ETI Microproject
ETI Microproject
EDUCATION – MUMBAI
Submitted by:
Guided by
Prof. S.B.Patil.
Head in Department of Information Technology
Academic Year 2023-24
CERTIFICATE
This is Certify that this report
Submitted by:
We take this opportunity to express our deepest sense of gratitude and sincere thanks to those who
have helped us in completing this task.
We express our sincere thanks to our guide Prof. S.B.Patil, Head in Department of Information
Technology, who has given us valuable suggestions, excellent guidance, continuous encouragement
and taken keen interest in the completion of this work. His kind assistance and constant inspiration
will always help us in our future also.
We thank Prof. S.B.Patil, Head of the Department of Information Technology,for the co-operation
and encouragement for collecting the information and preparation of data.
We are thankful to Principal Dr. R.S.Narkhede, for encouraging us to undertake this project and he
has taken keen interest in making the project and report absolutely flawless.
Credit goes to our friends, staff members of Department of Information Technology, and the Institute’s
Library for their help and timely assistance.
PART A – Plan
6th semester
The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.
• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.
• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.
6th semester
The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.
• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.
• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.
Need of Cyber security
Our world today is headed by technology and we can’t do without it at all. From booking our flight tickets to catching
up with an old friend, technology plays a crucial role in it. However, the same technology may expose you when it’s
vulnerable and could lead to the loss of essential data. Cyber security, alongside physical commercial security, has thus,
slowly and steadily, become one of the most essential topics in the business industry to be talked about Cyber security
is essential since it aids in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
Cyber security becomes necessary as Businesses are being carried out now on a Network of Networks. Computer
networks have always been the target of criminals, and it is likely that the danger of cyber security breaking will only rise
in the future as these networks grow, but there are reasonable precautions that organizations can take to minimize losses
from those who desire to do harm.
the property that information is not created available or revealed to unauthorized individuals, entities, or processes Confi-
dentiality refers to guarding information against being accessed by unauthorized parties. In other words, only the people
who are authorized to do so can achieve access to sensitive data. A failure to maintain confidentiality means that someone
who shouldn’t have access has managed to get it, through intentional behavior or by accident. Such a failure of confiden-
tiality is commonly known as a breach.
Integrity
the property of safeguarding the precision and completeness of assets Integrity refers to assuring the authenticity of
information—that information is not altered, and that the origin of the information is authentic. Imagine that you have
a website and you sell products on that site. Now imagine that an attacker can shop on your website and maliciously
alter the prices of your products so that they can buy anything for whatever price they decide. That would be a failure of
integrity because your data, in this case, the price of a product has been changed and you didn’t authorize this alteration.
Availability
The property of being obtainable and usable upon request by an authorized entity Availability means that data is accessible
by authorized users. Information and other necessary assets are accessible to customers and the business when required.
Note, that information is unavailable not only when it is lost or destroyed, but also when access to the information is
rejected or delayed.
Cyberattack
A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confi-
dential personal or organizational data
• Virus
• Hacker
• Malware
• Trojan horses
• Password cracking
1. Viruses and worms
• Virus - malware linked to a carrier such as an email message or a word processing document
• A Virus is a ”program that is crowded onto your a computer without your understanding and runs against
your desires
• Worm - malware can autonomously circulate itself without a carrier, using information about connected
computers.
2. Hackers
• In common a hacker is an individual who violates computers, usually by gaining access to administrative
controls.
Types of Hackers
The term ”white hat” in Internet slang refers to an ethical computer hacker, or a computer security professional, who
specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information
systems.
The term ”grey hat”, ”grey hat” or ”gray hat” refers to a computer hacker or computer security specialist who may
sometimes break laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
black hat hacker (or black-hat hacker) is a hacker who ”violates computer shield for little cause beyond maliciousness or
for personal gain”.
How To prevent hacking
It may be impossible to prevent computer hacking, however influential security controls including strong passwords, and
the use of firewalls can aid.
1. Malware
word ”malware” comes from the term ”MALicious softWARE.” Software that has some negative intent and which is
installed on a user’s computer without that user’s permission. Key loggers - Software installed on a computer that catches
keystrokes and sends these to a remote system. Accustomed to trying and getting personal data to achieve access to
sites such as banks. Ransomware- software that operates on a user’s computer and orders that the user pays some other
organization. If they don’t, the information on their computer will be ruined. Malware can usually circulate itself from
one computer to another either as a virus or as a worm.
To Stop Malware
2. Trojan Horses
Trojan horses are email viruses that can reproduce themselves, steal information, or harm the computer system. These
viruses are the heaviest threats to computers
• Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
3. Password Cracking
Password attacks are attacks by hackers that are capable to determine passwords or find passwords to different secure
electronic areas and social network sites.
Securing Password
Insider attacks
Attacks on an organization are carried out by individual who is inside that organization either by themselves or with the
connivance of an outsider. Difficult to oppose using technical processes as the insider may have proper credentials to
access the system.
External attacks
on an organization carried out by an external agent Need either accurate credentials or the exploitation of some vulnera-
bility to gain access to the systems.
Cybersecurity is most concerned with Cyberattacks and Cyber accidents - Accidental events that can generate loss or
damage to a person, business, or public body. Many of the same technologies utilized to protect against external attacks
also protect against cyber accidents. However, sometimes protecting against cyber-attacks raises the probability of cyber
accidents.
In this micro project, we know about the need for cyber security.
Note:-
Every Course teacher is expected to assign marks for group evaluation in first 3 Columns and individual evaluation in 4th
columns for each group of students as per rubrics.
Signature:-