ETI Microproject Up (1) - For Merge
ETI Microproject Up (1) - For Merge
ETI Microproject Up (1) - For Merge
MICRO PROJECT
“Prepare Report On Need Of Cyber Security.”
1
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION
Certificate
This is to certify that
Place :- Date :-
2
MICRO PROJECT
GROUP DETAILS
3
INDEX
Sr No. Content
1 Title
2 Certificate
3 Group Detail
4 Annexure I A
8 Conclusion
4
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2022-23
BRIEF INTRODUCTION : The need for cybersecurity arises from the growing reliance
on digital technologies and the pervasive nature of cyber threats.
5
3.1 Action Plan
1 Discussion of project
1. Shravani Sakhalkar
2 Collecting information from 2. Pranali Sable
books,internet. 3. Anjum Shaikh
3 Creation of report and
presentation.
6
What is Cyber Security
7
Why do we need Cyber Security
Cybersecurity is essential for a multitude of reasons, spanning from protecting sensitive data
ensuring the stability of critical infrastructure. Here's why we need cybersecurity:
Protection of Data Privacy: With the proliferation of digital technologies, vast amounts of
personal, financial, and confidential data are stored and transmitted electronically.
Cybersecurity measures are crucial for safeguarding this data from unauthorized access, theft,
or manipulation, ensuring the privacy and integrity of individuals' information.
Prevention of Cyber Attacks: Cyber attacks come in various forms, including malware
infections, phishing scams, ransomware, and denial-of-service (DoS) attacks. Effective
cybersecurity measures help prevent these attacks from compromising systems, disrupting
operations, or causing financial losses for individuals and organizations.
8
capabilities are essential to detect and mitigate emerging threats before they cause significant
harm.
5. Support for Economic Stability and Innovation: A robust cybersecurity posture fosters
confidence in digital technologies, enabling innovation, collaboration, and economic growth
By protecting intellectual property, trade secrets, and proprietary information,
cybersecurity measures create a conducive environment for businesses to innovate,
compete, and thrive in the digital economy.
Some of the common threats are :üCyber terrorism It is the innovative use of information
technology by terroristgroups to further their political agenda. It took the formof attacks
on networks,computer systems and telecommuni cation infrastructures.üCyber warfare It
involves nation-states using information technology to gothrough something another
nation s‟ networks to cause damage.
In the U.S.and many other people live in a society, cyber warfare has been
acknowledgedas the fifth domain of warfare. Cyber warfare attacks are primarily
executedby hackers who are well-trained in use of benefit the quality of details
computernetworks, and operate under the favourable and support of nation-states.Rather
than closing a target s‟ key networks, a cyber-warfare attack may forcedto put into a
situation into networks to compromise valuable data, degradecommunications, impair
such infrastructural services as transportation andmedical services, or interrupt
commerce.üCyber spionage . It is the practice of using information technology to
obtainsecret information without permission from its owners or holders. It is the
mostoften used to gain strategic, economic, military advantage, and is conductedusing
cracking techniques and malware..Who are Cyber Criminals ?It involves such activities
as
9
child printed sexual organs oractivity; credit card fraud;cyber stalking; defaming another
online; gaining unauthorized access to computersystems; ignoring copyright, software
licensing and trademark safe to protect;overriding encryption to make illegal copies;
software piracy and stealing another
s‟identity to perform criminal acts. Cybercriminals are those who conduct such
acts.Theycan be categorized into three groups that reflect their motivation.ee Trial
Our identities are increasingly shifting online. From credit agencies and workplaces to the
social media networks we use daily, our lives are becoming more intwined with the
digital world.
The supply chains that keep us fed and clothed are all managed through
information technology.
10
Types of Cyber Security Threats
Cyber security is a wide field covering several disciplines. It can be divided into seven main
pillars:
Network Security
Most attacks occur over the network, and network security solutions are designed to
identify and block these attacks. These solutions include data and access controls such as
Data Loss Prevention (DLP), IAM (Identity Access Management), NAC (Network Access
Control), andNGFW (Next-Generation Firewall) application controls to enforce safe web
use policies.
