ETI Microproject Up (1) - For Merge

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

JAYAWANTRAO SAWANT

POLYTECHNIC, Handewadi Road,


Hadapsar, Pune-28
Department of Computer Engineering

Academic Year 2023-24

MICRO PROJECT
“Prepare Report On Need Of Cyber Security.”

Program: CO Program code: CO6I


Course: ETI Coursecode: 22618
Class: TYCO1 Group No: A

Project Guide: Mrs. S.R.Rajbhoj

1
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION
Certificate
This is to certify that

Shravani Sakhalkar(21),Pranali Sabale(22),Anjum


Shaikh(27) of 6th Semester of Diploma in Computer
Engineering of Institute Jayawantrao Sawant Polytechnic
(Code: 0711) has completed the Micro Project satisfactorily in
Subject – Emerging Trends in Computer Engineering and
Information Technology (22618) for the academic year 2023-
2024 as prescribed in the curriculum.
Enrollment no :- 2107110086 , 2107110087 , 2107110096

Seat no :- 208661, 208662, 208667

Place :- Date :-

Subject Teacher Head of The Department Principal

2
MICRO PROJECT
GROUP DETAILS

Sr no Roll No. Name Enrollment No.

1 21 Shravani Sakhalkar 2107110086

2 22 Pranali Sabale 2107110087

3 27 Anjum Shaikh 2107110096

3
INDEX

Sr No. Content

1 Title

2 Certificate

3 Group Detail

4 Annexure I A

5 What is Cyber Security

6 Why do we need Cyber Security

7 Types of Cyber Security Threat

8 Conclusion

9 Annexure IV(Teachers Evaluation Sheet)

4
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2022-23

TITLE OF MICRO PROJECT:

BRIEF INTRODUCTION : The need for cybersecurity arises from the growing reliance
on digital technologies and the pervasive nature of cyber threats.

AIM OF MICRO PROJECT:- Report on need of cyber security

3.0Resources required (major resources such as raw material, some machining


facility, software etc.)

Sr. Name of resource / Specification Quantity Remarks


NO material

1 Computer System .Any Desktop Computer 1


With Basic Configuration

2 Microsoft .Office MS Office 1

5
3.1 Action Plan

Sr. Details of activity Planned start Planned Finish Name of Responsible


No date date Team members

1 Discussion of project
1. Shravani Sakhalkar
2 Collecting information from 2. Pranali Sable
books,internet. 3. Anjum Shaikh
3 Creation of report and
presentation.

4 Final submission of micro


project.

6
What is Cyber Security

The world of Cyber Security revolves around the industry standard of


confidentiality, integrity, and availability, or CIA. Privacy means data can be accessed
only by authorized parties; integrity means information can be added, altered, or removed
only by authorized users; and availability means systems, functions, and data must be
available on- demand according to agreed-upon parameters. The main element
of Cyber Security is the use of authentication mechanisms. For example, a user name
identifies an account that a user wantsto access, while a password is a mechanism that
proves the user is who he claims to be. Cyber security is the application of technologies,
processes, and controls to protect systems, networks,programs, devices and data from
cyber attacks. It aims to reduce the risk of cyber attacks and protect against the
unauthorised exploitation of systems, networks, and technologiesSecurity is simply the
freedom from
risk or danger. The definition is extended by defining risk as the potential loss resulting
from the balance
of threats, vulnerabilities, countermeasures,
and value.Understanding the security design
process involves determining the organization's
security needs.
Cyber Security is a process that’s designed
to protect networks and devices from
external threat. Businesses
typically employ
Cyber Security professionals to protect their confidential information, maintain
employee productivity, and enhance customer confidence inproducts and services.
Cyber crimes have quickly become one of the fastest rising forms of modern crime.
According to cyber experts, approximately 1 million potential cyber attacks are
attempted per day, and with the evolution of mobile and cloud technologies, this number
is likely to increase. To helpmitigate this growth, businesses and corporations have been
expanding their cybersecurity teams and efforts. Yet, in order to accurately identify
potential hackers and/or attacks, cyber security teams should possess a firm
understanding of who cyber criminals are, what techniques they use and what counter-
initiatives can be implemented in order to protect and prevent future cyber crimes.
cybersecurity is indispensable in today's interconnected world, where the protection of
data, prevention of cyber attacks, preservation of privacy, defense of critical
infrastructure, compliance with regulations, maintenance of trust, adaptation to evolving
threats, and
support for innovation are essential for individuals, businesses, and governments alike.

7
Why do we need Cyber Security

Cybersecurity is essential for a multitude of reasons, spanning from protecting sensitive data
ensuring the stability of critical infrastructure. Here's why we need cybersecurity:

Protection of Data Privacy: With the proliferation of digital technologies, vast amounts of
personal, financial, and confidential data are stored and transmitted electronically.
Cybersecurity measures are crucial for safeguarding this data from unauthorized access, theft,
or manipulation, ensuring the privacy and integrity of individuals' information.

Prevention of Cyber Attacks: Cyber attacks come in various forms, including malware
infections, phishing scams, ransomware, and denial-of-service (DoS) attacks. Effective
cybersecurity measures help prevent these attacks from compromising systems, disrupting
operations, or causing financial losses for individuals and organizations.

