20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott...

24
20 18 ©copyrightsitsl2018 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION CENTRE

Transcript of 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott...

Page 1: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

20 18

©copyrightsitsl2018

CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION CENTRE

Page 2: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

01

©copyrightsitsl2018

INTELLIGENCE FUSION CENTRE

SECURITY OPERATIONS

CENTRE

SECURITY

EVENT

MANAGMENT

INCIDENT

MANAGMENT

CYBER

FORENSICS

BLUE TEAM

VULNERABILITY

ASSESSMENT

PENETRATIO

N TESTING

AUDIT

RED TEAM

CLIENT SIDE

NETWORK

WEB

APPLICATIONS

MONITORING

IPDR

GSM/ CDMA

SOCIAL

MEDIA

OTT

INTELLIGENCE FUSION CENTRE

Page 3: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

02

©copyrightsitsl2018

Page 4: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

03 D E S I R E D C O N V E R G E D A R C H I T E C T U R E

©copyrightsitsl2018

GSM

INTERNET

RADIO

SAT

FIELD UNITS

COHERENT FRAMEWORK

(SERVER AND ANALYSIS TOOLS)

DATA IDENTIFIED ,PROCESSED, ANALYZED THEN

INTEGRATED IN NEAR REAL TIME FOR SUITABLEACTIONS

Page 5: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

04 S E C U R I T Y O P E R AT I O N S C E N T R E

©copyrightsitsl2018

Page 6: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

05 S E C U R I T Y E V E N T M A N A G M E N T

©copyrightsitsl2018

ENTERPRISE SERVER FOR WIDE ACCESS

GEOSPATIAL BACKEND FOR M-GOVERNANCE

MULTI-DATABASE INTEGRATION WITH GIS

OPTIONAL INCIDENT MANAGEMENT SYSTEM

•ALERT/ WARNING NOTIFICATION

•ASSET MANAGEMENT AND RECOVERY

INTEGRATION WITH REAL-TIME DYNAMIC DATA FOR PUBLIC ENGAGEMENT

•VIDEO

•VEHICLE TRACKING

•MOBILE CALLS AND MESSAGES

Page 7: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

06 I N C I D E N T R E S P O N S E

©copyrightsitsl2018

IDENTIFY

DETECT

RESPOND

NEUTRALIZE

ANALYSIS

• CDR

• TOWER DATA

• ISD DATA

• GATEWAY DATA

• SDR DATA

Page 8: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

07 C Y B E R F O R E N S I C S

©copyrightsitsl2018

ESTABLISHMENT OF DIGITAL TRAIL

CREATION OF DIGITAL EVIDENCE.

