0% found this document useful (0 votes)
109 views22 pages

Micro Project

Uploaded by

tohefo5721
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views22 pages

Micro Project

Uploaded by

tohefo5721
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

lOMoARcPSD|51177378

Micro Project

Data communication and Computer Networks (Ajeenkya DY Patil University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Jon Deep ([email protected])
lOMoARcPSD|51177378

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

AJEENKYA D. Y. PATIL SCHOOL OF ENGINEERING

(SECOND SHIFT POLYTECHNIC)

MICRO PROJECT
Academic year: 2023- 2024

TITLE OF THE PROJECT

COMPUTING SECURITY

Program: AIML Engineering Program code: AN- 6I


Course: NIS Course code: 22620

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

CERTIFICATE

This is to cer fy that the following students -

Roll No Name of the students Exam seat number


16 Vishal Balaji Biradar 2216490298

of Diploma in ARTIFICIAL INTELLIGENCE & MACHINE LEARNING of Ins tute, Ajeenkya.


D. Y. Pa l School of Engineering (Second Shi Polytechnic) Ins tute Code – 1649, has

completed the Micro-Project sa sfactorily in Subject – Network And Information

Security (22620) for the academic year 20232- 20243 as prescribed in the curriculum.

Place : PUNE Date:

Subject Teacher Head of the Department Principal

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

INDEX

SR.NO. CONTENT PAGE NO.

1 Introduction

2
Computer security threats

3 COMPUTER SECURITY IMPORTANT

4
TYPES OF COMPUTER SECURITY

5 CONCLUSIONS

6 REFERENCES

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

INTRODUCTION
Computer security, cybersecurity or information technology
security (IT security) is the protection of computer systems and
networks from information disclosure, theft of or damage to their
hardware, software, or electronic data, as well as from the disruption
or misdirection of the services they provide.

The field is becoming increasingly significant due to the


increased reliance on computer systems, the Internet and wireless
network standards such as Bluetooth and Wi-Fi, and due to the
growth of "smart" devices, including smartphones, televisions, and
the various devices that constitute the "Internet of things". Owing to
its complexity, both in terms of politics and technology,
cybersecurity is also one of the major challenges in the
contemporary world.
Computer security, the protection of computer systems and
information from harm, theft, and unauthorized use. Computer
hardware is typically protected by the same means used to protect

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

other valuable or sensitive equipment, namely, serial umbers, doors


and locks, and alarms. The protection of information and system
access, on the other hand, is achieved through other tactics, some of
them quite complex.
The security precautions related to computer information and
access address four major threats: (1) theft of data, such as that of
military secrets from government computers; (2) vandalism,
including the destruction of data by a computer virus; (3) fraud, such
as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected
personal financial or medical data from a large database. The most
basic means of protecting a computer system against theft,
vandalism, invasion of privacy, and other irresponsible behaviours is
to electronically track and record the access to, and activities of, the
various users of a computer system. This is commonly done by
assigning an individual password to each person who has access to a
system. The computer system itself can then automatically track the
use of these passwords, recording such data as which files were
accessed under particular passwords and so on. Another security
measure is to store a system’s data on a separate device, or medium,
such as magnetic tape or disks, that is normally inaccessible
throughthe computer system. Finally, data is often encrypted so that
it can be deciphered only by holders of a singular encryption key.
(See data encryption.)

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Computer security threats

Computer security threats are possible dangers that can


possibly hamper the normal functioning of your computer. In the
present age, cyber threats are constantly increasing as the world is
going digital. The most harmful types of computer security are:

Viruses
Computer virus is a malicious program which is loaded into the
user’s computer without user’s knowledge. It replicates itself and
infects the files and programs on the user’s PC. The ultimate goal of
a virus is to ensure that the victim’s computer will never be able to
operate properly or even at all.

Computer Worm

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Computer worm is a software program that can copy itself


from one computer to another, without human interaction. The
potential risk here is that it will use up your computer hard disk
space because a worm can replicate in greate volume and with great
speed.

