Documente Academic
Documente Profesional
Documente Cultură
SmartPay
Introduction in Brief
What we do?
How we do?
Our targeted segment of users
Company Information
History
Initiation
Startup
Mission
- Best recognized solution
- Strong ties with developers & shopping carts
- Implement cutting edge technology
- Superior customer service
- Shop with confidence
Size
Employee
IT(30)
Software Developers
R&D
Dev Environment
Accounts & Finance(15)
Tech Support(25)
Registration
Purchases
Delivery
Disputes
Marketing & Sales(20)
HR(10)
Customers
500 customers
Corporate, Private, professionals
Traffic of 900 transactions per month
Corporate Special Plans
Sensitive Information
Customer
Financial and personal information
SSL layers
Encryption
SmartPay Servers
Sensitive Information
Trade Secrets
Email authentication
Identity Thefts
Security Tools
Disputes
Network Security
Why do we need security?
Internal/External Attacks
Internet
DMZ
Web server,
SMTP server,
File server, etc
Firewall
Firewall
Intranet
Network Structure
Web Security:
Website: www.smartpay.com
Usage of https(HTTP over SSL)
Combination of HTTP+TCL
Encrypted communication
Secured identification of network web server
Public key certification by server Admin
Application Control:
POS check control by McAfee
c. System reporting
d. Notification thr email & dashboard
e. Enforcements & policy (Access lock out)
Access Control:
Process of enforcement access
Configuration of access list over
Workstations, laptops & servers
Identification of group and user
Usage of EX Series Ethernet Switches
Packet passing control (Egression & Ingression)
Telecom closet (Data wire tapping)
Guest identification (Account restriction)
Authentication & endpoint assessment(disabling
account)
Security over risk mitigation
- By Divya Mohan
Risk
Identify potential threat
Likelihood of occurrence
Action To Address
Account Freezing
Contd.
Composite Trust Index
Multidimensional trust index
Hierarchical Permission Tree
Auditing
Separation of duties
Least privilege
PCI Complaint
- Build and Maintain a Secure Network
- Protect Cardholder Data
- Maintain a Vulnerability Management Program
- Implement Strong Access Control Measures
Physical Security
- By Vijay
Physical Security
- Protection of building sites, equipments, information and
software
- From theft, natural disaster & accidental damage
Building
- Physically Sound Constructive
- Continuous floor-to-ceiling walls
- Delivery & Loading areas segregated from operations
- Video Monitoring Equipments
- Solid building construction, emergency preparation
HR Policies
- Policies and Procedures
- By Sriteja Vunnam
Data Erasing
Putting Your Data to Rest
Disposing Data Storage Devices
Data Erasing Software
Data Erasing Hardware & Services
Erasure Verification Services
Descriptoin
Product
IP Phones
Nortel 6812
VOIP PBX
Backup Tape Drive
Quantity
Unit Costs
Total Costs
100
176.99
$17,699.00
40,000.00
$40,000.00
7,699.00
$7,699.00
Backup Tapes
LTO3 20 pack
719.99
$1,439.98
Backup Software
CommVault Galaxy
20,000.00
$20,000.00
15
600.00
$9,000.00
CAT6 Cabeling
50
50.00
$2,500.00
75.00
$75.00
Workstations
100
1,383.00
$138,300.00
Laptops
Dell Precision M4400 Laptops (w/ MS Office 07 Std., Finger Print Scanner)
15
1,652.00
$24,780.00
Servers
6 11,916.00
$71,496.00
Switches
3 3,514.99
$10,544.97
614.99
$1,844.97
Firewall
2,449.99
$2,449.99
Microsoft Exchange
4,000.00
$4,000.00
100
500.00
$50,000.00
AntiVirus
15,900.00
$15,900.00
POS Check
Application control SW
18,000.00
$18,000.00
B/W Printer
HP LaserJet P3005dn
10
898.99
$8,989.90
Color Printer
1,348.99
$5,395.96
Server Software
3,999.00
$3,999.00
15
799.00
$11,985.00
ERP
50
4,000.00
$200,000.00
DS-3 lines
48,000.00
$48,000.00
$714,098.77
Future Enhancements
Forum
Blog
UK expansion
Thank You