FORENSICS DATA ACQUISITION

• DESKTOPS, LAPTOP,SERVERS

• STORAGE DEVICES

• MEMORY DEVICES

• MOBILE & SMART PHONES

• TABLETS

NETWORK FORENSICS

PASSWORD RECOVERY

Page 9: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

08

©copyrightsitsl2018

B L U E T E A M

Page 10: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

09 V U L N E R A B I L I T Y A S S E S S M E N T

©copyrightsitsl2018

EVALUATE PRODUCTS

• MALWARE• BACKDOOR• SPYWARE

TEST NETWORKS

COMPLIANCE

• SECURITY STANDARDS• PROTOCOLS

Page 11: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

10

©copyrightsitsl2018

P E N E T R AT I O N T E S T I N G

PRE-ENGAGEMENT INTERACTIONS

INTELLIGENCE GATHERING

THREAT MODELING

EXPLOITATION

POST EXPLOITATION

REPORTING

Page 12: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

11

©copyrightsitsl2018

R E D T E A M

Page 13: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

12 C L I E N T S I D E AT TA C K S

©copyrightsitsl2018

Page 14: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

13

©copyrightsitsl2018

N E T W O R K AT TA C K S

Page 15: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

14

©copyrightsitsl2018

W E B / M O B I L E A P P AT TA C K S

Page 16: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

15

©copyrightsitsl2018

U N I Q U E C A PA B I L I T I E S

PAY LOAD CREATION

PAYLOAD MORPHING

PAYLOAD DELIVERY

CONTINUOUS CONTENT EXTRACTION

ADVANCE PERSISTENT THREAT

Page 17: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

16

©copyrightsitsl2018

M O N I T O R I N G

Page 18: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

17

©copyrightsitsl2018

I P D R

GATEWAY MONITORING

DEEP PACKET INSPECTION

CONSTANT SURVEILLANCE

• DESIGNATED DEVICES

• TARGETED DEVICES

CALL RECORD FOR INTERNET

• DATE AND TIMESTAMP

• SENDER AND RECEIVER ACCOUNT IDs

• SEND AND RECEIVER EMAIL ADDRESSES

• SUBJECT LINE

• SERVICE/APPLICATION

BROADER INSIGHT TO IDENTIFY THREATS

• SPECIFIC COMMUNICATIONS INTERCEPT INSIGHTS

• PROVIDE MEANINGFUL INVESTIGATIVE INFO

Page 19: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

18

©copyrightsitsl2018

G S M / C D M A

VOICE COMMUNICATION

SMS MESSAGES

DTMF TONES

CALL RELATED INFO

Page 20: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

19

©copyrightsitsl2018

S O C I A L M E D I A

INTEGRATION OF VAST AMOUNTS OF OPEN-SOURCE WEB DATA.

TRACKS NEGATIVE INFLUENCER.

ANONYMITY AND CONFIDENTIALITY

UNINTERRUPTED DATA COLLECTION

ACCESS TO DEEP AND DARK WEB SITES

TURNS UNSTRUCTURED DATA INTO ACTIONABLE INTELLIGENCE

IDENTIFIES AND PROFILES NEW LEADS

FOCUSES ON SPECIFIC TARGETS

RECONSTRUCTS HIDDEN PROFILES

Page 21: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

20

©copyrightsitsl2018

S A M P L E I N T E L L I G E N C E D A S H B O A R D

Page 22: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

21

©copyrightsitsl2018

C A PA C I T Y B U I L D I N G P L A N

TRAINING PROGRAM

• 4 ‘Q’ LEVEL CORE COURSES

• ON-THE-JOB (OJT) TRAINING

• 1 SPECIALIZATION COURSE ON COMPLETION OF CORE COURSES

TRAINING ENVIRONMENTS

• CYBER RANGES

• TOOLS – OFF-THE-SHELF & CUSTOMIZED

• OPERATIONAL WORKSPACE

Page 23: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

22

©copyrightsitsl2018

E N G A G E M E N T M O D E L

INSTALLATION & COMMISSIONING

PROGRAM GOVERNANCE

CAPACITY BUILDING & TRAINING PROGRAM

OPERATIONS

• SECURITY OPERATIONS CENTRE,

• DIGITAL FORENSIC LAB,

• SOCIAL MEDIA MONITORING,

• BLUE TEAM

• RED TEAM

R&D SUPPORT TO ‘RED TEAM’

Page 24: 20 18 CYBER GUARDIAN PROGRAM & INTELLIGENCE FUSION … · monitoring ipdr gsm/cdma social media ott intelligence fusion centre. 02 ... network forensics password recovery. 08 ©copyrightsitsl2018

[email protected] | www.sitsl.io | +1-877-693-6033 | [email protected]

Shubhashish Corporate Tower, 12-13 Rathore Nagar, Queen's Road,

Vaishali Nagar, Jaipur, Rajasthan 302021

THANK YOU

©copyrightsitsl2019Please note that this is not a legal document. This document with all the information provided, is intended solely for marketing and branding purpose. It has no legal standing.

Shruti Mittal

(Sales Director)

mob : +91-9982529537e-mail : [email protected] : www.sitsl.io