0% found this document useful (0 votes)
35 views13 pages

ETI Microproject

This document discusses the need for cyber security. It begins by defining cyber security as the security of online infor- mation and services. Cyber security has become essential as more business and personal activities move online and rely on computer networks. There are three main objectives of cyber security: confidentiality, integrity, and availability of data and systems. Cyber security aims to protect against cyberattacks which can steal, alter or damage confidential information. Major cyber security problems include viruses and hackers that threaten confidentiality, integrity and availability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views13 pages

ETI Microproject

This document discusses the need for cyber security. It begins by defining cyber security as the security of online infor- mation and services. Cyber security has become essential as more business and personal activities move online and rely on computer networks. There are three main objectives of cyber security: confidentiality, integrity, and availability of data and systems. Cyber security aims to protect against cyberattacks which can steal, alter or damage confidential information. Major cyber security problems include viruses and hackers that threaten confidentiality, integrity and availability.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION – MUMBAI

A Micro Project Report On

“Need of Cyber security ”

Submitted by:

Mr. Vedant Jadhav(24)

Guided by
Prof. S.B.Patil.
Head in Department of Information Technology
Academic Year 2023-24

MET INSTITUTE OF TECHNOLOGY-POLYTECHNIC


BHUJBAL KNOWLEDGE CITY,
ADGAON, NASHIK
MET Institute of Technology-Polytechnic
Bhujbal Knowledge City,
Adgaon, Nashik-422 003
Tel. : ( 0253 ) 2303515, 2303267, 2303268 Telefax : ( 0253 ) 2303305,
2303203 Toll-free : 1800 22 0234
Email : principal [email protected]

CERTIFICATE
This is Certify that this report

“Need of Cyber security”

Submitted by:

Mr. Vedant Jadhav(24)

The students of Third year of Department Information Technology


In 2023-24
as a part of micro project work as prescribed by
The Maharashtra State Board of Technical Education, Mumbai
And that I have guided them for the said work from time to time
and I found them satisfactorily progressive.
And that, the said work has been assessed by me and I am satisfied that the same is up to
the standard envisaged for the level of the course.

Prof S.B.Patil Prof S.B.Patil Dr R.S.Narkhede


(Project Guide) Head of Department Principal
ACKNOWLEDGEMENTS

We take this opportunity to express our deepest sense of gratitude and sincere thanks to those who
have helped us in completing this task.
We express our sincere thanks to our guide Prof. S.B.Patil, Head in Department of Information
Technology, who has given us valuable suggestions, excellent guidance, continuous encouragement
and taken keen interest in the completion of this work. His kind assistance and constant inspiration
will always help us in our future also.
We thank Prof. S.B.Patil, Head of the Department of Information Technology,for the co-operation
and encouragement for collecting the information and preparation of data.
We are thankful to Principal Dr. R.S.Narkhede, for encouraging us to undertake this project and he
has taken keen interest in making the project and report absolutely flawless.
Credit goes to our friends, staff members of Department of Information Technology, and the Institute’s
Library for their help and timely assistance.
PART A – Plan

6th semester

1.0 Brief Introduction

The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.

2.0 Aims/Benefits of the Micro-Project

• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.

• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.

3.0 Course outcome addressed.

Detect Network, Operating systems, and application vulnerabilities.

4.0 Proposed methodology

In this project, we know about the need for cyber security.


5.0 Action Plan

Sr Details of activity Planned Start Planned Fin- Name of Responsible


No. Date ish Date Team Member
1 Selection of Micro project Vedant Jadhav
2 Research (Content and Images) Vedant Jadhav
3 Collection of data Vedant Jadhav
4 Compilation of the collected Data Vedant Jadhav
5 Formatting of the Document Vedant Jadhav
6 Analysed and Confirm the informa- Vedant Jadhav
tion by guide
7 Printing of the Final Project Vedant Jadhav
8 Submission of the Micro project Vedant Jadhav

6.0 Resources Required

Sr Name of Resource / Material Specifications Qty Remark


No.
1 Computer System Windows 11 01 -
2 Website https://www.allitebooks.in/the-internet-of- - -
things/
3 TextBook. Internet Of Things-A Hands-on Approach - -
PART B – Plan

6th semester

1.0 Brief Introduction

The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.

2.0Aims/Benefits of the Micro-Project

• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.

• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.
Need of Cyber security

Why Cybersecurity Is Important?:-

Our world today is headed by technology and we can’t do without it at all. From booking our flight tickets to catching
up with an old friend, technology plays a crucial role in it. However, the same technology may expose you when it’s
vulnerable and could lead to the loss of essential data. Cyber security, alongside physical commercial security, has thus,
slowly and steadily, become one of the most essential topics in the business industry to be talked about Cyber security
is essential since it aids in securing data from threats such as data theft or misuse, also safeguards your system from viruses.

Cyber security becomes necessary as Businesses are being carried out now on a Network of Networks. Computer
networks have always been the target of criminals, and it is likely that the danger of cyber security breaking will only rise
in the future as these networks grow, but there are reasonable precautions that organizations can take to minimize losses
from those who desire to do harm.

Cyber Security Objectives.

Fig. of Cyber Security Objectives.


