Merged CPP
Merged CPP
CYBERSECURITY AWARENESS
SUBMITTED BY
NILESH VISPUTE
This is to certify that Mr. /Ms. HAWALDAR HEEBA MUZZAFFAR from PRAVIN PATIL
COLLEGE OF DIPLOMA ENFINEERING AND TECHNOLOGY institute having Enrollment
no: 2205630238 has completed project of final year having title “CYBERSECURITY
AWARENESS” during the academic year 2024 – 2025.
-The project completed in a group consisting of three persons under the guidance of the faculty Guide.
Project Member
1. Ahmed Mubin
2. Heeba Hawaldar
3. Aakansha Dhawade
NILIESH VISPUTE
A PO’s addressed by the Capstone Project (Mention only those predominant PO’s)
a) Applying foundational concepts of computer science and cybersecurity.
b) Identifying cybersecurity threats and vulnerabilities, and analyzing them to propose solutions.
Communicate effectively.
c) Utilizing cybersecurity tools and techniques to enhance awareness.
d) Understanding the societal impacts of cybersecurity and promoting responsible digital
citizenship.
e) Adapting to evolving cybersecurity challenges through continuous learning.
B CO’s addressed by the Capstone Project (Mention only those predominant CO’s)
a) Understand the fundamentals of cybersecurity threats, vulnerabilities, and attack vectors.
b) Analyze real-world cybersecurity incidents and assess the effectiveness of preventive measures.
c) logically choose relevant possible Solution
d) Develop and apply strategies to enhance cybersecurity awareness in different user groups.
e) Utilize cybersecurity tools and techniques to detect and mitigate risks.
MARKS MARKS
SR NO CRITERIA
OUT OF OBTAINED
3 Project Proposal 3
8 Presentation 2
9 Defense 2
DATE
MARKS OUT DATED SIGN OF
WEEK NO
OF 10 FACULTY
FROM TO
22/7/24 27/7/2024
1
29/7/24 2/8/24
2
5/8/24 10/8/2024
3
12/8/24 17/8/24
4
20/8/24 26/8/24
5
2/9/24 9/8/24
6
10/8/24 18/9/24
7
19/9/24 25/9/24
8
26/9/24 3/10/24
9
4/10/24 10/10/24
10
11/11/24 19/10/24
11
21/10/24 26/10/24
12
Week No: 1 Date: From 22nd Jul 2024 – 27th Jul 2024
Activities Planned: In this week will select the topic for CPP first we will find the
problems faced by us and analyze a proper solution for it .
the Problems:
Identify the cybersecurity challenges we face, such as lack of awareness, phishing attacks,
weak authentication, or data protection gaps.
Finding Solutions:
Analyze and propose practical solutions, such as targeted awareness campaigns, stronger
authentication methods, regular training, and adoption of cybersecurity best practices.
Activities Executed: Based on the problems we have made a list of few topics.
1. Problem Identification:
2. Research and Brainstorming
3. Solution Exploration
4. Topic Selection Preparation
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: We will do the discussion of the topic that are selected by us .
1.Discussion of selected topics.
2. Finalization of 4 topics by team members
Activities Executed: In the discussion we have finalized 5 topics that will be finalized by
our mentor.
1. Discussion has been done by us .
2. we have finalized 4 topics that will be presented .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: We discussed it with our mentor they mentioned various flaws that
need to be resolved, also the pros and cons of the project, how to go ahead in execution of
the project.
1. Presented the topic in front of mentor .
2. Finalization of topic has been done .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Mentor, guided us about the execution of our planned
project.
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Collection of information from various sites for our
project.
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: I visited different websites for the literature survey based
on our topic
Activities Executed: I have selected a suitable frontend and backend for our project .
1. I have selected the suitable Procedure that has to followed by other members.
2. Gathered the information about the Topic .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Deciding the efficient technology for our project .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: We gathered all the related information from various
books, web sources, IEE papers etc.
2. Data Modelling
3. Environment
4. conclusion
Activities Executed: Here we have explained our presentation to the mentor it was done
by our team members
1. Problem Statement and solution
2. Data Modelling
3. Environment
4. conclusion
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: We Presented our project to the mentor, then he pointed
out the necessary changes to be made in the ppt.
2. Information collection
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: we have prepared a portfolio that consist of task and the
responsibilities
1. I have created portfolio blueprint
2. Reading part is done by me.
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: Preparation of project synopsis that will give gist of our project
1.cration of project synopsis that will contain details of project is done by other member.
Activities Executed: we have prepared a synopsis that gives a panoramic view ofour
research done by us .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: lastly we will create a weekly diary that consist of the activity.
1. we will discuss all the task .
