JAYAWANTRAO SAWANT
POLYTECHNIC, Handewadi Road,
Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2023-24
MICRO PROJECT
“Prepare Report On Need Of Cyber Security.”
Program: CO Program code: CO6I
Course: ETI Coursecode: 22618
Class: TYCO1 Group No: A
Project Guide: Mrs. S.R.Rajbhoj
1
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION
Certificate
This is to certify that
Shravani Sakhalkar(21),Pranali Sabale(22),Anjum
Shaikh(27) of 6th Semester of Diploma in Computer
Engineering of Institute Jayawantrao Sawant Polytechnic
(Code: 0711) has completed the Micro Project satisfactorily in
Subject – Emerging Trends in Computer Engineering and
Information Technology (22618) for the academic year 2023-
2024 as prescribed in the curriculum.
Enrollment no :- 2107110086 , 2107110087 , 2107110096
Seat no :-
Place :- Date :-
Subject Teacher Head of The Department Principal
2
MICRO PROJECT
GROUP DETAILS
Sr no Roll No. Name Enrollment No.
1 21 Shravani Sakhalkar 2107110086
2 22 Pranali Sabale 2107110087
3 27 Anjum Shaikh 2107110096
3
INDEX
Sr No. Content
1 Title
2 Certificate
3 Group Detail
4 Annexure I A
5 What is Cyber Security
6 Why do we need Cyber Security
7 Types of Cyber Security Threat
8 How To maintain Effective Cyber Security
9 Conclusion
10 Annexure IV(Teachers Evaluation Sheet)
4
JSPM’s
JAYAWANTRAO SAWANT
POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer Engineering
Academic Year 2022-23
TITLE OF MICRO PROJECT:
BRIEF INTRODUCTION : The need for cybersecurity arises from the growing reliance
on digital technologies and the pervasive nature of cyber threats.
AIM OF MICRO PROJECT:- Report on need of cyber security
3.0Resources required (major resources such as raw material, some machining
facility, software etc.)
Sr. Name of resource Specification Quantity Remarks
NO / material
1 Computer System .Any Desktop Computer With 1
Basic Configuration
2 Microsoft .Office MS Office 1
5
3.1 Action Plan
Sr. Details of activity Planned start Planned Name of Responsible
No date Finish date Team members
1 Discussion of project
1. Shravani Sakhalkar
2 Collecting information 2. Pranali Sable
from books,internet. 3. Anjum Shaikh
3 Creation of report and
presentation.
4 Final submission of micro
project.
6
What is Cyber Security
The world of Cyber Security revolves around the industry standard of
confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed
only by authorized parties; integrity means information can be added, altered, or removed
only by authorized users; and availability means systems, functions, and data must be
available on- demand according to agreed-upon parameters. The main element
of Cyber Security is the use of authentication mechanisms. For example, a user name
identifies an account that a user wants to access, while a password is a mechanism that
proves the user is who he claims to be. Cyber security is the application of technologies,
processes, and controls to protect systems, networks, programs, devices and data from
cyber attacks. It aims to reduce the risk of cyber attacks and protect against the
unauthorised exploitation of systems, networks, and technologiesSecurity is simply the
freedom from
risk or danger. The definition is extended by defining risk as the potential loss resulting
from the balance
of threats, vulnerabilities,
countermeasures, and value.
Understanding the security design
process involves determining the
organization's security needs.
Cyber Security is a process that’s
designed to protect networks and
devices from external threat. Businesses typically employ Cyber Security
professionals to protect their confidential information, maintain employee productivity,
and enhance customer confidence in products and services. Cyber crimes have quickly
become one of the fastest rising forms of modern crime. According to cyber experts,
approximately 1 million potential cyber attacks are attempted per day, and with the
evolution of mobile and cloud technologies, this number is likely to increase. To help
mitigate this growth, businesses and corporations have been expanding their
cybersecurity teams and efforts. Yet, in order to accurately identify potential hackers
and/or attacks, cyber security teams should possess a firm understanding of who cyber
criminals are, what techniques they use and what counter-initiatives can be implemented
in order to protect and prevent future cyber crimes.
cybersecurity is indispensable in today's interconnected world, where the protection of
data, prevention of cyber attacks, preservation of privacy, defense of critical
infrastructure, compliance with regulations, maintenance of trust, adaptation to evolving
threats, and
support for innovation are essential for individuals, businesses, and governments alike.
7
Why do we need Cyber Security
Cybersecurity is essential for a multitude of reasons, spanning from protecting sensitive data
ensuring the stability of critical infrastructure. Here's why we need cybersecurity:
Protection of Data Privacy: With the proliferation of digital technologies, vast amounts of
personal, financial, and confidential data are stored and transmitted electronically.
Cybersecurity measures are crucial for safeguarding this data from unauthorized access, theft,
or manipulation, ensuring the privacy and integrity of individuals' information.