Phishing

Disguising as a trustworthy person or business, phishers


attempt to steal sensitive financial or personal information through
fraudulent email or instant messages. Phishing in unfortunately very
easy to execute. You are deluded into thinking it’s the legitimate ail
and you may enter your personal information.

Botnet

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Botnet is a group of computers connected to the internet, that


have been compromised by a hacker using a computer virus. An
individual computer is called ‘zombie computer’. The result of this
threat is the victim’s computer, which is the bot will be used for
malicious activities and for a larger scale attack like DDoS.

Rootkit

Rootkit - is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence.
Once a rootkit has been installed, the controller of the rootkit will be
able to remotely execute files and change system configurations on
the host machine.

Keylogger

Also known as a keystroke logger, keyloggers can track the real-


time activity of a user on his computer. It keeps a record of all the
keystrokes made by user keyboard. Keylogger is also a very powerful

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

threat to steal people’s login credential such as username and


password. These are perhaps the most common security threats that
you’ll come across. Apart from these, there are others like spyware,
wabbits, scareware, bluesnarfing and many more. Fortunately, there
are ways to protect yourself against these attacks.

COMPUTER SECURITY IMPORTANT?


Computers are very essential part of our daily lives andit plays
important roles in our lives. So, the security of a computer is
important because it protects your information and helps to prevent
from viruses and malware. In this post, we will discuss on why is
computer security important of our lives. Computer security is also
known as cyber security or IT security which mainly used for
protection of computer system such as hardware and software.

WHY IS COMPUTER SECURITY IMPORTANT?


The main purpose of the security is the preventing and
detecting unauthorized access of computer system. It guarantees to
safe processing and storage of business, healthcare and sensitive
information. Cyber security provides the Confidentiality, Integrity
and Availability for all components of a computer system.

Here are the some reasons why is computer security important:

TO PROTECT PERSONAL INFORMATION


To prevent from cyber security risk you have to protect your
personal information. IT security is the first prime issue to protect
your personal and others information. By the way you can keep your
information secure using the following tips:
● Use antivirus Software

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

● Update operating system


● Use strong password
● Backup your data
● Lock your computer
● Avoid Phishing Emails
● protect your personal information
TO PROTECT ORGANIZATION PROPERTIES
It is very important to ensure the organization’s computer data
because every organization has many sensitive assets and
information. So, without computer or IT security you can’t
guarantee the security of organization properties.

TO PREVENTION FROM DATA THEFT


Data theft is act of stealing sensitive information such as bank
account details, credit card information, passwords, and documents
which stored on computers, servers, or other devices. The most
common reasons of data breaches are as follows:
● Weak and stolen credentials
● Malicious insiders
● Application vulnerabilities
● Human Error
So, prevent from data theft you have to ensure your device
security by using endpoint security, lock down your computer,
Identify critical data and use authentication.

TO PREVENT FROM VIRUSES AND MALWARE

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Computer security is also important to protect from computer


viruses and malware’s. A computer virus or malware can corrupt or
delete your sensitive data, damage your hard disk and it spreads
from one computer to another using email program and others. So,
you have to protect your computer from viruses and malware using
following these tips:
● Keep your software up to date
● Use free antivirus software
● Use a strong password
● Don’t click on links within emails
● Back up your computer
● Use a pop-up blocker

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

TYPES OF COMPUTER SECURITY

In this post, we will focus on the different types of computer


security such as application security, network security, internet
security, data security, information security and end user security.

1. APPLICATION SECURITY
2. Application security is the types of cyber security which
3. developing application by adding security features within
4. applications to prevent from cyber attacks. The attacks can be
5. SQL injection, denial of service (DoS) attacks, data breaches
6. or other cyber-attacks.
7. There are some application security tools and techniques
8. such as firewalls, antivirus software, encryption, and web
9. application firewall which can help to prevent from cyberattacks.
10.A web application firewall is designed to protect web
11.applications by filtering and monitoring HTTP harmful traffic.
12.Here are the most used Web Application Firewalls are:

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Fortinet FortiWeb
Citrix NetScaler App Firewall
F5 Advanced WAF
Radware AppWall
Symantec WAF
Barracuda WAF
Imperva WAF
Sophos XG Firewall
SonicWallNSa

INFORMATION SECURITY

Information security (IS) is the types of computer security


which refers to the process and methodology to protect the
confidentiality, integrity and availability of computer system from
unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which
ensure confidentiality, integrity, and availability of data, without
affecting organization productivity.

