Wipro flies away with Rs 900-cr IAF deal

AVERAGE INDIAN

EXORCIST
Senior Member
Joined
Sep 22, 2012
Messages
3,326
Likes
5,408
Country flag


MUMBAI, NOV. 7:
The Indian Air Force has dished out an over Rs 900-crore contract to software services company Wipro to electronically monitor and automate the management of its fleet, said Air Marshal P. Kanakaraj, Air Officer Commanding-in-Chief, Maintenance Command.

"As part of this project, all maintenance activities done on our aircraft will be electronically captured. It is a dashboard sort of system which will replace the old system of manual logbooks. The endeavour is to go completely paperless," Kanakaraj told Business Line.

The multi-year project — e-Maintenance Management System— will help the IAF quickly mobilise its fleet in case of a war-like situation, said Kanakaraj, who was here on Thursday.

With this project, the IAF intends to set up an enterprise-wide, online maintenance management system which will be Web-based. This will cover aspects such as configuration management, fleet planning and management, maintenance repair and overhaul.

"The Air Force has also earmarked two locations for the system, one of which will serve as the disaster recovery centre for the system," said Kanakaraj. The project will help reduce overall costs for the Air Force by increasing 'accuracy of information, speed of information and reduction of manpower deployed', he said.

A source said Tata Consultancy Services, its subsidiary CMC, and a host of other companies were in the race for the deal.

In fact, the entire project, the request for proposal for which was first floated in 2008, has been delayed numerous times.

Wipro officials were not available for comment.

Alok Shende, Principal Analyst and Director of Ascentius Consulting, said: "A whole new wave of investments started happening in the Indian defence ecosystem four-five years ago. In anticipation of what was happening, a lot of Indian vendors started looking at defence as a serious opportunity, and that is now bearing fruit for Wipro," Shende added.

According to details in the request for proposal, in the first phase, the new system will be implemented in key locations before being gradually rolled out to 170 locations, covering about 550 units of the IAF.

Wipro flies away with Rs 900-cr IAF deal | Business Line
 

ninja85

Regular Member
Joined
Oct 17, 2013
Messages
830
Likes
353
They will have to design a robust security system, since our brothers across the borders are very adept at hacking into high security systems and stealing data.
are you kidding me, pakibeggars capability is just only to hack websites of the local tv channels like jaya tv and corrupt congress websites for which corrupt congress is more than happy that a muslim hacking their websites not hindus. :laugh:
 

drkrn

Senior Member
Joined
Apr 15, 2010
Messages
2,455
Likes
902
Indian Software companies should also start making algorithms for advanced missile seekers. All big companies in India should invest in the field of semiconductors and other import-related products. This will reduce our dependence on expensive imports from foreign countries.
we already do that
 

Abhijeet Dey

Senior Member
Joined
May 6, 2013
Messages
1,727
Likes
2,442
Country flag
we already do that
In that case I hope in future indian companies such as Micromax, iball & simoco should stop importing semiconductor devices from China. Our semiconductor industry should be comparable to countries such as US, Japan & South Korea. Future defence technologies will be based on nanotechnology & electronics.

Semiconductor sales leaders by year
LINK:
en.wikipedia.org/wiki/Semiconductor_sales_leaders_by_year

Indian imports from China especially in electronics is eating away our Current Account Deficit or CAD which must be stopped at all costs.
 
Last edited:

drkrn

Senior Member
Joined
Apr 15, 2010
Messages
2,455
Likes
902
In that case I hope in future indian companies such as Micromax, iball & simoco should stop importing semiconductor devices from China. Our semiconductor industry should be comparable to countries such as US, Japan & South Korea. Future defence technologies will be based on nanotechnology & electronics.

Semiconductor sales leaders by year
LINK:
en.wikipedia.org/wiki/Semiconductor_sales_leaders_by_year

Indian imports from China especially in electronics is eating away our Current Account Deficit or CAD which must be stopped at all costs.
micromax imports from taiwan republic.semi conductor industry in usa is almost dead
 

sob

Mod
Joined
May 4, 2009
Messages
6,425
Likes
3,805
Country flag
are you kidding me, pakibeggars capability is just only to hack websites of the local tv channels like jaya tv and corrupt congress websites for which corrupt congress is more than happy that a muslim hacking their websites not hindus. :laugh:
It is the Chinese that I was pointing at.
 

kseeker

Retired
New Member
Joined
Jul 24, 2013
Messages
2,515
Likes
2,126
Hope this would be a "web like" interface and not "web based". I mean, it should operate in a secure WAN which is physically disconnected from the web.
Being a IT manager, I can tell you that, it would be a web based system (looking at the current IT trends) however, application would be available only in INTRANET. Sensitive web applications are never published on the INTERNET.

Even to connect different sites over internet, site-site VPN tunnels would be used which are quite secure or very difficult to penetrate.

If at all, there would be any need for publishing intranet applications over internet, the application servers are placed in the network DMZ (not to be related with military DMZ). The servers placed in the DMZ are usually hardened to prevent any hacks. If at all, servers placed in the DMZ goes down due to attack, it would not impact servers which are operating in the INTRANET. Databases are never placed in the DMZ to prevent any data compromise, only front end server are.

To give an example, Servers placed in the DMZ are accessible from both INTRANET and EXTRANET ( most of the time only EXTRANET access is allowed). there will be a one way communication established from INTRANET to DMZ i.e. one can access DMZ servers from the INTRANET however, DMZ servers cannot directly access INTRANET.

Usually, adequate measures would be taken to tackle any unforeseen attacks by using devices like IPS, IDS and multi layered network firewalls.


