0% found this document useful (0 votes)
617 views21 pages

Microproject NIS Incomp

This document is a certificate from the Maharashtra State Board of Technical Education certifying that students have completed a micro-project on the topic of network information and security. The certificate contains the students' names, roll numbers, institute name, subject of the project, and signatures of the subject teacher, head of department, and principal. It also contains acknowledgments from the students thanking their project guide for guidance throughout the project. The document provides an abstract summarizing the project as developing a bank management application to investigate network information and security topics. It includes an index of sections to be covered in the full project report.

Uploaded by

Shivam Jawarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
617 views21 pages

Microproject NIS Incomp

This document is a certificate from the Maharashtra State Board of Technical Education certifying that students have completed a micro-project on the topic of network information and security. The certificate contains the students' names, roll numbers, institute name, subject of the project, and signatures of the subject teacher, head of department, and principal. It also contains acknowledgments from the students thanking their project guide for guidance throughout the project. The document provides an abstract summarizing the project as developing a bank management application to investigate network information and security topics. It includes an index of sections to be covered in the full project report.

Uploaded by

Shivam Jawarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

MANAV SCHOOL OF POLYTECHNIC VYALA,

AKOLA

DEPARTMENT OF POLYTECHNIC COMPUTER

AcademicYear2023-24

Semester VI

Network Information &


Security

Submitted To M.S.B.T.E. In Partial Fulfilment of the Requirement for


the Diploma in Computer Engineering.

Projection:- COMPUTING SECURITY

Submitted By
Mr. Shivam Pandhari Jawarkar
Mr. Mohammed Jawwad Baig
Mr. Mohammad Umair

Project Guide-Prof. Sonal S. Dongre

1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION CERTIFICATE

This is to certify that Mr./Ms.…………………………………………...................... Roll

No………,of Sixth Semester of Diploma in…………………………......……………………….

………………………………….of Institute,……………………………………………………..……………

…………………………………… (Code:………….) has completed the Micro-Project


satisfactorily in Subject Network Information & Security ( ) for the academic
year 2023 to2024 as prescribed in the curriculum.

Place:……………………………… Enrolment No:…………………………….

Date:………………………………. Exam Seat No:……………………………..

Subject Teacher Head of the Department Principal

2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION CERTIFICATE

This is to certify that Mr./Ms.…………………………………………...................... Roll

No………,of Sixth Semester of Diploma in…………………………......……………………….

………………………………….of Institute,……………………………………………………..……………

…………………………………… (Code:………….) has completed the Micro-Project


satisfactorily in Subject Network Information & Security ( ) for the academic
year 2023 to2024 as prescribed in the curriculum.

Place:……………………………… Enrolment No:…………………………….

Date:………………………………. Exam Seat No:……………………………..

Subject Teacher Head of the Department Principal

3
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION CERTIFICATE

This is to certify that Mr./Ms.…………………………………………...................... Roll

No………,of Sixth Semester of Diploma in…………………………......……………………….

………………………………….of Institute,……………………………………………………..……………

…………………………………… (Code:………….) has completed the Micro-Project


satisfactorily in Subject Network Information & Security ( ) for the academic
year 2023 to2024 as prescribed in the curriculum.

Place:……………………………… Enrolment No:…………………………….

Date:………………………………. Exam Seat No:……………………………..

Subject Teacher Head of the Department Principal

4
Acknowledgement
We feel proud to present our investigatory project in Network Information &
Security on the topic “COMPUTING SECURITY “ with their suitability.
This project wouldn’t have been feasible without the proper and rigorous
guidance of my Network Information & Security Mam Prof. S.A.Dongre who
guided me throughout this project in every possible way an investigatory project
in every possible way an investigatory project involves various difficult lab
experiment which have to be carried out by the student to obtain the observation
and conclude the report on a meaningful note these experiment are very critical
and in the case of failure may result in disastrous consequence there by I would
like to thank Prof .S.S Dongre for guiding me on a step by step basis and
ensuring that I completed all my experiment with ease.
Rigorous hard work has been put in this project to ensure that it proves to be the
best I hope the best I hope that this project will prove to be a breeding ground for
the next generation of student and will guide them in every possible.

