0% found this document useful (0 votes)
8 views17 pages

Nisfinal 4

This project report focuses on computing security, highlighting its importance in protecting computer systems and networks from various threats such as viruses, phishing, and data theft. It outlines different types of computer security, including application, network, and information security, along with methods to enhance security. The report concludes by emphasizing the need for awareness and protective measures to safeguard sensitive information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views17 pages

Nisfinal 4

This project report focuses on computing security, highlighting its importance in protecting computer systems and networks from various threats such as viruses, phishing, and data theft. It outlines different types of computer security, including application, network, and information security, along with methods to enhance security. The report concludes by emphasizing the need for awareness and protective measures to safeguard sensitive information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

A Project Report On “Computing Security”

ABSTRACT
This report as been prepared to the “Develop Bank
Management Application ”.This document is the final report
of the findings and recommendations of the Network
Information & Security for final year . Computer
Programming remains one of the most exciting and rapidly
growing computer fields.

Computer Programming has now become a common element


in user interfaces, data visualization, television commercial,
motion pictures, and many-many other application. With the
advantages of Computer Programming, modern subject, we
can be able to design different applications and tools which
can be beneficial in our daily life. Besides, some entertaining
applications can also be designed using Graphics such as
Games ,Photo Effects etc. Many people have contributed to
this project in variety of ways. To all of them we would
like to express our appreciation .

Sushganga Polytechnic Wani 1|Page


A Project Report On “Computing Security”

INDEX
Sr.No Content

1) Introduction

2) Computer security threats

3) Computer security important?

4) Here are the some reasons why is computer


security important:

5) Types of computer security

6) Network Security Methods

7) Conclusion

Sushganga Polytechnic Wani 2|Page


A Project Report On “Computing Security”

INTRODUCTION
Computer security, cyber security or information technology
security (IT security) is the protection of computer systems and
networks from information disclosure, theft of or damage to
their hardware, software, or electronic data, as well as from the
disruption or misdirection of the services they provide

Fig. Computer Security


The field is becoming increasingly significant due to the
increased reliance on computer systems, the Internet and
wireless network standards such as Bluetooth and Wi-Fi, and
due to the growth of "smart" devices, including smartphones,
televisions, and the various devices that constitute the "Internet
of things". Owing to its complexity, both in terms
measure is to store a system’s data on a separate device, or
medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is often

Sushganga Polytechnic Wani 3|Page


A Project Report On “Computing Security”
encrypted so that it can be deciphered only by holders of a
singular encryption key. (See data encryption.)

COMPUTER SECURITY
THREADS
. Computer security threats are possible dangers that can
possibly hamper the normal functioning of your computer. In
the present age, cyber threats are constantly increasing as the
world is going digital. The most harmful types of computer
security are:

1) Viruses

.
Fig .Virus
Computer virus is a malicious program which is loaded into the
user’s computer without user’s knowledge. It replicates itself
and infects the files and programs on the user’s PC. The
ultimate goal of a virus is to ensure that the victim’s computer
will never be able to operate properly or even at all.

Sushganga Polytechnic Wani 4|Page


A Project Report On “Computing Security”
2) Computer Worm

Fig. Computer Worm


. Computer worm is a software program that can copy itself
from one computer to another, without human interaction. The
potential risk here is that it will use up your computer hard
disk space because a worm can replicate in great volume and
with
great speed.

3) Phishing

Fig .Phishing
. Disguising as a trustworthy person or business,
phishers attempt to steal sensitive financial or personal
information through fraudulent email or instant messages.
Phishing in
unfortunately very easy to execute. You are deluded
into thinking it’s the legitimate mail and you may enter
your personal information.

Sushganga Polytechnic Wani 5|Page


A Project Report On “Computing Security”
4) Botnet

Fig. Botnet
. Botnet is a group of computers connected to the internet,
that have been compromised by a hacker using a computer
virus.
An individual computer is called ‘zombie computer’.
The result of this threat is the victim’s computer, which is
the bot will be used for malicious activities and for a larger
scale attack like DDoS.

5) Rootkit

Fig. Rootkit
Rootkit - is a computer program designed to provide continued
privileged access to a computer while actively hiding its
presence. Once a rootkit has been installed, the

Sushganga Polytechnic Wani 6|Page


A Project Report On “Computing Security”
controller of the rootkit will be able to remotely execute files
and change system configurations on the host machine.

6) Keylogger

Fig. Key Logger


Also known as a keystroke logger, keyloggers can track the real
time activity of a user on his computer. It keeps a record of all
the keystrokes made by user keyboard.
Keylogger is also a very powerful threat to steal people’s login
credential such as username and password.

These are perhaps the most common security threats that you’ll
come across. Apart from these, there are others like spyware,
wab bits, scareware, blue snarfing and many more.
Fortunately, there are ways to protect yourself against these
attacks.

Sushganga Polytechnic Wani 7|Page


A Project Report On “Computing Security”

COMPUTER SECURITY
IMPORTANCE?
Computers are very essential part of our daily lives andit plays
important roles in our lives. So, the security of a computer is
important because it protects your information and helps to
prevent from viruses and malware. In this post, we will discuss
on why is computer security important of our lives.
Computer security is also known as cyber security or IT
security which mainly used for protection of computer system
such as hardware and software.

