methodology involves a set of comprehensive checks which ensures that no vulnerabilities are missed during testing.</p>
<p>The process involves an active analysis of the SAMS applications for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution.</p>
<p>Our methodology is designed to be exhaustive in two dimensions.<br />
Testing for all known attacks &amp; Testing on all possible points of entry.</p>
<p>After Testing The SAMS Web Application from the production url, We have found Several bugs which are further categorised into Critical, High, Medium &amp; Low as per their severity. Our Threatsys team is always focused to make developer friendly reports which can be easily understandable with clear given proof of concepts. We make videos POC with the proper evidances as the security flaws can be easily understood and fixed.</p>
<p>We have provided Each Severity type with a certain time period under which that issue should be fixed. During That period Our team was frequently supporting the developers in order to fix those issues quickly. After the fix was completed our team re-audited the application again to check whether the fixes are done perfectly or not.</p>
<p>Our Team has issued the Re-Audited Reports and coordinated with our CERT-IN Associates for the Verification of the Reports. along with the reports and fixings were verified and we have successfully provided Ready to Host CERT-IN Certificate within the timeline.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>All the modules of SAMS Odisha are hosted in the state data centre, ensuring the highest level of security and reliability. The successful completion of the project means that Students of Odisha can use Degree, Post Graduation, Teacher Education and BHED, Higher Secondary School, Teacher Education, ITI, Diploma, Post Diploma in Industrial Safety, Physical Education, USM applications securely. These applications are now well-protected against external threats, and the highly sensitive data they process, store, and fetch are done so flawlessly. Threatsys is the No.1 Cyber Security Testing Company that protects the data of all the citizens of Odisha and responsible for their security, integrity and privacy.</p>
<p>“Threatsys&#8217;s team went deep down into the rabbit hole to understand the product and find several bugs with a business logic rule that took engineering several weeks to analyze within the code.” concluded Saroj Swain, IT Manager, CSM Technologies Pvt. Ltd..</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/sams-odisha-cert-in-cyber-security-audit/">SAMS Odisha, Govt. of Odisha CERT-IN Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