2. Proper Editing of weekly diary
Activities Executed: We have Prepared a weekly diary that consist of the task that
are done by us.
1. We have discussed all the task
2. Proper editing has also been done by me .
Reason for delay if any: No, there are no delay, I was going according to the plan
1 Heeba Hawaldar
PROJECT MEMBERS: 2 Shaikh Md Ahmad
3 Aakansha Dhadwade
PROJECT DESCRIPTION:
Cybersecurity awareness is the practice of educating and informing individuals about the various cyber
threats and best practices to protect sensitive information. This project aims to enhance knowledge on
identifying potential cyber risks and implementing strategies to mitigate them. By fostering a culture
of security, it helps in preventing data breaches and ensuring overall digital safety.
CURRENT SCENARIO:
The current cybersecurity scenario is marked by an alarming rise in ransomware attacks,
with organizations like UnitedHealth and CDK Global falling victim. Many organizations
lack adequate resources to combat these threats, especially in regions like India. This ongoing
challenge demands constant vigilance and adaptation to emerging technologies. ransomware
attacks, with organizations like UnitedHealth
PROJECT OBJECTIVE:
Enhance cybersecurity awareness by educating individuals and organizations about various cyber
threats.
Equip participants with knowledge and tools needed to identify potential risks.
Implement effective security measures to mitigate cyber risks and prevent data breaches.
Foster a culture of vigilance and proactive cyber defense within organizations.
PROJECT STRATERGIES:
Education and Training: Conduct regular workshops and seminars to educate employees about
cybersecurity best practices and threat identification.
Phishing Simulations: Implement phishing simulation campaigns to assess and improve
employee awareness and response to phishing attacks.
Security Policies: Develop and enforce comprehensive security policies that outline acceptable
use, data protection measures, and incident response procedures.
Regular Updates: Ensure that all systems, software, and security tools are regularly updated and
patched to protect against vulnerabilities.
CYBERSECURITY AWARENESS
SUBMITTED BY
NILESH VISPUTE
This is to certify that Mr. /Ms. SHAIKH MD AHAMAD MUBIN from PRAVIN PATIL COLLEGE
OF DIPLOMA ENFINEERING AND TECHNOLOGY institute having Enrollment no: 2205630248
has completed project of final year having title “CYBERSECURITY AWARENESS ” during the
academic year 2024 – 2025.
-The project completed in a group consisting of three persons under the guidance of the faculty Guide.
Project Member
1. Ahmed Mubin
2. Heeba Hawaldar
3. Aakansha Dhawade
NILIESH VISPUTE
Contact No:--9766131708
Appendix-B
A PO’s addressed by the Capstone Project (Mention only those predominant PO’s)
a) Applying foundational concepts of computer science and cybersecurity..
b) Identifying cybersecurity threats and vulnerabilities, and analyzing them to propose solutions.
Communicate effectively .
c) Utilizing cybersecurity tools and techniques to enhance awareness..
d) Understanding the societal impacts of cybersecurity and promoting responsible digital
citizenship.
e) Adapting to evolving cybersecurity challenges through continuous learning.
B CO’s addressed by the Capstone Project (Mention only those predominant CO’s)
a) Understand the fundamentals of cybersecurity threats, vulnerabilities, and attack vectors.
b) Analyze real-world cybersecurity incidents and assess the effectiveness of preventive measures.
c) logically choose relevant possible Solution
d) Develop and apply strategies to enhance cybersecurity awareness in different user groups.
e) Utilize cybersecurity tools and techniques to detect and mitigate risks.
MARKS MARKS
SR NO CRITERIA
OUT OF OBTAINED
3 Project Proposal 3
8 Presentation 2
9 Defense 2
DATE
MARKS OUT DATED SIGN OF
WEEK NO
OF 10 FACULTY
FROM TO
22/7/24 27/7/2024
1
29/7/24 2/8/24
2
5/8/24 10/8/2024
3
12/8/24 17/8/24
4
20/8/24 26/8/24
5
2/9/24 9/8/24
6
10/8/24 18/9/24
7
19/9/24 25/9/24
8
26/9/24 3/10/24
9
4/10/24 10/10/24
10
11/11/24 19/10/24
11
21/10/24 26/10/24
12
Week No: 1 Date: From 22nd Jul 2024 – 27th Jul 2024
Activities Planned: In this week will select the topic for CPP first we will find the
problems faced by us and analyze a proper solution for it .
the Problems:
Identify the cybersecurity challenges we face, such as lack of awareness, phishing attacks,
weak authentication, or data protection gaps.
Finding Solutions:
Analyze and propose practical solutions, such as targeted awareness campaigns, stronger
authentication methods, regular training, and adoption of cybersecurity best practices.
