Computer Science Proposal (Kastuv)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

COMPUTER SCIENCE

PROPOSAL
Here is where our presentation begins
Project title: Cyber security projects
Student’s name: Kastuv Aryal
School name: New horizon E.B.S School
Grade: 7 “D”
Supervisor’s name: Gajendra Gupta
Supervisor’s approval:
Submission date: 2022/11/16

Project proposal
Project title: Cyber security projects
COMPUTER SCIENCE PROPOSAL

Stage 01 Stage 02
Introduction Goal of project

Computer
Stage 03
Procedure Stage 04
Expected outcome

Stage 05
conclusions
Introduction
Since we are currently in an era where most of the tasks can
be digitized, we are more exposed to the dangers of
cyberspace. Cyber security is the protection of our computer
network and systems from malicious activities that can cause
harm to people, software, and hardware. It can put people at
risks such as phishing, scams, spams, leak of PII (Personal
Identifiable Information) compromising their privacy, and
much more. From the organization’s front, cyber crimes via
their services damage the company’s reputation and cause
compliance issues.
Goal of the project

The goal of this project is going to be explaining,


learning and specifying about the usage of cyber
security projects. The motive of this presentation
will be to make you simply and efficiently
understand about cyber security projects.
Procedure
Firstly to learn about cloud computing, we will
discuss about the types of cyber security projects,
their benefits, their services, their uses, what do
they do and how do they work?
Expected outcome
I expect that this project will make u learn about the
basic concept of cyber security projects and how to
use it carefully and responsibly.
Conclusion
The emergence of cyber security as a job can be traced
back decades, but currently, the need is increasing rapidly!
The Hindu Business Line quotes a report from Michael
Page, a global recruiting consultancy that India alone is
expected to have more than 1.5 million job vacancies by
2025. If you are a person who loves to play Sherlock
Holmes in daily life, then you are likely to ace it as a cyber
security professional. Cybersecurity is not limited to
programming alone, it extends to consultancy services,
troubleshooting, certification development, and much more,
but in this blog, we shall talk about the programming path of
this workforce.

You might also like