NETWORK SECURITY
Network security is other types of IT security which process of
preventing and protecting against unauthorized intrusion into
computer networks. It is a set of rules and configurations which
designed to protect the confidentiality, integrity and accessibility of

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

computer networks system and information using both software and


hardware technologies.

NETWORK SECURITY METHODS


There are different components or methods to improve network
security. Here, we have mentioned the most common network
security components.

Antivirus Software
Application Security
Data Loss Prevention (DLP)
Email Security
Firewalls
Mobile Device Security
Network Segmentation
Security Information and Event Management (SIEM)

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Virtual Private Network (VPN)


Web Security
Wireless Security
Network Access Control (NAC)

ENDPOINT SECURITY
Human error is a major weak point which is easily exploited by
cyber criminals. End users are becoming the largest security risk in
any organizations. However, end user has no fault of their own, and
mostly due to a lack of awareness and ICT policy. They can
unintentional open the virtual gates to cyber attackers. That’s why
comprehensive security policies, procedures and protocols have to
be understood in depth by users who accessing the sensitive
information. It is better to providing security awareness training
program to them and should cover the following topics:

Cyber security and its importance


Phishing and Social Engineering attack
Password creation and usages
Device Security
Physical Security
Learn More About Social Engineering Attack

INTERNET SECURITY
Internet security is the important types of computer security
which has defined as a process to create set of rules and actions to
protect computers system that are connected to the Internet.

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

CONCLUSION

Now that you have completed this webquest on Computer


Security you are now aware of the possible security treats to
computer systems. Not only that, but you are now better ableto
protect your computers as well as recommendsecuritymeasures to
others.
Have you ever heard the terms Computer Virus, worms,
Trojans, Cybercrime, hackers?
Putting your computer in a bank vault with security officers
with shot guns and Rin-tin-tin will not protect yourcomputer’s data.
To protect your data you will have to incorporate the use of
special Data Security software along with the Physical Security
methods you have learned.
Have a look at Computer Security Threats as it relates to data
security.

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Reference

Principles of Computer Security" by Wm. Arthur Conklin,


Greg White, Chuck Cothren, Roger L.

Davis, and Dwayne Williams.

"Computer Security: Principles and Practice" by William


Stallings and Lawrie Brown.

"Network Security Essentials: Applications and Standards" by


William Stallings.

"Introduction to Computer Security" by Michael Goodrich and


Roberto Tamassia.

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Dr. D Y Patil Educational Enterprises Charitable Trust’s


AJEENKYA D. Y. PATIL SCHOOL OF ENGINEERING,
(POLYTECHNIC)
Approved by AICTE NO. West / 1-3847411/2010/ New Dated 13 July
2010/DTE/Affiliated to MSBTE, Mumbai.
Dr. D Y Patil Knowledge City, Charholi Bk, Via Lohegaon, Pune –
412105

Annexure - I

MICRO-PROJECT PROPOSAL
Title of Micro-project: Computer Security

1.0 Aims/Benefits of the Micro-project :– The aim of computer security is to


protect computer systems, networks, and data from unauthorized access,
alteration, or destruction. It encompasses various techniques, policies, and
technologies designed to safeguard information and ensure the confidentiality,
integrity, and availability of digital assets. Key objectives of computer security
include.

2.0 Course Outcomes Addressed – Course outcomes for a computer security


course may vary depending on the specific curriculum and objectives of the
course. However, here are some common outcomes that such a course may
aim to address.

3.0 Proposed Methodology :– Proposing a methodology for computer


security involves outlining the steps and processes that will be followed to
achieve the desired outcomes. Here's a general methodology for computer
security.

