Sei sulla pagina 1di 36

IT INFRASTRUCTURE AT JSPL

Jan, 2014
June 2011

IT Infrastructure

Agenda

Objective Scope IT Infrastructure Software, Hardware and Network Detail

IT Support
Information Security Policy

June 2011

IT Infrastructure

Objective

The objective of the session is to have an awareness and a better understanding of the IT Infrastructure and

Information Security Policy among Punj Lloyd users.

June 2011

IT Infrastructure

Scope
It applies to all employees, contractors, consultants

and temporary staff at JSPL Group.

All are expected to be familiar with Infrastructure setup

and comply with the Information Security Policies.

June 2011

IT Infrastructure

Infrastructure Setup at JSPL - History

LAN in 1982

WAN set-up in 1995.


ERP implementation in Jan, 1997

June 2011

IT Infrastructure

IT Infrastructure - Snapshot

June 2011

IT Infrastructure

WAN Connectivity

June 2011

IT Infrastructure

IT Infrastructure Controls

Well defined IT and Information Security Policy Enterprise Security Solution deployed for Anti Virus & Web Content filtering Highly secure encrypted connectivity between Project offices over VPN. VSAT connectivity for various project offices

Dedicated staff for regular monitoring and audit for IT Controls

June 2011

IT Infrastructure

Network Connectivity At Site Offices


VSAT links are used to connect out locations. There are 10 DAMA and 30 TDMA locations connected to HO.

Delhi Internal network

Head Quarters

Checkpoint Express

MIDDLE EAST INTERNATIONAL INTERNET

OFC Link between Corporate office at Gurgaon and Nehru Place


9 Mbps Internet link at Gurgaon corporate office All Mobile users can access their Mails and Oracle Apps. via Web.

WLL LINKS 1 MBPS

DLINK INTERNET SECURITY FIREWALL 48 PORT switch Network USERS

VOIP connectivity.

June 2011

IT Infrastructure

Software
Proxy
ISA

Office Automation
MS Office 2003 Open Office 3.0, 3.1 Lotus Smart Suite ver 9.6 Adobe Acrobat

Messaging
Lotus Notes R7 Server Lotus Notes R7 clients

Firewall
Checkpoint

Backup and Disaster Recovery


Arcserver V11

Anti Virus
McAfee 4.0.3 Trend Scan Mail ver 2.5

Project Management
Primavera Enterprise ver 2.0B and 3e

URL Filtering
Super Scout ver 3.0.3.1from Surf Control

Anti Spam Mail s/w


Ironport

June 2011

IT Infrastructure

Software Cont
ERP Oracle Apps 11.5.10.2 (11i)
Database Oracle 10g Oracle Forms Developer Oracle Reports Developer

Bandwidth Monitoring MRTG

June 2011

IT Infrastructure

Oracle ERP Module Financial Management


Accounts Payables, General Ledger, Fixed Asset, Account Receivables, Cash Management

Material Management
PO Module, Inventory Module

Equipment Management
Enterprise Asset Management

HR Management
Core HR, Self Service

Project Management
Oracle Project Accounting

June 2011

IT Infrastructure

Software Policy

Software Procurement would be through IT Department Only authorised and licensed software's are allowed JSPL has global contract for all the licenses Dedicated staff to monitor the s/w compliance

Usage of Software Assessment Tool.


All unauthorised software will be purged from the hardware. Encouraging usage of Openoffice

June 2011

IT Infrastructure

Engineering Software
AutoCAD 2002, 2005, 2006, 2007
STAAD Pro 2006 PDMS - Plant Design Software ver 11.5

Pipenet - Fire fighting system design Software


Tank ver 2.20 Tank Design Software as per API 650 PVElite Pressure Vessel Design software

ETAP Electrical Design Software


Ceaser II Off Pipe

I- Sketch
June 2011

IT Infrastructure

Hardware
Desktops (PIV of HP, IBM, Compaq) Laptops (Toshiba, HP, Sony)

Servers (IBM, Sun, HP)


Routers (Cisco 2500 and 2600 series) Plotters - ( HP A0 Size) Scanners - ( Bell & Howel, HP, Toshiba, Cannon ) Printers - ( HP, Canon, Toshiba, A3, A4, DTNs ) UPS - ( ranging from 3 KVa to 60 KVa )
June 2011

IT Infrastructure

Hardware Policy

All Hardware procured is standardised across JSPL Group. All DT / LT procured would be retained for the period of 4 Years. Global tie-up with HP for the hardware procurement.

June 2011

IT Infrastructure

Skilled IT professional at both JSPL and Site locations. ERP footprint deployed at all major sites. Central management of all software licenses. All Employees are provided access to Mailing System. Effective use of File Server for the department/ project team . Must check for mails issued from ITDesk@JSPL.com

IT Support At JSPL & Project Sites

All JSPLs resources, information and data must be used for business purposes.
JSPL FTP Server available for sharing information across site locations. Logging a call with helpdesk (hdesk@JSPL.com) for any IT related issues. Established escalation matrices. Report Security Incident at SIRT@JSPL.com .

June 2011

IT Infrastructure

Information Security Policy


Why is it important to me ?

