Finalswp
Finalswp
A MICRO PROJECT
Under supervision of
Prof. S. N. Mane
Lecturer in Computer Department,
Department of Computer Engineering,
Rajendra Mane Polytechnic, Ambav, Devrukh, Ratnagiri
This is to certify that Sanika Kamble, Shruti Shevade, Purva Nakharekar, Shruti Sawant,
Tanvi Chavan students of Fourth Semester of Diploma in Computer Engineering of
Rajendra Mane Polytechnic, Ambav (Code: 1507) have submitted the micro-project
and defended the viva-voce of the term work micro-project entitled 'Software
Security' satisfactorily in the Subject Software Engineering (Sub. Code:22413) for
the Academic Year 2023-24 as prescribed in the curriculum.
This is to certify that Sanika Kamble, Shruti Shevade, Purva Nakharekar, Shruti Sawant,
Tanvi Chavan students of Fourth Semester of Diploma in Computer Engineering of
Rajendra Mane Polytechnic, Ambav (Code:1507) have submitted the proposal for
micro-project entitled 'Software Security' in the Subject Software Engineering (Sub.
Code:22413) for the Academic Year 2023-24. The micro-project proposal for
aforementioned title has been approved for its completion as per the MSBTE
instructions.
Supervisor
Date:
Place: Rajendra Mane Polytechnic, Ambav, Devrukh
Micro Project Proposal
'Software Security'
2 Finalizing the aim, methods and material 7.3.2024 14.3.2024 All group members
required.
1. Sanika Kamble : 02
2. Shruti Shevade : 04
3. Purva Nakharekar: 08
4. Shruti Sawant : 31
5. Tanvi Chavan : 32
Ms. S. N. Mane
(Supervisor)
Report
1.0 Rationale
Software security relates entirely and completely to quality. Computer systems are everywhere now-a-
days and rapid development and expansion of network-based applications have changed the computing
world in the last decade.
However, this overwhelming success has a drawback, means most software-controlled systems are prone to
attacks both by internal and external users of the highly connected computing systems. These software
systems must be engineered with reliable protection mechanisms, while still delivering the expected value of
the software to their customers within the budgeted time and cost.
Software security is an idea implemented to protect software against malicious attack and other hacker
risks so that the software continues to function correctly under such potential risks. Security is necessary
to provide integrity, authentication and availability.
4. Authentication: Verification that the people with whom we are corresponding actually are who
5. Availability: Availability is defined as the requirements should focus on how available a resource
should be for authorized users.
Fig. depicts the stages of Software Security Life Cycle (SSLC). Recently, the most of the researchers have
shifted from a project-oriented view to a product life cycle-oriented view of software security and trying
to understand the characteristics of security demands.
SSLC Model and Security Management Framework:
• The Software Security Life Cycle is confined to project level (Fig. 5.27) has mainly four stages. The
characteristics and function of the stages are as under:
1. Introduction Stage: The users, in this stage, are those who devoted software. During this stage the major
concerns are how to make the software works. The security mechanism is concern in this stage.
2. Growth Stage: In this stage, system usage is up and the number of system attacks reported is important. As
the software enters this stage, the monitoring of system attacks and users problem reports is an
important concern. In order to manage the increasing security demand, it is critical to allocate more
programmers copying with the increasing countermeasure requests to prevent accumulating
dissatisfaction. The security tolerance is the main concern in this stage.
3. Maturity Stage: After deploying the system, the users experience the growth of enhancement requests in
the maturity phase. At this stage, the focus is enhancement of projects. Security experts are expanding the
software functions and trying to prolong the life of the software.
4. Decline Stage: At this stage, the software is easy to venerate, and attackers can easily exploit it. The
users require software renovation. In this phase, production team must choose between integrating the
software with other security mechanism or developing a substitute software.
7.0 Introduction to DevOps
The field of DevOps has become popular and commonplace in recent years. DevOps has provided
speed and quality benefits with continuous development and deployment methods, but it does not
guarantee the security of an entire organization.
The field of DevOps has become popular and commonplace in recent years. DevOps has provided
speed and quality benefits with continuous development and deployment methods, but it does not
guarantee the security of an entire organization.
DevOps is a set of practices intended to reduce the time between committing a change to a system
and the change being placed into normal production, while ensuring high quality.
DevOps security refers to the discipline and practice of safeguarding the entire DevOps
environment through strategies, policies, processes, and technology. Security should be built into
every part of the DevOps lifecycle, including inception, design, build, test, release, support,
maintenance, and beyond.
8.0 Skills Developed
1. The project helped to develop attitude of enquiry Students identified problems
and reached to its solution.
2. The project taught the skills of working as an effective team member. Every
member participated in group work and completed the distributed task in.
3. The students also leaned to work independently for the responsibility undertaken.
4. The skills of collecting the data required to solve the problem has been developed.
5. This project also taught how to analyse the data collected and how to generate
the useful information from it.
6. Every member understood the significance of target setting why persistent work
is required to complete it.
7. Problem solving skills, time management skills have also been developed.
8. The most importantly student learnt the process of preparing a report, chart and
presenting it to defence the work.
9.0 Conclusion
Rapid progress in computer technology and software has led to the situation where powerful
packages such as MSC Mare can be used on desktop systems.
This made it possible to study the effect of damage on the dynamics of a structure such as a blade
prior to constructing an experimental test structure.
From this analysis it could clearly be seen that certain mode shapes were more susceptible to
damage than others. These findings correlated well with findings during a literature study.
It was also found that the type of element used was extremely important. Higher order elements
gave superior accuracy although they were computationally more expensive.
First order solid elements are not a real proposition due to their poor performance in bending.
10.0 Reference
https://www.scribd.com/document/428280918/Cgr-Project
https://projectchampionz.com.ng/projecttopics/computer-graphics-cg-project-topics-and-
materials/