1. Defense of Critical Infrastructure: Critical infrastructure sectors such as energy,


transportation, healthcare, and finance rely heavily on interconnected computer
networks and industrial control systems. Cybersecurity is essential to protect these
systems from cyber
threats that could disrupt essential services, endanger
public safety, or undermine national security
.
2. Preservation of Trust and Confidence: Trust is
fundamental in digital interactions,
whether it's between businesses and customers,
governments and citizens, or individuals
sharing information online. Cybersecurity measures help build and maintain trust by
demonstrating a commitment to protecting users' data and ensuring the integrity,
availability,
and confidentiality of information systems.

3. Compliance with Regulations: Governments and regulatory bodies worldwide have


implemented laws and regulations to protect data privacy and cybersecurity. Compliance
with these regulations, such as the General Data Protection Regulation (GDPR) in the
European Union and the Health Insurance Portability and Accountability Act (HIPAA) in
the United States, is essential for organizations to avoid legal penalties and reputational
damage.

4. Adaptation to Evolving Threats: Cyber threats are constantly evolving in complexity


and sophistication, requiring organizations to continuously update and improve their
cybersecurity defenses. Proactive monitoring, threat intelligence, and incident response

8
capabilities are essential to detect and mitigate emerging threats before they cause significant
harm.

5. Support for Economic Stability and Innovation: A robust cybersecurity posture fosters
confidence in digital technologies, enabling innovation, collaboration, and economic growth
By protecting intellectual property, trade secrets, and proprietary information,
cybersecurity measures create a conducive environment for businesses to innovate,
compete, and thrive in the digital economy.

Some of the common threats are :üCyber terrorism It is the innovative use of information
technology by terroristgroups to further their political agenda. It took the formof attacks
on networks,computer systems and telecommuni cation infrastructures.üCyber warfare It
involves nation-states using information technology to gothrough something another
nation s‟ networks to cause damage.

In the U.S.and many other people live in a society, cyber warfare has been
acknowledgedas the fifth domain of warfare. Cyber warfare attacks are primarily
executedby hackers who are well-trained in use of benefit the quality of details
computernetworks, and operate under the favourable and support of nation-states.Rather
than closing a target s‟ key networks, a cyber-warfare attack may forcedto put into a
situation into networks to compromise valuable data, degradecommunications, impair
such infrastructural services as transportation andmedical services, or interrupt
commerce.üCyber spionage . It is the practice of using information technology to
obtainsecret information without permission from its owners or holders. It is the
mostoften used to gain strategic, economic, military advantage, and is conductedusing
cracking techniques and malware..Who are Cyber Criminals ?It involves such activities
as
9
child printed sexual organs oractivity; credit card fraud;cyber stalking; defaming another
online; gaining unauthorized access to computersystems; ignoring copyright, software
licensing and trademark safe to protect;overriding encryption to make illegal copies;
software piracy and stealing another
s‟identity to perform criminal acts. Cybercriminals are those who conduct such
acts.Theycan be categorized into three groups that reflect their motivation.ee Trial

Cybersecurity is important for two very human reasons:

 Our identities are increasingly shifting online. From credit agencies and workplaces to the
social media networks we use daily, our lives are becoming more intwined with the
digital world.
 The supply chains that keep us fed and clothed are all managed through
information technology.

10
Types of Cyber Security Threats

The Different Types of Cybersecurity

Cyber security is a wide field covering several disciplines. It can be divided into seven main
pillars:

 Network Security

Most attacks occur over the network, and network security solutions are designed to
identify and block these attacks. These solutions include data and access controls such as
Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network Access
Control), andNGFW (Next-Generation Firewall) application controls to enforce safe web
use policies.

Advanced and multi-layered network threat prevention technologies include IPS (Intrusion
Prevention System), NGAV (Next-Gen Antivirus), Sandboxing, and CDR (Content Disarm
andReconstruction). Also important are network analytics, threat hunting, and automated
SOAR (Security Orchestration and Response) technologies.

 Cloud Security

As organizations increasingly adopt cloud computing, securing the cloud becomes a

11
major priority. A cloud security strategy includes cyber security solutions, controls,
policies, and services that help to protect an organization’s entire cloud deployment
(applications, data, infrastructure, etc.) against attack.

While many cloud providers offer security solutions, these are often inadequate to the task of
achieving enterprise-grade security in the cloud. Supplementary third-party solutions are
necessary to protect against data breaches and targeted attacks in cloud environments.

 Endpoint Security

The zero-trust security model prescribes creating micro-segments around data wherever it
maybe. One way to do that with a mobile workforce is using endpoint security. With
endpoint security, companies can secure end-user devices such as desktops and laptops with
data and network security controls, advanced threat prevention such as anti-phishing and
anti- ransomware, and technologies that provide forensics such as endpoint detection and
response (EDR) solutions.