Activities Executed: Based on the problems we have made a list of few topics .
1. Problem Identification:
2. Research and Brainstorming
3. Solution Exploration
4. Topic Selection Preparation
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: We will do the discussion of the topic that are selected by us .
1.Discussion of selected topics.
2. Finalization of 4 topics by team members
Activities Executed: In the discussion we have finalized 5 topics that will be finalized by
our mentor.
1. Discussion has been done by us .
2. we have finalized 4 topics that will be presented .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: We discussed it with our mentor they mentioned various flaws
that need to be resolved, also the pros and cons of the project, how to go ahead in
execution of the project.
1. Presented the topic in front of mentor .
2. Finalization of topic has been done .
Reason for delay if any: No, there are no delay, I was going according to the plan
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Collection of information from various sites for our
project.
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: I visited different websites for the literature survey based
on our topic
Activities Executed: I have selected a suitable frontend and backend for our project .
1. I have selected the suitable Procedure that has to followed by other members.
2. Gathered the information about the Topic .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Deciding the efficient technology for our project .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: We gathered all the related information from various
books, web sources, IEE papers etc.
2. Data Modelling
3. Environment
4. conclusion
Activities Executed: Here we have explained our presentation to the mentor it was done
by our team members
1. Problem Statement and solution
2. Data Modelling
3. Environment
4. conclusion
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: We Presented our project to the mentor, then he pointed
out the necessary changes to be made in the ppt.
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: we have prepared a portfolio that consist of task and the
responsibilities
1. Ihave created portfolio part
2. Editing part is done by me.
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: Preparation of project synopsis that will give gist of our project
1.cration of project synopsis that will contain details of project.
Activities Executed: we have prepared a synopsis that gives a panoramic view ofour
research done by us .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Planned: lastly we will create a weekly diary that consist of the activity.
1. we will discuss all the task .
2. Proper Editing of weekly diary
Activities Executed: We have Prepared a weekly diary that consist of the task that
are done by us.
1. We have discussed all the task
2. Proper editing has also been done by me .
Reason for delay if any: No, there are no delay, I was going according to the plan
1 Heeba Hawaldar
PROJECT MEMBERS: 2 Shaikh Md Ahmad
3 Aakansha Dhadwade
PROJECT DESCRIPTION:
Cybersecurity awareness is the practice of educating and informing individuals about the various cyber
threats and best practices to protect sensitive information. This project aims to enhance knowledge on
identifying potential cyber risks and implementing strategies to mitigate them. By fostering a culture
of security, it helps in preventing data breaches and ensuring overall digital safety.
CURRENT SCENARIO:
The current cybersecurity scenario is marked by an alarming rise in ransomware attacks,
with organizations like UnitedHealth and CDK Global falling victim. Many organizations
lack adequate resources to combat these threats, especially in regions like India. This ongoing
challenge demands constant vigilance and adaptation to emerging technologies. ransomware
attacks, with organizations like UnitedHealth
PROJECT OBJECTIVE:
Enhance cybersecurity awareness by educating individuals and organizations about various cyber
threats.
Equip participants with knowledge and tools needed to identify potential risks.
Implement effective security measures to mitigate cyber risks and prevent data breaches.
Foster a culture of vigilance and proactive cyber defense within organizations.
PROJECT STRATERGIES:
Education and Training: Conduct regular workshops and seminars to educate employees about
cybersecurity best practices and threat identification.
Phishing Simulations: Implement phishing simulation campaigns to assess and improve
employee awareness and response to phishing attacks.
Security Policies: Develop and enforce comprehensive security policies that outline acceptable
use, data protection measures, and incident response procedures.
Regular Updates: Ensure that all systems, software, and security tools are regularly updated and
patched to protect against vulnerabilities.
DESIERED IMPACT AND OUTCOME OF THE PROJECT:
Increased Awareness
Reduced Risk
Improved Response
Strengthened Culture
Enhanced Compliance
Empowered Workforce
A
CAPSTONE PROJECT REPORT
ON
CYBER SECURITY AWARENESS
SUBMITTED BY
NILESH VISPUTE
This is to certify that Mr. /Ms. AAKANSHA HEMANT DHAWADE from PRAVIN PATIL
COLLEGE OF DIPLOMA ENFINEERING AND TECHNOLOGY institute having Enrollment no:
2205630238 has completed project of final year having title “CYBERSECURITY AWARENESS ”
during the academic year 2024 – 2025.
-The project completed in a group consisting of three persons under the guidance of the faculty Guide.
