IT Infrastructure
IT Infrastructure
Jan, 2014
June 2011
IT Infrastructure
Agenda
IT Support
Information Security Policy
June 2011
IT Infrastructure
Objective
The objective of the session is to have an awareness and a better understanding of the IT Infrastructure and
June 2011
IT Infrastructure
Scope
It applies to all employees, contractors, consultants
June 2011
IT Infrastructure
LAN in 1982
June 2011
IT Infrastructure
IT Infrastructure - Snapshot
June 2011
IT Infrastructure
WAN Connectivity
June 2011
IT Infrastructure
IT Infrastructure Controls
Well defined IT and Information Security Policy Enterprise Security Solution deployed for Anti Virus & Web Content filtering Highly secure encrypted connectivity between Project offices over VPN. VSAT connectivity for various project offices
June 2011
IT Infrastructure
Head Quarters
Checkpoint Express
VOIP connectivity.
June 2011
IT Infrastructure
Software
Proxy
ISA
Office Automation
MS Office 2003 Open Office 3.0, 3.1 Lotus Smart Suite ver 9.6 Adobe Acrobat
Messaging
Lotus Notes R7 Server Lotus Notes R7 clients
Firewall
Checkpoint
Anti Virus
McAfee 4.0.3 Trend Scan Mail ver 2.5
Project Management
Primavera Enterprise ver 2.0B and 3e
URL Filtering
Super Scout ver 3.0.3.1from Surf Control
June 2011
IT Infrastructure
Software Cont
ERP Oracle Apps 11.5.10.2 (11i)
Database Oracle 10g Oracle Forms Developer Oracle Reports Developer
June 2011
IT Infrastructure
Material Management
PO Module, Inventory Module
Equipment Management
Enterprise Asset Management
HR Management
Core HR, Self Service
Project Management
Oracle Project Accounting
June 2011
IT Infrastructure
Software Policy
Software Procurement would be through IT Department Only authorised and licensed software's are allowed JSPL has global contract for all the licenses Dedicated staff to monitor the s/w compliance
June 2011
IT Infrastructure
Engineering Software
AutoCAD 2002, 2005, 2006, 2007
STAAD Pro 2006 PDMS - Plant Design Software ver 11.5
I- Sketch
June 2011
IT Infrastructure
Hardware
Desktops (PIV of HP, IBM, Compaq) Laptops (Toshiba, HP, Sony)
IT Infrastructure
Hardware Policy
All Hardware procured is standardised across JSPL Group. All DT / LT procured would be retained for the period of 4 Years. Global tie-up with HP for the hardware procurement.
June 2011
IT Infrastructure
Skilled IT professional at both JSPL and Site locations. ERP footprint deployed at all major sites. Central management of all software licenses. All Employees are provided access to Mailing System. Effective use of File Server for the department/ project team . Must check for mails issued from [email protected]
All JSPLs resources, information and data must be used for business purposes.
JSPL FTP Server available for sharing information across site locations. Logging a call with helpdesk ([email protected]) for any IT related issues. Established escalation matrices. Report Security Incident at [email protected] .
June 2011
IT Infrastructure
You are the critical link in protecting the JSPL information assets
information
June 2011
IT Infrastructure
Confidentiality
Availability
Integrity
Confidentiality : To prevent unauthorized disclosure of information stored or processed on JSPLs information systems Examples include: Protecting operational data
June 2011
IT Infrastructure
Confidentiality
Availability
Integrity
Integrity :
To prevent accidental or unauthorized/deliberate alteration of information. Examples include: Ensuring that the sensitive data isnt modified by an unauthorized party
June 2011
IT Infrastructure
Confidentiality
Availability
Integrity
Availability :
To prevent accidental or unauthorized/deliberate destruction or deletion of information necessary to JSPLs operations on a 24X7 basis. It relates to ensuring that data is accessible.
Examples include:
Ensuring that critical servers are available to customers
June 2011
IT Infrastructure
Abuse of computer access controls Installation/use of unauthorized hardware Illegal Use of company computing resources
(gambling, managing personal e-commerce site, online investing)
Physical theft/sabotage
(intentional destruction of computing equipment)
Electronic theft/sabotage
(intentional destruction/disclosure of proprietary data or information)
Fraud
June 2011
IT Infrastructure
June 2011
IT Infrastructure
June 2011
IT Infrastructure
June 2011
IT Infrastructure
June 2011
IT Infrastructure
Email Usage
Dos Use the e-mail for official purposes only Be careful what you say in an email. It can and will be forwarded. Be careful when replying to mailing Don'ts Transmit or store offensive maternal. Transmit information assets of JSPL to unofficial mails ids
June 2011
IT Infrastructure
June 2011
IT Infrastructure
Laptop/Desktop Security
Dos
Don'ts
Ensure that your machines have complex login' password Share folders or disk drives Download or install freeware, shareware or any other such software or application Leave your laptop unattended
Make sure that you install only legally licensed software on your PC or laptop issued by ISD
June 2011
IT Infrastructure
Computer Media
Dos Store media that contains sensitive or confidential information in a safe and secure environment Erase the contents of any re-usable media by reformatting or deleting before handing over to the third party or vendor Don'ts Carry any media such as CDs, DVDs out of JSPL premises without clearance of ISD Carry and use any personal media like tapes, disks, CDs, USB pen drives in the office premise
June 2011
IT Infrastructure
June 2011
IT Infrastructure
Internet Usage
Dos
Use the Internet for official and authorised purposes only Adhere to JSPLs policies while accessing the Internet from an JSPL owned computer/ laptop
Don'ts
Access the Internet directly from office network using modems or other private connections unless specifically approved Install freeware, shareware / trial version software and obscene written or pornographic material available on the Internet
Upload official data on to mass storage sites and public FTP Servers
June 2011
IT Infrastructure
Backup of Information
Employees should ensure critical official data backup by effectively using the File Servers Comprehensive Back-up all the files that you own and don't forget to backup your email inbox in the
Regular
Back up files according to a regular schedule.
June 2011
IT Infrastructure
OUR Responsibilities . . .
Ensuring that WE are aware of, and understand, the security
requirements of JSPL Complying with the do's and don'ts propagated by ISD. Check for mails issued from [email protected] Ensuring that JSPLs resources, information and data are used for business purposes. Using information systems only as appropriate for ones job
June 2011
IT Infrastructure
Conclusion
DEPENDS ON YOU!
June 2011
Thank You
June 2011