Securing the critical infrastructures from cyber threats: If you want to identify the deficiency that could put your critical infrastructure at risk then ask team C3i to perform vulnerability assessment and penetration testing in a controlled  environment and enhance the resilience and security of your infrastructure.

a.  Power and Energy

                        i.   Generation

                      ii.   Transmission

                    iii.   Distribution

b.  Industry

                        i.   Continuous Process

                      ii.   Batch

                    iii.   Manufacturing

How to get it ? and What are the minimum requirements?

Bring your hardware / software in C3i Center

Our Experience

o    https://www.us-cert.gov/ics/advisories/icsa-19-290-01

o    https://www.us-cert.gov/ics/advisories/ICSA-19-150-01

o    https://nvd.nist.gov/vuln/detail/CVE-2019-6812

o    https://nvd.nist.gov/vuln/detail/CVE-2019-6813

o    https://nvd.nist.gov/vuln/detail/CVE-2019-6833

o    https://nvd.nist.gov/vuln/detail/CVE-2019-6831

o    https://nvd.nist.gov/vuln/detail/CVE-2019-6810

o    https://nvd.nist.gov/vuln/detail/CVE-2018-7811

a.  C3i center, in association with TalentSprint has designed an Advanced Certification Program in Cyber Security and Cyber Defense for current and aspiring professionals who are keen to explore and exploit the latest trends in Cyber Security Technologies. Follow this link for more details

b.  Team C3i provided training to international IT workforce under the ITEC programme of the ministry of external affairs

How to get it ? and What are the minimum requirements?

Please see this link

Our Experience

We have successfully given training to participants from a few nations as below mentioned nations:-

Bangladesh, Bhutan, Cameron, Egypt, Ethiopia, Fiji, Ghana, Iraqi-Kurdistan, Kazakhstan, Laos, Mauritius, Mongolia, Morocco, Mozambique, Oman, Nigeria, Palestine, Sri Lanka, South Sudan, Sudan, Sierra Lions, Seychelles, Syria,Tanzania, Uganda, Uzbekistan,  Vietnam, Zimbabwe

 

a.  Honeypot:- Entangle a deception layer to detect attackers in your infrastructure

b.  Centralized monitoring and control: Device and application monitoring

c.  Anomaly at end-point:- Monitor file, process, memory, user account and network activity

d.  Anomaly in the network:- Monitor inbound and outbound traffic of the network

How to get it ? and What are the minimum requirements?

Contact us at c3i@cse.iitk.ac.in

Our Experience

Please see https://security.cse.iitk.ac.in/Annual-Report

a.  Observes the behavior and analyzes its properties in an isolated and confined environment. In depth analysis approaches like static, dynamic, memory forensics, image based as well as evading, etc.

How to get it ? and What are the minimum requirements?

Contact us at c3i@cse.iitk.ac.in

Our Experience

Please see https://security.cse.iitk.ac.in/Annual-Report

a.  Model, verify, and synthesize your systems and get a formal prove that the system is secure against all possible attacks (up to modeling assumptions)

b.  Compute the risk posed to individual node of your critical infrastructure due to existing vulnerabilities

How to get it ? and What are the minimum requirement?

Contact us at c3i@cse.iitk.ac.in

Our Experience

Please see https://security.cse.iitk.ac.in/Annual-Report

Team C3i organizes cyber security workshop, conference and hosts event like Capture the flag (SCADA CTF) and zero day initiatives related to

a.  Industrial control system

b.  Operational technologies

How to get it ? and What are the minimum requirement?

Contact us at c3i@cse.iitk.ac.in

Our Experience

Please see https://security.cse.iitk.ac.in/Annual-Report

This site is under Maintenance