Project Member
1. Ahmed Mubin
2. Heeba Hawaldar
3. Aakansha Dhawade
NILIESH VISPUTE
Name & Signature of Guide
Contact No:- 9766131708 o
Appendix-B
A PO’s addressed by the Capstone Project (Mention only those predominant PO’s)
a) Apply appropriate information technology related tools with understanding of the limitations .
b) Applying foundational concepts of computer science and cybersecurity..
c) Identifying cybersecurity threats and vulnerabilities, and analyzing them to propose solutions.
Communicate effectively .
d) Utilizing cybersecurity tools and techniques to enhance awareness..
e) Understanding the societal impacts of cybersecurity and promoting responsible digital
citizenship.
f) Adapting to evolving cybersecurity challenges through continuous learning.
B CO’s addressed by the Capstone Project (Mention only those predominant CO’s)
a) Understand the fundamentals of cybersecurity threats, vulnerabilities, and attack vectors.
b) Analyze real-world cybersecurity incidents and assess the effectiveness of preventive measures.
c) logically choose relevant possible Solution
d) Develop and apply strategies to enhance cybersecurity awareness in different user groups.
e) Utilize cybersecurity tools and techniques to detect and mitigate risks.
MARKS MARKS
SR NO CRITERIA
OUT OF OBTAINED
3 Project Proposal 3
8 Presentation 2
9 Defense 2
DATE
MARKS OUT DATED SIGN OF
WEEK NO
OF 10 FACULTY
FROM TO
3 10/8/2024 5/8/2024
4 17/8/2024 12/8/2024
5 26/8/2024 20/8/2024
6 9/8/2024 2/9/2024
7 18/9/2024 10/8/2024
8 25/9/2024 19/9/2024
9 3/10/2024 26/9/2024
10 10/10/2024 4/10/2024
11 19/10/2024 11/10/2024
12 26/10/2024 21/10/2024
Week No: 1 Date: From 20th Sep 2021 To 25th Sep 2021
Activities Planned: In this week we will focus on forming our project group. We will
discuss the roles, responsibilities and establish our goals.
Activities Executed:
1. we have determined the problem faced by us.
2. Proposed a proper solution for it .
Reason for delay if any: No, there are no delay, It was going according to the plan
5. Weather Forecasting
Remark: I have successfully formed a 3 member of group for CPP.
Activities Executed: : Based on the problems we have made a list of few topics.
And finding solution on it.
Reason for delay if any: No, there are no delay, It was all going according to the plan
Activities Executed:
1. We have discussed our topics with our mentor , they mentioned various problems
that need to be resolved, also the advantages and disadvantages of the topics.
Corrective Measure adopted: As all topics are not that unique, Mentor suggest the
topic to us. To work and research more information on the topic.
Remark: We have successfully presented our topics. And finalize the topic for CPP.
Activities Executed:
1. I have gathered information regarding our topic, includes problems and solution
2. Some basic knowledge has been gain.
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: I visited different websites for the literature survey based
on our topic.
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: Deciding the efficient technology for our project .
Reason for delay if any: No, there are no delay, I was going according to the plan
Corrective Measure adopted: We gathered all the related information from various
books, web sources, IEE papers etc.
Activities Executed: Here we have explained our presentation to the mentor it was done
by our team members
1. Environment
2. Future scope
3. conclusion
This topics was properly explained by me.
Reason for delay if any: No, there are no delay, I was going according to the plan
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: we have prepared a portfolio that consist of task and the
responsibilities
Editing part is done by me .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: we have prepared a synopsis that gives a panoramic view of our
research done by us .
Reason for delay if any: No, there are no delay, I was going according to the plan
Activities Executed: We have Prepared a weekly diary that consist of the task that
are done by us.
1. We have discussed all the task
2. Proper editing has also been done by me .
Reason for delay if any: No, there are no delay, I was going according to the plan
1 Heeba Hawaldar
PROJECT MEMBERS: 2 Ahmad shaikh
3 Aakansha Dhawade
PROJECT DESCRIPTION: T o e d u c a t e a n d e m p o w e r i n d i v i d u a l s a n d
organizat io nso nthe importance of cyber securit y, equipping t hem w it h
theknowledgeand tools necessary to protect themse lves against cyber
threats.
PROJECT OBJECTIVE:
Educate Employees: Provide training on fundamental cybersecurity concepts, including
phishing, password management, and safe internet practices.
Foster a Security Culture: Cultivate an environment where cybersecurity is viewed as a
shared responsibility.
Reduce Risks: Decrease the likelihood of security incidents by fostering a culture of
vigilance and responsibility among employees.
Promote Best Practices: Encourage the adoption of security best practices, such as
multi-factor authentication and regular software updates.
PROJECT STRATERGIES:
Overcome the errors and defects
Risk Management
Effective Communication
Robust Planning
Performance Monitoring