5
ABSTRACT

This report as been prepared to the “Develop Bank Management Application


”.This document is the final report of the findings and recommendations of the
Network Information & Security for final year . Computer Programming
remains one of the most exciting and rapidly growing computer fields.
Computer Programming has now become a common element in user interfaces,
data visualization, television commercial, motion pictures, and many-many
other application. With the advantages of Computer Programming, modern
subject, we can be able to design different applications and tools which can be
beneficial in our daily life. Besides, some entertaining applications can also be
designed using Graphics such as Games ,Photo Effects etc. Many people have
contributed to this project in variety of ways. To all of them we would like to
express our appreciation .

6
INDEX

Sr.No Content Pg.No

1) Introduction 6

2) 7
Computer security threats

3) Computer security impostant? 10

Here are the some reasons why is


4) 11
computer security important:

5) Types of computer security 14

6) Network Security Mothods 16

7) Conclusion 18

7
Introduction
Computer security, cyber security or information technology
security (IT security) is the protection of computer systems and
networks from information disclosure, theft of or damage to their
hardware, software, or electronic data, as well as from the disruption or
misdirection of the services they provide

. The field is becoming increasingly significant due to the


increased reliance on computer systems, the Internet and wireless
network standards such as Bluetooth and Wi-Fi, and due to the growth
of "smart" devices, including smartphones, televisions, and the various
devices that constitute the"Internet of things". Owing to its complexity,
both in terms

8
measure is to store a system’s data on a separate device, or medium,
such as magnetic tape or disks, that is normally inaccessible through
the computer system. Finally, data is often encrypted so that it can be
deciphered only by holders of a singular encryption key. (See data
encryption.)

Computersecuritythreats
. Computer security threats are possible dangers that can possibly
hamper the normal functioning of your computer. In the present age,
cyber threats are constantly increasing as the world is going digital.
The most harmful types of computer security are:

1)Viruses

.
Computervirusisamaliciousprogramwhichisloaded
into the user’s computer without user’s knowledge. It replicates itself
and infects the files and programs on the user’s PC. The ultimate goal
of a virus is to ensure that the victim’s computer will never be able to
operate properly or even at all.

9
2) ComputerWorm

. Computer worm is a software program that can copy itself from


one computer to another, without human interaction. The potential
risk here is that it will use up your computer hard disk space because
a worm can replicate in greate volume and with great speed.

3) Phishing

. Disguising as a trustworthy person or business, phishers attempt


to steal sensitive financial or personal information through fraudulent
email or instant messages. Phishing in unfortunately very easy to
execute. You are deluded into thinking it’s the legitimate mail and
you may enter your personal information.

10
4) Botnet

. Botnet is a group of computers connected to the internet, that


have been compromised by a hacker using a computer virus. An
individual computer is called ‘zombie computer’.
The result of this threat is the victim’s computer, which is the bot will
be used for malicious activities and for a larger scale attack like DDoS.

5) Rootkit

Rootkit - is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence.
Once a rootkit has been installed, the

11
controller of the rootkit will be able to remotely execute files and
change system configurations on the host machine.

6) Keylogger

Also known as a keystroke logger, keyloggers can track the real-


time activity of a user on his computer. It keeps a record of all the
keystrokes made by user keyboard.
Keylogger is also a very powerful threat to steal people’s login
credential such as username and password.
These are perhaps the most common security threats that you’ll come
across. Apart from these, there are others like spyware, wabbits, scareware,
bluesnarfing and many more.
Fortunately, there are ways to protect yourself against these attacks.

COMPUTERSECURITY
IMPORTANT?

12
Computers are very essential part of our daily lives andit plays
important roles in our lives. So, the security of a computer is important
because it protects your information and helps to prevent from viruses
and malware. In this post, we will discuss on why is computer security
important of our lives.
Computer security is also known as cyber security or IT security
which mainly used for protection of computersystem such as hardware
and software.

WHYIS COMPUTER SECURITY


IMPORTANT?
The main purpose of the security is the preventing and detecting
unauthorized access of computer system. It guarantees to safe
processing and storage of business, healthcare and sensitive
information. Cyber security provides the Confidentiality, Integrity and
Availability for all components of a computer system.

Here are the some reasons why is


computer security important:
1. TOPROTECTPERSO
NAL INFORMATION

13
To prevent from cyber security risk you have to protect your
personal information. IT security is the first prime issue to protect your
personal and others information. By the way you can keep your
information secure using the following tips:

● UseantivirusSoftware
● Updateoperatingsystem
● Usestrongpassword
● Backupyourdata
● Lockyourcomputer
● AvoidPhishingEmails
● protectyourpersonalinformation

2. TOPROTECTORGANIZA
TION PROPERTIES
It is very important to ensure the organization’s computer data
because every organization has many sensitive assets and information.
So, without computer or IT security you can’t guarantee the security of
organization properties.

