{"id":3,"date":"2015-07-24T05:45:10","date_gmt":"2015-07-24T05:45:10","guid":{"rendered":"http:\/\/www.techandtrain.in\/blog\/?p=3"},"modified":"2025-10-22T14:57:30","modified_gmt":"2025-10-22T09:27:30","slug":"open-source-security-platform-for-security-of-physical-installations","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2015\/07\/open-source-security-platform-for-security-of-physical-installations\/","title":{"rendered":"Open source security platform for security of physical installations"},"content":{"rendered":"<p>I hope to publish my thoughts on innovation around software on this blog. Starting off with my first post.<\/p>\n<p>We live in a world where security has now evolved from physical to cyber to multiple levels and context. Open source software has been a revolution which now is reaching us at all levels: Mobile (Android), Enterprise software (Liferay, Alfresco, Hadoop, MongoDB, etc.)&nbsp;and it caters to security in a holistic way by allowing people\/groups to pick holes in the systems and thus, giving opportunity to authorities to fix them in the background and allow improvements.<\/p>\n<p>Similarly we can device a system based on open source principles for security of physical \/ real world&nbsp;installations&nbsp;via an open source and collaborative platform<\/p>\n<p>We could create an open source platform on one of the open source support sites like SourceForge<\/p>\n<p>Pillars of platforms around which it should be built (these also give the high level classification of collaboration):<\/p>\n<p>1. Assets<br \/>\n2. Threats<br \/>\n3. Defenses<br \/>\n4. Strategy<\/p>\n<p>Assets: 1. Threat level based classification based on location, work done by asset, importance<\/p>\n<p>Threats: 1. Physical, 2. Cyber 3. Design 4. Evolving and future<\/p>\n<p>Defenses: 1. Explicit, 2. Implicit 3. Mixed<\/p>\n<p>Strategy: 1. Offensive, 2. Defensive, 3. Mixed<\/p>\n<p>People can come and post installations (Assets), then debate\/discuss issues (Threats), find and suggest solutions (Defenses) and based on these three suggest overall Strategy to mitigate risks<\/p>\n<p>See you later with another innovation thought in few days<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I hope to publish my thoughts on innovation around software on this blog. Starting off with my first post. We [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,2,3],"tags":[5,8,6,9,7,10],"class_list":["post-3","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-open-source","category-security","category-software","tag-installation-security","tag-open-source","tag-physical-security","tag-security","tag-software","tag-sourceforge-net"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/07\/Security3.jpg?fit=1920%2C1280&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-3","jetpack-related-posts":[{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":3,"position":0},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":3,"position":1},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1199,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/01\/differences-between-sast-and-dast-bard-generated\/","url_meta":{"origin":3,"position":2},"title":"Differences between SAST and DAST &#8211; BARD Generated","author":"Neil Harwani","date":"January 14, 2024","format":false,"excerpt":"SAST and DAST: Two Key Players in Application Security When it comes to protecting your software from malicious actors, you need a solid security strategy. Two crucial techniques in this arsenal are Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Let's break down what each does and\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1394,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/01\/information-technology-security-ecosystem-part-1\/","url_meta":{"origin":3,"position":3},"title":"Information Technology Security Ecosystem &#8211; Part 1","author":"Neil Harwani","date":"January 2, 2025","format":false,"excerpt":"While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with some relevant links - so here it goes. Here are some important layers for the same: Physical security Hardware security Network security Endpoint security Application security Data security Identity and\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1200%2C559&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1200%2C559&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1200%2C559&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1200%2C559&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1200%2C559&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":44,"url":"https:\/\/www.techandtrain.com\/blog\/2015\/11\/software-innovation-around-physical-profile-of-a-person\/","url_meta":{"origin":3,"position":4},"title":"Software innovation around physical profile of a person","author":"Neil Harwani","date":"November 18, 2015","format":false,"excerpt":"With so many IoT, mobile, computer, industrial, etc. sensors around us and the number only increasing on daily basis there could be innovative things we could do to solve some of the big problems we face today. There are law and order problems around missing people, criminals, fugitives, finding people\u2026","rel":"","context":"In &quot;Disaster relief&quot;","block_context":{"text":"Disaster relief","link":"https:\/\/www.techandtrain.com\/blog\/category\/disaster-relief\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2015\/11\/Profile.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":93,"url":"https:\/\/www.techandtrain.com\/blog\/2016\/06\/how-to-build-a-home-security-system-while-at-home\/","url_meta":{"origin":3,"position":5},"title":"How to build a security system &#8220;while at home&#8221;?","author":"Neil Harwani","date":"June 18, 2016","format":false,"excerpt":"Take Google Science Project app Take Arduino open source electronics kit Take Rasberry Pi kit Few Android phones Your ingredients are ready Install Google Science Project app on all Android phones. Take Arduino kit and connect it to few cameras. Take Android phones and use them as motion sensors via\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/06\/StreetSigns.png?fit=1200%2C851&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/06\/StreetSigns.png?fit=1200%2C851&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/06\/StreetSigns.png?fit=1200%2C851&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/06\/StreetSigns.png?fit=1200%2C851&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2016\/06\/StreetSigns.png?fit=1200%2C851&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":6,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/3\/revisions"}],"predecessor-version":[{"id":882,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/3\/revisions\/882"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/243"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=3"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=3"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}