Confidentiality.

the property that information is not created available or revealed to unauthorized individuals, entities, or processes Confi-
dentiality refers to guarding information against being accessed by unauthorized parties. In other words, only the people
who are authorized to do so can achieve access to sensitive data. A failure to maintain confidentiality means that someone
who shouldn’t have access has managed to get it, through intentional behavior or by accident. Such a failure of confiden-
tiality is commonly known as a breach.

Integrity

the property of safeguarding the precision and completeness of assets Integrity refers to assuring the authenticity of
information—that information is not altered, and that the origin of the information is authentic. Imagine that you have
a website and you sell products on that site. Now imagine that an attacker can shop on your website and maliciously
alter the prices of your products so that they can buy anything for whatever price they decide. That would be a failure of
integrity because your data, in this case, the price of a product has been changed and you didn’t authorize this alteration.

Availability

The property of being obtainable and usable upon request by an authorized entity Availability means that data is accessible
by authorized users. Information and other necessary assets are accessible to customers and the business when required.
Note, that information is unavailable not only when it is lost or destroyed, but also when access to the information is
rejected or delayed.

Cyberattack

A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confi-
dential personal or organizational data

Major security problems

• Virus

• Hacker

• Malware

• Trojan horses

• Password cracking
1. Viruses and worms

• Virus - malware linked to a carrier such as an email message or a word processing document

• A Virus is a ”program that is crowded onto your a computer without your understanding and runs against
your desires

• Worm - malware can autonomously circulate itself without a carrier, using information about connected
computers.

2. Hackers

• In common a hacker is an individual who violates computers, usually by gaining access to administrative
controls.

Types of Hackers

• White Hat Hacker

• Grey Hat Hacker

• Black Hat Hacker

a. White Hat Hackers

The term ”white hat” in Internet slang refers to an ethical computer hacker, or a computer security professional, who
specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information
systems.

b. Grey Hat Hackers

The term ”grey hat”, ”grey hat” or ”gray hat” refers to a computer hacker or computer security specialist who may
sometimes break laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

c. Black Hat Hackers

black hat hacker (or black-hat hacker) is a hacker who ”violates computer shield for little cause beyond maliciousness or
for personal gain”.
How To prevent hacking

It may be impossible to prevent computer hacking, however influential security controls including strong passwords, and
the use of firewalls can aid.

1. Malware

word ”malware” comes from the term ”MALicious softWARE.” Software that has some negative intent and which is
installed on a user’s computer without that user’s permission. Key loggers - Software installed on a computer that catches
keystrokes and sends these to a remote system. Accustomed to trying and getting personal data to achieve access to
sites such as banks. Ransomware- software that operates on a user’s computer and orders that the user pays some other
organization. If they don’t, the information on their computer will be ruined. Malware can usually circulate itself from
one computer to another either as a virus or as a worm.

To Stop Malware

• Download an anti-malware program that also helps stop infections.

• Do not download from anonymous sources

• Activate Network Threat Protection,

2. Trojan Horses

Trojan horses are email viruses that can reproduce themselves, steal information, or harm the computer system. These
viruses are the heaviest threats to computers

How to Avoid Trojans

• Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.

• Do not click unknown links.

3. Password Cracking

Password attacks are attacks by hackers that are capable to determine passwords or find passwords to different secure
electronic areas and social network sites.
Securing Password

• Use always a Strong password.

• Never use the exact password for two different sites.

Insider attacks

Attacks on an organization are carried out by individual who is inside that organization either by themselves or with the
connivance of an outsider. Difficult to oppose using technical processes as the insider may have proper credentials to
access the system.

External attacks

on an organization carried out by an external agent Need either accurate credentials or the exploitation of some vulnera-
bility to gain access to the systems.

Malicious and accidental damage

Cybersecurity is most concerned with Cyberattacks and Cyber accidents - Accidental events that can generate loss or
damage to a person, business, or public body. Many of the same technologies utilized to protect against external attacks
also protect against cyber accidents. However, sometimes protecting against cyber-attacks raises the probability of cyber
accidents.

4.0 Outputs of the Micro-Project

In this micro project, we know about the need for cyber security.

5.0 Skill Developed / Learning outcomes of this Micro-Project

• Develop group discussion skills.

• Communication skills improved.

• MS WORD skills developed.

• basic cyber security prevention skills.


Teacher Evaluation Sheet

Name of Student : Vedant Deepak Jadhav. Enrollment No : 2107760303


Name of Program : Information Technology Semester : VI
Course Title : ETI Code : 22618
Title of the Micro-Project : Need of Cyber security.

Course Outcomes Achieved:-

• Describe Ethical Hacking Process.

Evaluation as per Suggested Rubric for Assessment of Micro Project

Sr Characteristic to be assessed Poor (Marks Average Good (Marks Excellent


No. 1-3) (Marks 4-5) 6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey / Information Col-
lection
3 Project Proposal
4 Completion of the Target as per
project proposal
5 Analysis of Data and representation
6 Quality of Prototype/Model
7 Report Preparation
8 Presentation
9 Defence
Micro-Project Evaluation Sheet

Note:-
Every Course teacher is expected to assign marks for group evaluation in first 3 Columns and individual evaluation in 4th
columns for each group of students as per rubrics.

Comments/Suggestion about team work/leadership/inter-personal communication (if any):-


.......................................................................................................................................................................................
.......................................................................................................................................................................................

Any other Comments:-


.......................................................................................................................................................................................
.......................................................................................................................................................................................

Name and designation of Faculty Member


Prof.S.B.Patil.

Signature:-

You might also like