20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media...

Preview:

Citation preview

20 18

©copyrightsitsl2018

CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION CENTRE

01

©copyrightsitsl2018

INTELLIGENCE FUSION CENTRE

SECURITY OPERATIONS

CENTRE

SECURITY

EVENT

MANAGMENT

INCIDENT

MANAGMENT

CYBER

FORENSICS

BLUE TEAM

VULNERABILITY

ASSESSMENT

PENETRATIO

N TESTING

AUDIT

RED TEAM

CLIENT SIDE

NETWORK

WEB

APPLICATIONS

MONITORING

IPDR

GSM/ CDMA

SOCIAL

MEDIA

OTT

INTELLIGENCE FUSION CENTRE

02

©copyrightsitsl2018

03 D E S I R E D C O N V E R G E D A R C H I T E C T U R E

©copyrightsitsl2018

GSM

INTERNET

RADIO

SAT

FIELD UNITS

COHERENT FRAMEWORK

(SERVER AND ANALYSIS TOOLS)

DATA IDENTIFIED ,PROCESSED, ANALYZED THEN

INTEGRATED IN NEAR REAL TIME FOR SUITABLEACTIONS

04 S E C U R I T Y O P E R AT I O N S C E N T R E

©copyrightsitsl2018

05 S E C U R I T Y E V E N T M A N A G M E N T

©copyrightsitsl2018

ENTERPRISE SERVER FOR WIDE ACCESS

GEOSPATIAL BACKEND FOR M-GOVERNANCE

MULTI-DATABASE INTEGRATION WITH GIS

OPTIONAL INCIDENT MANAGEMENT SYSTEM

•ALERT/ WARNING NOTIFICATION

•ASSET MANAGEMENT AND RECOVERY

INTEGRATION WITH REAL-TIME DYNAMIC DATA FOR PUBLIC ENGAGEMENT

•VIDEO

•VEHICLE TRACKING

•MOBILE CALLS AND MESSAGES

06 I N C I D E N T R E S P O N S E

©copyrightsitsl2018

IDENTIFY

DETECT

RESPOND

NEUTRALIZE

ANALYSIS

• CDR

• TOWER DATA

• ISD DATA

• GATEWAY DATA

• SDR DATA

07 C Y B E R F O R E N S I C S

©copyrightsitsl2018

ESTABLISHMENT OF DIGITAL TRAIL

CREATION OF DIGITAL EVIDENCE.

FORENSICS DATA ACQUISITION

• DESKTOPS, LAPTOP,SERVERS

• STORAGE DEVICES

• MEMORY DEVICES

• MOBILE & SMART PHONES

• TABLETS

NETWORK FORENSICS

PASSWORD RECOVERY

08

©copyrightsitsl2018

B L U E T E A M

09 V U L N E R A B I L I T Y A S S E S S M E N T

©copyrightsitsl2018

EVALUATE PRODUCTS

• MALWARE• BACKDOOR• SPYWARE

TEST NETWORKS

COMPLIANCE

• SECURITY STANDARDS• PROTOCOLS

10

©copyrightsitsl2018

P E N E T R AT I O N T E S T I N G

PRE-ENGAGEMENT INTERACTIONS

INTELLIGENCE GATHERING

THREAT MODELING

EXPLOITATION

POST EXPLOITATION

REPORTING

11

©copyrightsitsl2018

R E D T E A M

12 C L I E N T S I D E AT TA C K S

©copyrightsitsl2018

13

©copyrightsitsl2018

N E T W O R K AT TA C K S

14

©copyrightsitsl2018

W E B / M O B I L E A P P AT TA C K S

15

©copyrightsitsl2018

U N I Q U E C A PA B I L I T I E S

PAY LOAD CREATION

PAYLOAD MORPHING

PAYLOAD DELIVERY

CONTINUOUS CONTENT EXTRACTION

ADVANCE PERSISTENT THREAT

16

©copyrightsitsl2018

M O N I T O R I N G

17

©copyrightsitsl2018

I P D R

GATEWAY MONITORING

DEEP PACKET INSPECTION

CONSTANT SURVEILLANCE

• DESIGNATED DEVICES

• TARGETED DEVICES

CALL RECORD FOR INTERNET

• DATE AND TIMESTAMP

• SENDER AND RECEIVER ACCOUNT IDs

• SEND AND RECEIVER EMAIL ADDRESSES

• SUBJECT LINE

• SERVICE/APPLICATION

BROADER INSIGHT TO IDENTIFY THREATS

• SPECIFIC COMMUNICATIONS INTERCEPT INSIGHTS

• PROVIDE MEANINGFUL INVESTIGATIVE INFO

18

©copyrightsitsl2018

G S M / C D M A

VOICE COMMUNICATION

SMS MESSAGES

DTMF TONES

CALL RELATED INFO

19

©copyrightsitsl2018

S O C I A L M E D I A

INTEGRATION OF VAST AMOUNTS OF OPEN-SOURCE WEB DATA.

TRACKS NEGATIVE INFLUENCER.

ANONYMITY AND CONFIDENTIALITY

UNINTERRUPTED DATA COLLECTION

ACCESS TO DEEP AND DARK WEB SITES

TURNS UNSTRUCTURED DATA INTO ACTIONABLE INTELLIGENCE

IDENTIFIES AND PROFILES NEW LEADS

FOCUSES ON SPECIFIC TARGETS

RECONSTRUCTS HIDDEN PROFILES

20

©copyrightsitsl2018

S A M P L E I N T E L L I G E N C E D A S H B O A R D

21

©copyrightsitsl2018

C A PA C I T Y B U I L D I N G P L A N

TRAINING PROGRAM

• 4 ‘Q’ LEVEL CORE COURSES

• ON-THE-JOB (OJT) TRAINING

• 1 SPECIALIZATION COURSE ON COMPLETION OF CORE COURSES

TRAINING ENVIRONMENTS

• CYBER RANGES

• TOOLS – OFF-THE-SHELF & CUSTOMIZED

• OPERATIONAL WORKSPACE

22

©copyrightsitsl2018

E N G A G E M E N T M O D E L

INSTALLATION & COMMISSIONING

PROGRAM GOVERNANCE

CAPACITY BUILDING & TRAINING PROGRAM

OPERATIONS

• SECURITY OPERATIONS CENTRE,

• DIGITAL FORENSIC LAB,

• SOCIAL MEDIA MONITORING,

• BLUE TEAM

• RED TEAM

R&D SUPPORT TO ‘RED TEAM’

enquiry@sitsl.io | www.sitsl.io | +1-877-693-6033 | sales@sitsl.io

Shubhashish Corporate Tower, 12-13 Rathore Nagar, Queen's Road,

Vaishali Nagar, Jaipur, Rajasthan 302021

THANK YOU

©copyrightsitsl2019Please note that this is not a legal document. This document with all the information provided, is intended solely for marketing and branding purpose. It has no legal standing.

Shruti Mittal

(Sales Director)

mob : +91-9982529537e-mail : shruti.mittal@sitsl.iowebsite : www.sitsl.io

Recommended