^^^
Confusing ? feel free to ask questions :)
 
Last edited:

arnabmit

Homo Communis Indus
Senior Member
Joined
Dec 25, 2012
Messages
6,242
Likes
7,522
Country flag
Not talking about simple SQL Injections or Rootkit coruption or RAT installation techniques, or even DOS attacks. There is only so much protection any commercial product can provide. Even with customized 1024bit randomized encryption, the biggest security flaw still remains the human element. Nothing can guarantee foolproof security against determined attacks.

Only solution is to keep a network physically separated from the publicly accessible network.

Being a IT manager, I can tell you that, it would be a web based system (looking at the current IT trends) however, application would be available only in INTRANET. Sensitive web applications are never published on the INTERNET.

Even to connect different sites over internet, site-site VPN tunnels would be used which are quite secure or very difficult to penetrate.

If at all, there would be any need for publishing intranet applications over internet, the application servers are placed in the network DMZ (not to be related with military DMZ). The servers placed in the DMZ are usually hardened to prevent any hacks. If at all, servers placed in the DMZ goes down due to attack, it would not impact servers which are operating in the INTRANET. Databases are never placed in the DMZ to prevent any data compromise, only front end server are.

To give an example, Servers placed in the DMZ are accessible from both INTRANET and EXTRANET ( most of the time only EXTRANET access is allowed). there will be a one way communication established from INTRANET to DMZ i.e. one can access DMZ servers from the INTRANET however, DMZ servers cannot directly access INTRANET.

Usually, adequate measures would be taken to tackle any unforeseen attacks by using devices like IPS, IDS and multi layered network firewalls.


^^^
Confusing ? feel free to ask questions :)
 

aerokan

Senior Member
Joined
Nov 20, 2011
Messages
1,024
Likes
817
Country flag
In security circles, it is said that whenever a rocket launch happens.. there will be numerous hackers crawling in the systems but couldn't get a wind of the actual systems because they are not connected to the network :thumb: But since in this project, they have to make it operational across the country, there is not much anybody can do about it. The weakest link will always be the human element. All one needs to do is to put knife on a operator's neck and you can inject whatever worms in the INTRANET. Yes, ofcourse there will be lot of security measures to disable data injections from anywhere possible.

OTOH, for the last 10 years, I have been hell bent on this distributed encryption/workload-sharing schematics which not only enhances the security but also distributes the work load for all the govt. services improving availability. An attack on this kind of system can only done by govts with huge resources and if anyone attacks, it will be a glaring proof of our next door neighbour's involvement. But then again, all those awesome ideas are useless from a lazy person who has to work alone. :rolleyes:
 

kseeker

Retired
New Member
Joined
Jul 24, 2013
Messages
2,515
Likes
2,126
the biggest security flaw still remains the human element. Nothing can guarantee foolproof security against determined attacks.

Only solution is to keep a network physically separated from the publicly accessible network.
I agree with you.
 

kseeker

Retired
New Member
Joined
Jul 24, 2013
Messages
2,515
Likes
2,126
In security circles, it is said that whenever a rocket launch happens.. there will be numerous hackers crawling in the systems but couldn't get a wind of the actual systems because they are not connected to the network :thumb: But since in this project, they have to make it operational across the country, there is not much anybody can do about it. The weakest link will always be the human element. All one needs to do is to put knife on a operator's neck and you can inject whatever worms in the INTRANET. Yes, ofcourse there will be lot of security measures to disable data injections from anywhere possible.

OTOH, for the last 10 years, I have been hell bent on this distributed encryption/workload-sharing schematics which not only enhances the security but also distributes the work load for all the govt. services improving availability. An attack on this kind of system can only done by govts with huge resources and if anyone attacks, it will be a glaring proof of our next door neighbour's involvement. But then again, all those awesome ideas are useless from a lazy person who has to work alone. :rolleyes:
Couldn't agree more this !
 

rugved

Regular Member
Joined
Oct 24, 2013
Messages
290
Likes
155
Being a IT manager, I can tell you that, it would be a web based system (looking at the current IT trends) however, application would be available only in INTRANET. Sensitive web applications are never published on the INTERNET.

Even to connect different sites over internet, site-site VPN tunnels would be used which are quite secure or very difficult to penetrate.

If at all, there would be any need for publishing intranet applications over internet, the application servers are placed in the network DMZ (not to be related with military DMZ). The servers placed in the DMZ are usually hardened to prevent any hacks. If at all, servers placed in the DMZ goes down due to attack, it would not impact servers which are operating in the INTRANET. Databases are never placed in the DMZ to prevent any data compromise, only front end server are.

To give an example, Servers placed in the DMZ are accessible from both INTRANET and EXTRANET ( most of the time only EXTRANET access is allowed). there will be a one way communication established from INTRANET to DMZ i.e. one can access DMZ servers from the INTRANET however, DMZ servers cannot directly access INTRANET.

Usually, adequate measures would be taken to tackle any unforeseen attacks by using devices like IPS, IDS and multi layered network firewalls.


^^^
Confusing ? feel free to ask questions :)
So are you saying that the only way to protect the DMZ server from our adversary country's hackers is to deploy the server on an Intranet and then create VPN tunnels to access them from the internet (outside world)?
 

kseeker

Retired
New Member
Joined
Jul 24, 2013
Messages
2,515
Likes
2,126
So are you saying that the only way to protect the DMZ server from our adversary country's hackers is to deploy the server on an Intranet and then create VPN tunnels to access them from the internet (outside world)?
That's correct. Minimum or limited exposure to internet, minimum would be the attack surface.
 

Latest Replies

Global Defence

New threads

Articles

Top