Prevention of Cyber Attacks: Cyber attacks come in various forms, including malware
infections, phishing scams, ransomware, and denial-of-service (DoS) attacks. Effective
cybersecurity measures help prevent these attacks from compromising systems, disrupting
operations, or causing financial losses for individuals and organizations.
1. Defense of Critical Infrastructure: Critical infrastructure sectors such as energy,
transportation, healthcare, and finance rely heavily on interconnected computer networks
and industrial control systems. Cybersecurity is essential to protect these systems from
cyber
threats that could disrupt essential services, endanger
public safety, or undermine national security
.
2. Preservation of Trust and Confidence: Trust is
fundamental in digital interactions,
whether it's between businesses and customers,
governments and citizens, or individuals
sharing information online. Cybersecurity measures help build and maintain trust by
demonstrating a commitment to protecting users' data and ensuring the integrity,
availability,
and confidentiality of information systems.
3. Compliance with Regulations: Governments and regulatory bodies worldwide have
implemented laws and regulations to protect data privacy and cybersecurity. Compliance
with these regulations, such as the General Data Protection Regulation (GDPR) in the
European Union and the Health Insurance Portability and Accountability Act (HIPAA) in
the United States, is essential for organizations to avoid legal penalties and reputational
damage.
4. Adaptation to Evolving Threats: Cyber threats are constantly evolving in complexity and
sophistication, requiring organizations to continuously update and improve their
cybersecurity defenses. Proactive monitoring, threat intelligence, and incident response
8
capabilities are essential to detect and mitigate emerging threats before they cause
significant harm.
5. Support for Economic Stability and Innovation: A robust cybersecurity posture fosters
confidence in digital technologies, enabling innovation, collaboration, and economic growth
By protecting intellectual property, trade secrets, and proprietary information, cybersecurity
measures create a conducive environment for businesses to innovate, compete, and thrive in
the digital economy.
Some of the common threats are :üCyber terrorism It is the innovative use of information
technology by terroristgroups to further their political agenda. It took the form of attacks
on networks,computer systems and telecommuni cation infrastructures.üCyber warfare It
involves nation-states using information technology to gothrough something another
nation s‟ networks to cause damage.
In the U.S.and many other people live in a society, cyber warfare has been
acknowledgedas the fifth domain of warfare. Cyber warfare attacks are primarily
executedby hackers who are well-trained in use of benefit the quality of details
computernetworks, and operate under the favourable and support of nation-states.Rather
than closing a target s‟ key networks, a cyber-warfare attack may forcedto put into a
situation into networks to compromise valuable data, degradecommunications, impair
such infrastructural services as transportation andmedical services, or interrupt
commerce.üCyber spionage . It is the practice of using information technology to
obtainsecret information without permission from its owners or holders. It is the
mostoften used to gain strategic, economic, military advantage, and is conductedusing
cracking techniques and malware..Who are Cyber Criminals ?It involves such activities as
9
child printed sexual organs or activity; credit card fraud;cyber stalking; defaming another
online; gaining unauthorized access to computersystems; ignoring copyright, software
licensing and trademark safe to protect;overriding encryption to make illegal copies;
software piracy and stealing another
s‟identity to perform criminal acts. Cybercriminals are those who conduct such
acts.They can be categorized into three groups that reflect their motivation.ee Trial
Cybersecurity is important for two very human reasons:
Our identities are increasingly shifting online. From credit agencies and workplaces to the
social media networks we use daily, our lives are becoming more intwined with the digital
world.
The supply chains that keep us fed and clothed are all managed through information
technology.
10
Types of Cyber Security Threats
The Different Types of Cybersecurity
Cyber security is a wide field covering several disciplines. It can be divided into seven main
pillars:
Network Security
Most attacks occur over the network, and network security solutions are designed to
identify and block these attacks. These solutions include data and access controls such as
Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network Access
Control), and NGFW (Next-Generation Firewall) application controls to enforce safe web
use policies.
Advanced and multi-layered network threat prevention technologies include IPS (Intrusion
Prevention System), NGAV (Next-Gen Antivirus), Sandboxing, and CDR (Content Disarm
and Reconstruction). Also important are network analytics, threat hunting, and automated
SOAR (Security Orchestration and Response) technologies.
Cloud Security
As organizations increasingly adopt cloud computing, securing the cloud becomes a
major priority. A cloud security strategy includes cyber security solutions, controls,
11
policies, and services that help to protect an organization’s entire cloud deployment
(applications, data, infrastructure, etc.) against attack.
While many cloud providers offer security solutions, these are often inadequate to the task of
achieving enterprise-grade security in the cloud. Supplementary third-party solutions are
necessary to protect against data breaches and targeted attacks in cloud environments.
