0% found this document useful (0 votes)
174 views12 pages

NIS Rahul

Uploaded by

ajitshinde9030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views12 pages

NIS Rahul

Uploaded by

ajitshinde9030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

GOVERNMENT POLYTECHNIC, HINGOLI

Sixth Semester
(Year: 2023-24)
Micro Project
‘Network Information Security[22620]’
Title of the Project
“Computer Security In The Human Life”
Branch: Computer Engineering (CO6I)

• Members of the Group

Sr. No. Roll No. Enrollment No. Name of the Student


1 21304 2111630020 PAWAR RAHUL MOHAN
2 21333 2211630273 SHINDE AJIT UTTAM

Guided by

Prof.N.S.JADHAO

1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI

CERTIFICATE
This is to certify that this Micro-Project contains the
bonafied work of following students of 6th Sem Diploma in
Computer Engineering, of Government Polytechnic, Hingoli
for the session 2023-24. They have completed their Micro-
project report entitled “Computer Security In The
Human Life” under the guidance of Prof.N.S.JADHAO This
Project report is being submitted to MSBTE, Mumbai, in the
partial fulfillment for the Diploma in Engineering

SR.NO ROLL NUMBER ENROLLMENT NAME


NUMBER
1 21304 2111630020 PAWAR RAHUL MOHAN

2 21333 2211630273 SHINDE AJIT UTTAM

Prof.N. S. JADHAO Prof. N. S. JADHAO Dr. B.P. DEOSARKAR

Guide HOD Principal

Place: Hingoli
Date: /02/2024

2
Teacher Evaluation Sheet for Micro Project

Course Title and Code: Network and Information Security (22620)


Title of the Project: - : Computer Security In Human Life

COs addressed by the Micro Project:

CO : Understand Computer Security In Human Life

CO : Understand Security Information And Event

CO : Understand Security Awareness Traning

CO : Understand Network Protocol Analysis

Marks:-

Marks obtained by
the
Marks for Total
individual
Roll No. Group Work Marks
Name Of Student based on viva
(06) (10)
(04)
21304 PAWAR RAHUL MOHAN

21333 SHINDE AJIT UTTAM

Name and designation of Faculty Member:

Signature:

3
ACKNOWLEDGEMENT

It is my great pleasure to acknowledge my research guide


Prof.N.S.JADHAO lecturer in Government Polytechnic, Hingoli.
His valuable guidance, constant inspiration, unending support helped
me alot of focus my views in proper perspective.

Our sincere and whole hearted thanks to B. P. DEOSARKAR,


principal Government Polytechnic, Hingoli for inspiring us to
achieve highest goal.

We would also like to thank our professors of Computer Engineering


Branch for their technical guidance, constant encouragement and
support in carrying out my project at college. Last but not least I am
also thankful to my parents and friends who helped me a lot infinalizing
the project within limited time frame.

4
INDEX

SR. CONTENTS PAGE


NO NO.
1 Introduction 6

2 Aim of theproject 7

3 What is Computer Security 8

4 Examples of Network Security 9

5 Network Security Model 10

6 Why do we Need a Network Security Model? 11

7
The Security Life Cycle 11

8 Conclusion 12

9 Reference 12

5
 Introduction:

Computer security plays a pivotal role in shaping modern human life, as digital
technologies become increasingly integrated into every aspect of society. From
personal communication and financial transactions to critical infrastructure and
national security, the reliance on computer systems and networks has never been
greater. However, this dependence also brings forth a myriad of cybersecurity
challenges and risks that can jeopardize privacy, safety, and trust.
At its core, computer security in human life encompasses the protection of digital assets,
the preservation of privacy, and the mitigation of cyber threats and vulnerabilities. It
involves safeguarding personal information, financial data, intellectual property, and
critical infrastructure from unauthorized access, exploitation, and manipulation.
Additionally, computer security aims to ensure the integrity, availability, and
confidentiality of digital resources, thereby fostering trust and confidence in the digital
ecosystem.
The introduction of computer security in human life underscores the importance of
proactive measures to address cybersecurity risks and threats. It emphasizes the need for
robust cybersecurity strategies, technologies, and practices to defend against malicious
actors, cyberattacks, and data breaches. Moreover, it highlights the role of individuals,
organizations, governments, and society at large in promoting a culture of cybersecurity
awareness, responsibility, and resilience.
As technology continues to evolve and digital transformation accelerates, the
significance of computer security in human life will only intensify. It is imperative for
stakeholders across all sectors to prioritize cybersecurity and collaborate in addressing
emerging challenges, advancing innovation, and ensuring the safe and secure use of
digital technologies for the benefit of all.

6
 AIM OF PROJECT :-

1. Protecting Personal Information: Ensure the privacy and confidentiality of


personal and sensitive information stored and transmitted through digital
devices and online platforms.

2. Preventing Unauthorized Access: Implement measures to prevent


unauthorized access to computer systems, networks, and data, thereby
safeguarding against identity theft, fraud, and cyberattacks.

3. Ensuring Data Integrity: Maintain the accuracy, reliability, and


consistency of data by implementing controls to detect and prevent
unauthorized modifications, deletions, or corruption.

4. Mitigating Cyber Threats: Identify and mitigate various cyber threats,


including malware, viruses, phishing attacks, ransomware, and other forms
of malicious software and cybercrime.