Advanced and multi-layered network threat prevention technologies include IPS (Intrusion
Prevention System), NGAV (Next-Gen Antivirus), Sandboxing, and CDR (Content Disarm
andReconstruction). Also important are network analytics, threat hunting, and automated
SOAR (Security Orchestration and Response) technologies.
Cloud Security
11
major priority. A cloud security strategy includes cyber security solutions, controls,
policies, and services that help to protect an organization’s entire cloud deployment
(applications, data, infrastructure, etc.) against attack.
While many cloud providers offer security solutions, these are often inadequate to the task of
achieving enterprise-grade security in the cloud. Supplementary third-party solutions are
necessary to protect against data breaches and targeted attacks in cloud environments.
Endpoint Security
The zero-trust security model prescribes creating micro-segments around data wherever it
maybe. One way to do that with a mobile workforce is using endpoint security. With
endpoint security, companies can secure end-user devices such as desktops and laptops with
data and network security controls, advanced threat prevention such as anti-phishing and
anti- ransomware, and technologies that provide forensics such as endpoint detection and
response (EDR) solutions.
Mobile Security
Often overlooked, mobile devices such as tablets and smartphones have access to
corporate data, exposing businesses to threats from malicious apps, zero-day,
phishing, and IM (InstantMessaging) attacks. Mobile security prevents these attacks
and secures the operating systemsand devices from rooting and jailbreaking. When
included with an MDM (Mobile Device Management) solution, this enables
enterprises to ensure only compliant mobile devices haveaccess to corporate assets.
IoT Security
While using Internet of Things (IoT) devices certainly delivers productivity benefits,
it also exposes organizations to new cyber threats. Threat actors seek out vulnerable
devices inadvertently connected to the Internet for nefarious uses such as a pathway
into a corporatenetwork or for another bot in a global bot network.
IoT security protects these devices with discovery and classification of the connected
devices,auto-segmentation to control network activities, and using IPS as a virtual
patch to prevent exploits against vulnerable IoT devices. In some cases, the firmware
of the device can also beaugmented with small agents to prevent exploits and
runtime attacks.
Application Security
Web applications, like anything else directly connected to the Internet, are targets for
threat actors. Since 2007, OWASP has tracked the top 10 threats to critical web
12
application security flaws such as injection, broken authentication, misconfiguration,
and cross-site scripting to name a few.With application security, the OWASP Top 10
attacks can be stopped. Applicationsecurity also prevents bot attacks and stops any
malicious interaction with applications and APIs. With continuous learning, apps will
remain protected even as DevOps releases new content.
Zero Trust
13
Conclusion :- Hence we have successfully created a
report on need of cyber security.
14
Micro Project Group Details
15
TEACHER EVALUATION SHEET
Name of student :
Shravani Sakhalkar
Name of program : Computer Engineering
Enrollment No : 2107110086
Semester : 6th
16
Micro Project Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column Comment/ suggestion about
team work/leadership/ interpersonal communication (If any)
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………….
Any other comment:
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
……………………………………………………………………………………………….
Name of the Faculty Member : Mrs.S.R.Rajbhoj
Signature: …………………………
17
TEACHER EVALUATION SHEET
Name of student :
Pranali Sabale
Name of program : Computer Engineering
Enrollment No : 2107110087
Semester : 6th
Course Title : ETI
Code : 22618
Title of Micro Project “Prepare Report On Need Of Cyber Security”
18
Micro Project Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column
Signature: …………………………
19
TEACHER EVALUATION SHEET
Name of student :
Anjum Shaikh
Name of programme : Computer Engineering
Enrollment No : 2107110096
Semester : 6th
Course Title : ETI
Code : 22618
Title of Micro Project : “Prepare Report On Need Of Cyber Security.”
20
Micro Project Evaluation Sheet
Note: Every course teacher is expected to assign marks for group evaluation in
first 3 columns and individual evaluation 4th column
Signatur
21
Project By Group A
22
23