 Mobile Security

Often overlooked, mobile devices such as tablets and smartphones have access to
corporate data, exposing businesses to threats from malicious apps, zero-day,
phishing, and IM (InstantMessaging) attacks. Mobile security prevents these attacks
and secures the operating systemsand devices from rooting and jailbreaking. When
included with an MDM (Mobile Device Management) solution, this enables
enterprises to ensure only compliant mobile devices haveaccess to corporate assets.

 IoT Security

While using Internet of Things (IoT) devices certainly delivers productivity benefits,
it also exposes organizations to new cyber threats. Threat actors seek out vulnerable
devices inadvertently connected to the Internet for nefarious uses such as a pathway
into a corporatenetwork or for another bot in a global bot network.

IoT security protects these devices with discovery and classification of the connected
devices,auto-segmentation to control network activities, and using IPS as a virtual
patch to prevent exploits against vulnerable IoT devices. In some cases, the firmware
of the device can also beaugmented with small agents to prevent exploits and
runtime attacks.

 Application Security

Web applications, like anything else directly connected to the Internet, are targets for
threat actors. Since 2007, OWASP has tracked the top 10 threats to critical web

12
application security flaws such as injection, broken authentication, misconfiguration,
and cross-site scripting to name a few.With application security, the OWASP Top 10
attacks can be stopped. Applicationsecurity also prevents bot attacks and stops any
malicious interaction with applications and APIs. With continuous learning, apps will
remain protected even as DevOps releases new content.

 Zero Trust

The traditional security model is perimeter-focused, building walls around an


organization’s valuable assets like a castle. However, this approach has several issues,
such as the potential
forinsider threats and the rapid dissolution of the network perimeter.As corporate assets
move off-premises as part of cloud adoption and remote work, a new approach to security is
needed.
Zero trust takes a more granular approach to security, protecting individual resources
through acombination of micro-segmentation, monitoring, and enforcement of role-based
access
controls.

13
Conclusion :- Hence we have successfully created a
report on need of cyber security.

14
Micro Project Group Details

No. Roll no. Name Enrollment No.

Shravani Sakhalkar 2107110086


1) 21
Pranali Sabale 2107110087
2) 22
Anjum Shaikh 2107110096
3) 27

15
TEACHER EVALUATION SHEET

 Name of student :
Shravani Sakhalkar
 Name of program : Computer Engineering
 Enrollment No : 2107110086
 Semester : 6th

 Course Title : ETI


 Code : 22618
Title of Micro Project : “Prepare Report On Need Of Cyber Security.”
 Evaluation as per suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be Poor Average Good Excellent


No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)

1 Relevance to the course


2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal

5 Analysis of data and


reprePWPtation

6 Quality of Prototype/ Model


7 Report preparation
8 PrePWPtation
9 Defense

16
Micro Project Evaluation Sheet

Process Assessment Product Assessment Total


Marks
Part A - Project Project Par B - Project Individual
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column Comment/ suggestion about
team work/leadership/ interpersonal communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………….
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………………….
Name of the Faculty Member : Mrs.S.R.Rajbhoj

Signature: …………………………

17
TEACHER EVALUATION SHEET

 Name of student :
Pranali Sabale
 Name of program : Computer Engineering
 Enrollment No : 2107110087
 Semester : 6th
 Course Title : ETI
 Code : 22618
Title of Micro Project “Prepare Report On Need Of Cyber Security”

Evaluation as per suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be Poor Average Good Excellent


No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)

1 Relevance to the course


2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal

5 Analysis of data and


reprePWPtation

6 Quality of Prototype/ Model


7 Report preparation
8 PrePWPtation
9 Defense

18
Micro Project Evaluation Sheet

Process Assessment Product Assessment Total


Marks
Part A - Project Project Par B - Project Individual 10
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column

Comment/ suggestion about team work/leadership/ interpersonal


communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
…………………………………………………………………………………………………
……………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………

Name and Designation of the Faculty Member : Mrs. S.R.Rajbhoj

Signature: …………………………

19
TEACHER EVALUATION SHEET

 Name of student :
Anjum Shaikh
 Name of programme : Computer Engineering
 Enrollment No : 2107110096
 Semester : 6th
 Course Title : ETI
 Code : 22618
Title of Micro Project : “Prepare Report On Need Of Cyber Security.”

 Evaluation as per suggested Rubric for Assessment of Micro


Project

Sr. Characteristic to be Poor Average Good Excellent


No assessed (Marks1- 3)
(Marks 4 - (Marks 6 - (Marks 9 -
5) 8) 10)

1 Relevance to the course


2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target as
per Project Proposal

5 Analysis of data and


reprePWPtation

6 Quality of Prototype/ Model


7 Report preparation
8 PrePWPtation
9 Defense

20
Micro Project Evaluation Sheet

Process Assessment Product Assessment Total


Marks
Part A - Project Project Par B - Project Individual 10
Proposal Methodology Report/ working PrePWPtation/
(2 Marks) Model Viva
(2 Marks)
(2 Marks) (4 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column

Comment/ suggestion about team work/leadership/ interpersonal


communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………
…………………………………………………………………………………………………
……………………………………………………
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………

Name and Designation of the Faculty Member Mrs.S.R.Rajbhoj

Signatur

21
Project By Group A

22
23

You might also like