3. TOPREVENTIONFROMDATATHE
FT
Data theft is act of stealing sensitive information such as bank
account details, credit card information, passwords, and documents
which stored on computers, servers, or other

14
devices. The most common reasons of data breaches are as follows:

● Weakandstolencredentials
● Maliciousinsiders
● Applicationvulnerabilities
● HumanError
So, prevent from data theft you have to ensure your device
security by using endpoint security, lock down your computer,
Identify critical data and use authentication.

4. TOPREVENTFROMVIRUSES
AND MALWARE
Computer security is also important to protect from computer
viruses and malware’s. A computer virus or malware can corrupt or
delete your sensitive data, damage your hard disk and it spreads from
one computer to another using email program and others. So, you have
to protect your computer from viruses and malware using following
these tips:

● Keepyoursoftwareuptodate
● Usefreeantivirussoftware
● Useastrongpassword
● Don’tclickonlinkswithinemails
● Backupyour computer
● Useapop-upblocker

15
TYPESOFCOMPUTER SECURITY
In this post, we will focus on the different types of computer
security such asapplication security, network security, internet
security, data security, information security and end user security.

1. APPLICATIONSECURITY
Application security is the types of cyber security which
developing application by adding security features within applications
to prevent from cyber attacks. The attacks can be SQL injection, denial
of service (DoS) attacks, data breaches or other cyber-attacks.
There are some application security tools and techniques such as
firewalls, antivirus software, encryption, and web application firewall
which can help to prevent from
cyber-attacks.
Aweb application firewall is designed to protect web
applications by filtering and monitoring HTTP harmful traffic. Here
are the most used WebApplication Firewalls are:

16
FortinetFortiWeb
Citrix NetScalerApp Firewall F5
Advanced WAF
Radware AppWall
Symantec WAF
Barracuda WAF
Imperva WAF Sophos
XG Firewall
SonicWallNSa

2. INFORMATIONSECURITY
Information security (IS) is the types of computer security which
refers to the process and methodology to protect the confidentiality,
integrity and availability of computer system from unauthorized access,
use, modification and destruction.

Information security focuses on the CIAtriad model, which


ensure confidentiality, integrity, and availability of data, without
affecting organization productivity.

17
3. NETWORKSECURITY
Network security is other types of IT security which process of
preventing and protecting against unauthorized intrusion into
computer networks.
It is a set of rules and configurations which designed to protect
the confidentiality, integrity and accessibility of computer networks
system and information using both software and hardware
technologies.

NETWORKSECURITYMETHODS

18
There are different components or methods to improve network
security. Here, we have mentioned the most common network security
components.
Antivirus Software Application
Security BehavioralAnalytics
Data Loss Prevention (DLP) Email
Security
Firewalls
Mobile Device Security
NetworkSegmentation
Security Information and Event Management (SIEM) Virtual
Private Network (VPN)
Web Security
WirelessSecurity
NetworkAccessControl(NAC)

4. ENDPOINTSECURITY
Human error is a major weak point which is easily exploited by
cyber criminals. End users are becoming the largest security risk in
any organizations.

19
However, end user has no fault of their own, and mostly due to a
lack of awareness and ICT policy. They can unintentional open the
virtual gates to cyber attackers.
That’s why comprehensive security policies, procedures and
protocols have to be understood in depth by users who accessing the
sensitive information.
It is better to providing security awareness training
programtothemandshouldcoverthefollowingtopics:
Cyber security and its importance Phishing
and Social Engineering attack Password
creation and usages
Device Security
Physical Security
LearnMoreAboutSocialEngineeringAttack

5. INTERNETSECURITY
Internet security is the important types of computer security
which has defined as a process to create set of rules and actions to
protect computers system that are connected to the Internet.

20
CONCLUSION
Now that you have completed this webquest on Computer
Security you are now aware of the possible security treats to computer
systems. Not only that, but you are now better ableto protect your
computers as well as recommendsecuritymeasures to others.
Have you ever heard the terms Computer Virus, worms, Trojans,
Cybercrime, hackers?
Putting your computer in a bank vault with security officers with
shot guns and Rin-tin-tin will not protect yourcomputer’s data.
To protect your data you will have to incorporate the use of
special Data Security software along with the Physical Security
methods you have learned.
Have a look at Computer Security Threats as it relates to data
security.

21

You might also like