Micro Project
Micro Project
Micro Project
MICRO PROJECT
Academic year: 2023- 2024
COMPUTING SECURITY
CERTIFICATE
Security (22620) for the academic year 20232- 20243 as prescribed in the curriculum.
INDEX
1 Introduction
2
Computer security threats
4
TYPES OF COMPUTER SECURITY
5 CONCLUSIONS
6 REFERENCES
INTRODUCTION
Computer security, cybersecurity or information technology
security (IT security) is the protection of computer systems and
networks from information disclosure, theft of or damage to their
hardware, software, or electronic data, as well as from the disruption
or misdirection of the services they provide.
Viruses
Computer virus is a malicious program which is loaded into the
user’s computer without user’s knowledge. It replicates itself and
infects the files and programs on the user’s PC. The ultimate goal of
a virus is to ensure that the victim’s computer will never be able to
operate properly or even at all.
Computer Worm
Phishing
Botnet
Rootkit
Keylogger
1. APPLICATION SECURITY
2. Application security is the types of cyber security which
3. developing application by adding security features within
4. applications to prevent from cyber attacks. The attacks can be
5. SQL injection, denial of service (DoS) attacks, data breaches
6. or other cyber-attacks.
7. There are some application security tools and techniques
8. such as firewalls, antivirus software, encryption, and web
9. application firewall which can help to prevent from cyberattacks.
10.A web application firewall is designed to protect web
11.applications by filtering and monitoring HTTP harmful traffic.
12.Here are the most used Web Application Firewalls are:
Fortinet FortiWeb
Citrix NetScaler App Firewall
F5 Advanced WAF
Radware AppWall
Symantec WAF
Barracuda WAF
Imperva WAF
Sophos XG Firewall
SonicWallNSa
INFORMATION SECURITY
NETWORK SECURITY
Network security is other types of IT security which process of
preventing and protecting against unauthorized intrusion into
computer networks. It is a set of rules and configurations which
designed to protect the confidentiality, integrity and accessibility of
Antivirus Software
Application Security
Data Loss Prevention (DLP)
Email Security
Firewalls
Mobile Device Security
Network Segmentation
Security Information and Event Management (SIEM)
ENDPOINT SECURITY
Human error is a major weak point which is easily exploited by
cyber criminals. End users are becoming the largest security risk in
any organizations. However, end user has no fault of their own, and
mostly due to a lack of awareness and ICT policy. They can
unintentional open the virtual gates to cyber attackers. That’s why
comprehensive security policies, procedures and protocols have to
be understood in depth by users who accessing the sensitive
information. It is better to providing security awareness training
program to them and should cover the following topics:
INTERNET SECURITY
Internet security is the important types of computer security
which has defined as a process to create set of rules and actions to
protect computers system that are connected to the Internet.
CONCLUSION
Reference
Annexure - I
MICRO-PROJECT PROPOSAL
Title of Micro-project: Computer Security
Annexure - II
MICRO-PROJECT REPORT
3.0 Title of Micro-project:- Computer Security.
6.0 Rationale –
Protection of Sensitive Information: With the increasing digitization
of data and reliance on computer systems, ensuring the confidentiality of
sensitive information is paramount. Computer security measures
safeguard against unauthorized access, disclosure, or theft of data,
protecting individuals' privacy and confidential business information.