WHYIS COMPUTER
SECURITY
IMPORTANT?
The main purpose of the security is the preventing and
detecting unauthorized access of computer system. It
guarantees to safe processing and storage of business,
healthcare and sensitive information. Cyber security provides
the Confidentiality, Integrity and Availability for all
components of a computer system.
Here are the some reasons why is computer security
important:

1. TOPROTECTPERSO NAL INFORMATION

Sushganga Polytechnic Wani 8|Page


A Project Report On “Computing Security”
To prevent from cyber security risk you have to protect your
personal information. IT security is the first prime issue to
protect your personal and others information. By the way you
can keep your information secure using the following tips:

● Use antivirus Software

● Update operating system

● Use strong password

● Backup your data

● Lock your computer

● Avoid Phishing Emails

● Protect your personal information

2. TOPROTECTORGANIZA TION PROPERTIES


It is very important to ensure the organization’s computer data
because every organization has many sensitive assets and
information. So, without computer or IT security you can’t
guarantee the security of organization properties.

3. TOPREVENTIONFROMDATATHE FT
Data theft is act of stealing sensitive information such as bank
account details, credit card information, passwords, and

Sushganga Polytechnic Wani 9|Page


A Project Report On “Computing Security”
documents which stored on computers, servers, or other
devices. The most common reasons of data breaches are as
follows:

● Weak and stolen credentials

● Malicious insiders

● Application vulnerabilities

● Human Error
So, prevent from data theft you have to ensure your device
security by using endpoint security, lock down your
computer, Identify critical data and use authentication

4.TOPREVENTFROMVIRUSES AND MALWARE


Computer security is also important to protect from computer
viruses and malware’s. A computer virus or malware can
corrupt or delete your sensitive data, damage your hard disk
and it spreads from one computer to another using email
program and others. So, you have to protect your computer
from viruses and malware using following these tips:

● Keep your software update

● Use free antivirus software

● Use a strong password

Sushganga Polytechnic Wani 10 | P a g e


A Project Report On “Computing Security”
● Don’t click on link swithinemails

● Backup your computer

● Use a pop-up blocker

TYPES OF COMPUTER
SECURITY
In this post, we will focus on the different types of computer
security such as application security, network security, internet
security, data security, information security and end user
security.

1. APPLICATIONSECURITY
Application security is the types of cyber security which
developing application by adding security features within
applications to prevent from cyber attacks. The attacks can be
SQL injection, denial of service (DoS) attacks, data breaches or
other cyber-attacks.
There are some application security tools and techniques such
as firewalls, antivirus software, encryption, and web
application firewall which can help to prevent from cyber-
attacks.

Sushganga Polytechnic Wani 11 | P a g e


A Project Report On “Computing Security”
A web application firewall is designed to protect web
applications by filtering and monitoring HTTP harmful traffic.
Here are the most used Web Application Firewalls are:

Fig. Application Security


Fortinet Forti Web

Citrix Net Scaler App Firewall F5

Advanced WAF Radware


App Wall Symantec

WAF

Barracuda WAF

Imperva WAF

Sophos XG Firewall

Sonic Wall NSa

2. INFORMATIONSECURITY

Sushganga Polytechnic Wani 12 | P a g e


A Project Report On “Computing Security”
Information security (IS) is the types of computer security
which refers to the process and methodology to protect the
confidentiality, integrity and availability of computer system
from unauthorized access, use, modification and destruction.
Information security focuses on the CIA triad model, which
ensure confidentiality, integrity, and availability of data,
without affecting organization productivity.

3. NETWORKSECURITY
Network security is other types of IT security which process of
preventing and protecting against unauthorized intrusion into
computer networks.
It is a set of rules and configurations which designed to protect
the confidentiality, integrity and accessibility of computer
networks system and information using both software and
hardware technologies.

Fig. Network Security

Sushganga Polytechnic Wani 13 | P a g e


A Project Report On “Computing Security”

NETWORK SECURITY
METHODS
There are different components or methods to improve network
security. Here, we have mentioned the most common network
security components.
Antivirus Software Application

Security Behaviour Analytics

Data Loss Prevention (DLP) Email

Security

Firewalls

Mobile Device Security

Network Segmentation
Security Information and Event Management (SIEM)
Virtual

Private Network (VPN)

Web Security

Wireless Security

Network Access Control(NAC)

Sushganga Polytechnic Wani 14 | P a g e


A Project Report On “Computing Security”

4. ENDPOINTSECURITY
Human error is a major weak point which is easily exploited by
cyber criminals. End users are becoming the largest security
risk in any organizations.
However, end user has no fault of their own, and mostly due to
a lack of awareness and ICT policy. They can unintentional
open the virtual gates to cyber attackers.
That’s why comprehensive security policies, procedures and
protocols have to be understood in depth by users who
accessing the sensitive information.
It is better to providing security awareness training program
should cover the following topics: Cyber security and its
importance Phishing and Social Engineering attack
Password creation and usages Device Security

Physical Security

Learn More About Social Engineering Attack

5. INTERNETSECURITY
Internet security is the important types of computer security
which has defined as a process to create set of rules and actions
to protect computers system that are connected to the Internet

15 | P a g e

Sushganga Polytechnic Wani


A Project Report On “Computing Security”

CONCLUSION
Now that you have completed this web quest on Computer
Security you are now aware of the possible security treats to
computer systems. Not only that, but you are now better able to
protect your computers as well as recommend security measures
to others. Have you ever heard the terms Computer Virus,
worms, Trojans, Cybercrime, hackers?
Putting your computer in a bank vault with security officers
with shot guns and Rin-tin-tin will not protect your computer’s
data. To protect your data you will have to incorporate the
use of special Data Security software along with the Physical
Security methods you have learned. Have a look at Computer
Security Threats as it relates to data security.

16 | P a g e

Sushganga Polytechnic Wani


A Project Report On “Computing Security”

Thank you

17 | P a g e

Sushganga Polytechnic Wani

You might also like