You are on page 1of 2

Statement for "Security of data handled through IT systems"

{Ref: Railway Board letter No. 2010/RBCC/7/7/Cyber Security dt. 08.10.10}


S.No ITEMS DETAILS
1.0 DEPARTMENT Vigilance
2.0 Name of the Application Vigilance Software System (VSS)
2.1 Brief Description of the Application
Registration of Preventive checks, complaints, decoy checks, CVC and CBI
cases, UPSC, CAIII references, monitoring of these checks atvarious stages,
preparing stastical information to various authorities as well as providing
necessary services to other departments like issue of NOC in time, vigilance
clearance itc.
3.0 Architecture
3.1 Web-enabled(3-Tier) OR Client-
Server (2-Tier). If Web-enabled Client-Server (2-Tier)
then 3.1 to 3.3 below
3.2 Ownership of Hosting Server
3.3 Location of Hosting Server N/A
3.4 Web-enabling Software
4.0 DATABASE SERVER
4.1 Description Compaq Proliant ML 350
4.2 Owned By Vigilance Branch/ S.C.Rly
4.3 Location Vig. Dept., III floor, Rail Nilayam, Secunderabad
4.4 Operating System:
Windown server 2003
UNIX(Linux/Solaris) or Windows etc
4.5 Platform: D2K/J2EE/.Net etc D2K
5.0 APPLICATION SERVER
5.1 Description No separate Application Server
5.2 Owned By ---
5.3 Location
Operating System: ---
5.4 UNIX(Linux/Solaris) or Windows etc ---
5.5 Platform: D2K/J2EE/.Net/VB etc ---
6.0 DETAILS OF SECURITY SOLUTION
6.1 Access control mechanisms like
Passwords
Passwords, Biometric systems, etc
6.2 Database Administration, Back up &
Available (inbuilt VSS software)
Restore Mechanisms
6.3
Disaster Recovery arrangements. N/A
6.4 Intrusion detection & prevention
policies viz. Anti Virus Software, Antivirus only available
Firewalls etc.
6.5 Third party tools for Database
modifications from backend. Eg. SQL Navigator 3
SQL Navigator.
7.0 AGENCY CARRYING OUT MAINTENANCE OF THE FOLL
7.1 Hardware N/A
7.2 Database Software CRIS
7.3 Application Software CRIS
7.4 Network Elements Maintained by Vigilance Department/SCRly

Note: (1) It may kindly be ensured that Application Software proposed and/ or those under development/testing etc are also
included. (2) Standalone programs/Modules accessing these Databased may also be advised as an addendum (overleaf)
CVC and CBI
arious stages,
as providing
time, vigilance

g etc are also


m (overleaf)

You might also like