4.0 Action Plan –

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Sr. Planned Planned Name of


No. Details of Activity Start Date Finish responsible Team
Date Members
1 Discussion and finalization 01/01/2024 10/01/2024 Vishal Biradar
of topic
2 Preparation and submission of 10/01/2024 15/01/2024 Vishal Biradar
abstract
3 Literature Review 20/01/2024 25/01/2024 Vishal Biradar
4 Collection of data 02/02/2024 02/02/2024 Vishal Biradar
5 Collection of data 13/02/2024 17/02/2024 Vishal Biradar
6 Discussion and outline of 17/02/2024 27/02/2024 Vishal Biradar
content
7 Formulation of content 27/02/2024 27/02/2024 Vishal Biradar
8 Editing of content 27/02/2024 27/02/2024 Vishal Biradar
9 Editing of content 28/02/2024 28/02/2024 Vishal Biradar
10 Proof reading of content 03/03/2024 03/03/2024 Vishal Biradar
11 Compilation of report 05/03/2024 06/03/2024 Vishal Biradar
12 Compilation of report 08/03/2024 09/03/2024 Vishal Biradar
13 Presentation 09/03/2024 12/03/2024 Vishal Biradar
14 Seminar / /2024 / /2024 Vishal Biradar
15 Viva voce / /2024 / /2024 Vishal Biradar
16 Final submission of micro- / /2024 / /2024 Vishal Biradar
project

5.0 Resources Required –

Sr. Name of Resource/material Specifications Quantity Remarks


No.

1 LAPTOP 8GB RAM, 1


512GB SSD
2 NETWORK Wi-Fi 1

Names of Team Members with Roll nos.

1. Vishal Balaji Biradar

(Dhanshree Patil of Subject Teacher)

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

Dr. D Y Patil Educational Enterprises Charitable Trust’s


AJEENKYA D. Y. PATIL SCHOOL OF ENGINEERING,
(POLYTECHNIC)
Approved by AICTE NO. West / 1-3847411/2010/ New Dated 13 July
2010/DTE/Affiliated to MSBTE, Mumbai.
Dr. D Y Patil Knowledge City, Charholi Bk, Via Lohegaon, Pune – 412105

Annexure - II

MICRO-PROJECT REPORT
3.0 Title of Micro-project:- Computer Security.

6.0 Rationale –
Protection of Sensitive Information: With the increasing digitization
of data and reliance on computer systems, ensuring the confidentiality of
sensitive information is paramount. Computer security measures
safeguard against unauthorized access, disclosure, or theft of data,
protecting individuals' privacy and confidential business information.

7.0 Aim/Benefits of the Micro-project – Report on Computer Security.

8.0 Course Outcomes Achieved :–


Based on the proposed methodology for computer security
and considering the specific objectives of the course, here are some
potential outcomes that students may achieve upon completing a
computer security course.

9.0 Literature Review –

A literature review on computer security would typically encompass


a wide range of research studies, articles, and academic papers covering various
aspects of cybersecurity. Here's a structured overview of potential themes and
topics that could be included in such a review.

Downloaded by Jon Deep ([email protected])


lOMoARcPSD|51177378

11.0 Actual Resources Required –

Sr. Name of Resource/material Specifications Quantity Remarks


No.

1 LAPTOP 8GB RAM, 1


512GB SSD
2 NETWORK Wi-Fi 1

13.0 Skill Developed/Learning outcome of this Micro-Project –


For a micro-project in computer security, focusing on a specific aspect of
cybersecurity, such as implementing a secure authentication mechanism or
conducting a vulnerability assessment, can help students develop valuable skills
and achieve specific learning outcomes. Here's an example of the skills
developed and learning outcomes achieved through a micro-project on
implementing a secure authentication mechanism.

14.0 Applications of this Micro-Project –


To better address your query, I need clarity on what "this Micro-Project"
refers to. Could you please provide more context or specify the micro-project you're
referring to in the context of computer security? Once I have a clear understanding
of the project, I can outline the skills developed and potential applications
accordingly.

(Dhanshree Patil of Subject)

Downloaded by Jon Deep ([email protected])

You might also like