5. Promoting Trust and Confidence: Foster trust and confidence in digital


technologies and online services by ensuring they are secure, reliable, and
resilient against cyber threats and vulnerabilities.

6. Compliance with Regulations: Ensure compliance with relevant laws,


regulations, and industry standards governing data protection, privacy, and
cybersecurity, thereby avoiding legal and regulatory penalties.

7
 What is Computer Security:

Life would be great if we could all exchange information freely and never
worry about any malicious intent, stealing of our information.
However, we do not live in a perfect world, so we should focus about the safety
and security of any data or information flowing across any network.Day by day
we are dependent on the Internet to manage our bank accounts, our medical
records, and our credit Card payments; we need to protect this valuable
information. This means we must turn to network security. What is the reality
of security in human life?
The field of network security was form with the purpose of designing security
methods to protect our most valuable assets from the cyber criminals. If
human in their real life entrust to network security, then we have three
solutions; consisting of hardware, software and physical security methods used to
combat any security threat. In all the devices such as routers, IDS's and firewalls
are hardware devices used within a network to add security to its all users. Anti-
virus software and Virtual private network (VPN's) are some of the software
tools used to add additional protection for any network. The most secure
networks in the real world will have combined with hardware, software and
physical security methods together; finally these methods will provide any kind
of protection protection to all users of any network.

8
• Examples of Network Security:

Firewalls

The basic and easily implemented method of network security is the firewall.
A firewall can be software based, provided by windows, or hardware based,
such as a router. The main idea behind a firewall is to allow authorized access
to a computer while blocking unauthorized access. This is accomplished by
configuring access conditions depends on user defined rules, IP addresses, and
port accessibility.

 VPN's: Virtual Private Networks


VPN's are used to establish an encrypted connection across a network while
using the Internet as its transmission medium. A VPN uses the Internet,
which is already in place. The benefit of VPN is that a secure data connection is
established. VPN connection software encrypts the data being sent between
one place and another. This is known as tunneling.

 IDS: Intrusion Detection System

Intrusion Detection Systems consist of a combination of both hardware and


software and work in conjunction with an existing firewall. IDS units are
used to detect an intrusion threat to a computer system. IDS configurations use
data analysis algorithms to compare data packet construction and frequency to
established packet content definitions. If the packet construction observed
does not match the packet construction expected, when compared to
previously configured definitions, an alert is signified.
Depending on the configuration of the IDS, the observed traffic is either
blocked or let through to be marked for observation at a later date.

9
• Network Security Model:

The network security model is based on Open system Interconnection model


(OSI), developed in 1983 by the International Organization for
Standardization (ISO). Same like OSI model, Network security model is a
seven layer model that divides the daunting task of securing a network
infrastructure into seven manageable sections. This model is generic and can be
applied on all security implementation and devices. When an attack on a
network has succeeded it is much easier to locate the specific issue and fix it
with the use of Network Security Model. The Network Security Model is
divided into seven layers are as follows.

• Physical
• VLAN (Virtual Local Area Network)
• ACL (Access Control Lists)
• Software
• User
• Administrative
• IT Department

10
• Why do we Need a Network Security Model?

The NSM will give the security community a way to study, implement, and
maintain the network security that can be applied to any network. In
addition we can say that, it can be use as a security tool. NSM provides the
basic structure. It provides the new professionals with the knowledge to
discover what has been implemented and what has not been implemented
from a security stand point.

• The Security Life Cycle

If the network security model has been implemented: a network security


professional can begin a network security life cycle. The life cycle should
contain checks and balances to make sure that all the layers are in secure
state. The life cycle should begin with the technical standpoint. This means
that the network security professional should focus at the current network
security model to find any problem occurs or needful improvement to be
done. The network security model should be tested periodically by a
penetration test in order to find any exploits.

• Threats
• Policy
• Specification
• Design
• Implementation
• Operation and maintenance

11
 Conclusion:
After having the overview of security, I have concluded the basic ideas of
computer security: secrecy, integrity, and availability, Implemented by access
control based on the standard of authentication, authorization, and auditing. We
discussed the reasons why it doesn’t work very well in practice:

• Complexity in the code and especially in the setup of security,


which overwhelms users and administrators.
• The Internet works only because we implicitly trust one another
• It is very easy to exploit this trust
• The same holds true for software

 Reference:

1. Abadi and Needham, Prudent engineering practice for cryptographic


protocols. IEEE Trans. Software Engineering22, 1 (Jan 1996), 2-15,
dlib.computer.org/ts/books/ts1996/pdf/ e0006.pdf or
gatekeeper.dec.com/pub/DEC/SRC/research-reports/abstracts/src-rr-25.html

2. Anderson, Why cryptosystems fail. Comm. ACM37, 11 (Nov. 1994), 32-


40, www.acm.org/pubs/citations/proceedings/commsec/168588/p215-
anderson

3. Bell and LaPadula, Secure computer systems. ESD-TR-73-278 (Vol. I-


III) (also Mitre TR-2547), Mitre Corporation, Bedford, MA, April 1974

4. CERT Coordination Center, CERT advisory CA-2000-04 Love Letter


Worm,www.cert.org/advisories/CA-2000-04.html

5. Clark and Wilson, A comparison of commercial and military


computer security policies. IEEE Symp. Security and Privacy (April
1987), 184-194

12

You might also like