You are the critical link in protecting the JSPL information assets

You must understand the importance and criticality of protecting the

information

You determine how effective is the Information Security

June 2011

IT Infrastructure

The CIA Triad

Confidentiality

Availability

Integrity

Confidentiality : To prevent unauthorized disclosure of information stored or processed on JSPLs information systems Examples include: Protecting operational data

June 2011

IT Infrastructure

Confidentiality

Availability

Integrity

Integrity :

To prevent accidental or unauthorized/deliberate alteration of information. Examples include: Ensuring that the sensitive data isnt modified by an unauthorized party
June 2011

IT Infrastructure

Confidentiality

Availability

Integrity

Availability :

To prevent accidental or unauthorized/deliberate destruction or deletion of information necessary to JSPLs operations on a 24X7 basis. It relates to ensuring that data is accessible.

Examples include:
Ensuring that critical servers are available to customers

June 2011

IT Infrastructure

What could happen


Internal Incidents Survey Results Installation/use of unauthorized software Viruses/malicious code Infection

Improper Internet Usage


(porn surfing, e-mail harassment)

Abuse of computer access controls Installation/use of unauthorized hardware Illegal Use of company computing resources
(gambling, managing personal e-commerce site, online investing)

Physical theft/sabotage
(intentional destruction of computing equipment)

Electronic theft/sabotage
(intentional destruction/disclosure of proprietary data or information)

Fraud
June 2011

IT Infrastructure

What can you do ?


Must read IT & Information Security Policy hosted in Intranet Seek and clarify your contribution to JSPLs security standards

As an employee, respect JSPL's information assets, resources


Protect sensitive information Not accept norms that conflict with JSPL values and beliefs

June 2011

IT Infrastructure

What you cannot do ?


Actively study information one has gained access to by mistake. Spread information that can in some way hurt others/ business. Make private statements or publish private material in the name of JSPL Work in any way, non-compliant with the Values of the Organization.

June 2011

IT Infrastructure

Key areas to focus


User id & password
Email Usage Laptop/Desktop Security Computer Media Internet Usage Backup

Some other Best Practices


Management directives

June 2011

IT Infrastructure

User ID and Password


The User ids are unique to each employee and it will be the responsibility of every employee to maintain the confidentiality of his / her user id and password Shared user ids should be brought to the notice of HOD and have the same

recorded with ISD


Dos Change your passwords frequently Don'ts Share or disclose your passwords

(at least once in 45 days).


Change your password(s) promptly that has been compromised or suspected of being compromised.

Write down your passwords


Use any password saving features

Create complex log-in passwords


using both alphanumeric and special characters

June 2011

IT Infrastructure

Email Usage
Dos Use the e-mail for official purposes only Be careful what you say in an email. It can and will be forwarded. Be careful when replying to mailing Don'ts Transmit or store offensive maternal. Transmit information assets of JSPL to unofficial mails ids

Forward chain mails or any mails that are


non value add to the organization. Also reply mail with attachment received Use the email for sending attachments

list messages, or to messages sent


to many recipients.

larger than 5 MBs


Use secondary email engines (Yahoo Mail, AOL, Hotmail etc) for official purposes

June 2011

IT Infrastructure

June 2011

IT Infrastructure

Laptop/Desktop Security
Dos

Don'ts
Ensure that your machines have complex login' password Share folders or disk drives Download or install freeware, shareware or any other such software or application Leave your laptop unattended

Make sure that you install only legally licensed software on your PC or laptop issued by ISD

Data that needs to be shared should be transferred to the designated

shared folder's on the file server

June 2011

IT Infrastructure

Computer Media
Dos Store media that contains sensitive or confidential information in a safe and secure environment Erase the contents of any re-usable media by reformatting or deleting before handing over to the third party or vendor Don'ts Carry any media such as CDs, DVDs out of JSPL premises without clearance of ISD Carry and use any personal media like tapes, disks, CDs, USB pen drives in the office premise

June 2011

IT Infrastructure

June 2011

IT Infrastructure

Internet Usage
Dos
Use the Internet for official and authorised purposes only Adhere to JSPLs policies while accessing the Internet from an JSPL owned computer/ laptop

Don'ts
Access the Internet directly from office network using modems or other private connections unless specifically approved Install freeware, shareware / trial version software and obscene written or pornographic material available on the Internet

Upload official data on to mass storage sites and public FTP Servers

June 2011

IT Infrastructure

Backup of Information
Employees should ensure critical official data backup by effectively using the File Servers Comprehensive Back-up all the files that you own and don't forget to backup your email inbox in the

designated directories / folders.


Timely Back up all of your important files before your computer is repaired or has any major hardware or software upgrades.

Regular
Back up files according to a regular schedule.

June 2011

IT Infrastructure

OUR Responsibilities . . .
Ensuring that WE are aware of, and understand, the security
requirements of JSPL Complying with the do's and don'ts propagated by ISD. Check for mails issued from ITDesk@JSPL.com Ensuring that JSPLs resources, information and data are used for business purposes. Using information systems only as appropriate for ones job

responsibilities Reporting security incidents immediately to SIRT@JSPL.com

June 2011

IT Infrastructure

Conclusion

Comply to JSPL Security Policies


Must Read IT & Information Security Policy

The SUCCESS of the JSPLs Security Program

DEPENDS ON YOU!
June 2011

Thank You

June 2011

Potrebbero piacerti anche