Endpoint Security
The zero-trust security model prescribes creating micro-segments around data wherever it
may be. One way to do that with a mobile workforce is using endpoint security. With
endpoint security, companies can secure end-user devices such as desktops and laptops with
data and network security controls, advanced threat prevention such as anti-phishing and
anti- ransomware, and technologies that provide forensics such as endpoint detection and
response (EDR) solutions.
Mobile Security
Often overlooked, mobile devices such as tablets and smartphones have access to
corporate data, exposing businesses to threats from malicious apps, zero-day,
phishing, and IM (Instant Messaging) attacks. Mobile security prevents these attacks
and secures the operating systems and devices from rooting and jailbreaking. When
included with an MDM (Mobile Device Management) solution, this enables
enterprises to ensure only compliant mobile devices have access to corporate assets.
IoT Security
While using Internet of Things (IoT) devices certainly delivers productivity benefits,
it also exposes organizations to new cyber threats. Threat actors seek out vulnerable
devices inadvertently connected to the Internet for nefarious uses such as a pathway
into a corporate network or for another bot in a global bot network.
IoT security protects these devices with discovery and classification of the connected
devices, auto-segmentation to control network activities, and using IPS as a virtual
patch to prevent exploits against vulnerable IoT devices. In some cases, the firmware
of the device can also be augmented with small agents to prevent exploits and runtime
attacks.
Application Security
Web applications, like anything else directly connected to the Internet, are targets for
threat actors. Since 2007, OWASP has tracked the top 10 threats to critical web
application security flaws such as injection, broken authentication, misconfiguration,
12
and cross-site scripting to name a few.With application security, the OWASP Top 10
attacks can be stopped. Application security also prevents bot attacks and stops any
malicious interaction with applications and APIs. With continuous learning, apps will
remain protected even as DevOps releases new content.
Zero Trust
The traditional security model is perimeter-focused, building walls around an
organization’s valuable assets like a castle. However, this approach has several issues, such
as the potential
for insider threats and the rapid dissolution of the network perimeter.As corporate assets
move off- premises as part of cloud adoption and remote work, a new approach to security is
needed.
Zero trust takes a more granular approach to security, protecting individual resources
through a combination of micro-segmentation, monitoring, and enforcement of role-based
access
controls.
13
Conclusion :- Hence we have successfully created a
report on need of cyber security.
14
Micro Project Group Details
No. Roll no. Name Enrollment No.
Shravani Sakhalkar 2107110086
1) 21
Pranali Sabale 2107110087
2) 22
Anjum Shaikh 2107110096
3) 27
15
TEACHER EVALUATION SHEET
Name of student :
Shravani Sakhalkar
Name of program : Computer Engineering
Enrollment No : 2107110086
Semester : 6th
Course Title : ETI
Code : 22618
Title of Micro Project : “Prepare Report On Need Of Cyber Security.”
Evaluation as per suggested Rubric for Assessment of Micro Project
Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
reprePWPtation
6 Quality of Prototype/ Model
7 Report preparation
8 PrePWPtation
9 Defense
16
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A - Project Project Par B - Project Individual
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column Comment/ suggestion about
team work/leadership/ interpersonal communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………….
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………………….
Name of the Faculty Member : Mrs.S.R.Rajbhoj
Signature: …………………………
17
TEACHER EVALUATION SHEET
Name of student :
Pranali Sabale
Name of program : Computer Engineering
Enrollment No : 2107110087
Semester : 6th
Course Title : ETI
Code : 22618
Title of Micro Project “Prepare Report On Need Of Cyber Security”
Evaluation as per suggested Rubric for Assessment of Micro Project
Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
reprePWPtation
6 Quality of Prototype/ Model
7 Report preparation
8 PrePWPtation
9 Defense
18
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A - Project Project Par B - Project Individual 10
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column
Comment/ suggestion about team work/leadership/ interpersonal
communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
…………………………………………………………………………………………………
……………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
Name and Designation of the Faculty Member : Mrs. S.R.Rajbhoj
Signature: …………………………
19
TEACHER EVALUATION SHEET
Name of student :
Anjum Shaikh
Name of programme : Computer Engineering
Enrollment No : 2107110096
Semester : 6th
Course Title : ETI
Code : 22618
Title of Micro Project : “Prepare Report On Need Of Cyber Security.”
Evaluation as per suggested Rubric for Assessment of Micro
Project
Sr. Characteristic to be Poor Average Good Excellent
No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal
5 Analysis of data and
reprePWPtation
6 Quality of Prototype/ Model
7 Report preparation
8 PrePWPtation
9 Defense
20
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A - Project Project Par B - Project Individual 10
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column
Comment/ suggestion about team work/leadership/ interpersonal
communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
…………………………………………………………………………………………………
……………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
Name and Designation of the Faculty Member Mrs.S.R.Rajbhoj
Signatur
21
Project By Group A
22
23