Professional Documents
Culture Documents
ON
CYBER SECURITY
ANGAD MEHTA
It is to certify that the html website on “CYBER SECURITY” has been carried out by
Angad Mehta and Hardik Pahuja of Maharaja Agrasen Institute of Management
Studies who have worked under my guidance and supervision.
They have been in constant touch with me and the matter embodied in this is authentic
and same recommended for evaluation. The project report is complete in all aspects.
This is to certify that we have completed the project titled ‘Cyber Security’ in
“M.A.I.M.S” under the guidance of “Dr. Sushila Gupta” in partial fulfillment of the
requirement for the award of Degree of Bachelor of Business Administration from
Maharaja Agrasen Institute of Management Studies, Delhi. This is an original piece
of work and I have not submitted it earlier elsewhere.
I take this opportunity to express my deep sense of gratitude to all those who have
contributed significantly by sharing their knowledge and experience in the completion
of this project work. I would like to extend my sincere thanks to all of them. I would
be failing to fulfill my duty if I do not acknowledge the deep debt owe to these
individuals.
Our heart full thanks to my guide, Dr. Sushila Gupta Without her continuous help the
project would not have been materialized in the present form. Her valuable suggestions
helped us at every step. She constantly encouraged me right from the selection of the
title of project to final preparation of my project.
TOPIC
CHAPTER 1: INTRODUCTION
3.2.2 HOME
3.2.3 INTRODUCTION
3.2.4 CYBERWARFARE
3.2.5 MEANING
3.2.6 CAUSES
3.2.7 EFFECTS
3.2.8 REFERENCES
4.1 SUMMARY
4.2 CONCLUSION
INTRODUCTION
INTRODUCTION
he exponential growth in data from business systems and the security sensors meant to
protect those businesses
the extreme and growing shortage of skilled cybersecurity personnel to analyze and
respond to incidents illuminated by this data.
Advert Threats
Identify and harden critical information infrastructure
Pursue operational architectural and technical innovations
1.3.2 Ensure Priority Response and Recovery
Leverage the enterprise in taking priority actions
Prepare for Contingencies
1.3.3 Maintain shared situational awareness
Fuse information
Distribute information effectively
Provide specialized and continuing security training to the cyber workforce
Increase systems fault tolerance
1.3.4 empower individuals and organizations to operate securely
develop the cyber workforce in public and private sectors
build a base for distributed security
1.3.5 Make and use more trustworthy cyber protocols, products, services, configurations and
architectures
Reduce Vulnerabilities
Improve usability
1.3.6 build collaborative communities
Appropriately validate Indentities in cyberspace
Increase technical and policy interoperability
Automate security processes
1.3.7 establish transparent processes
publicize the root causes and extent of adverse events in cyberspace
deploy security measures based on proven effectiveness
focus on the return on investment
incentivize performances
1.4 DATA COLLECTION:
The data for the project has been collected using the secondary sources which are as follows:
CHAPTER- 2
WELCOME PAGE
HOME PAGE
HOME
ITRODUCTION
About
CYBER WARFARE
OFFENSIVE
OPERARATIONS
DEFENSIVE
OPERATIONS
MEANING
CAUSES
How much big
is the problem
Sources of
problem
EFFECTS
Attacks that are effecting
industries at different level
REFRENCES
www.unfccc.in
t
www.unccc.int/kyoto_protocol/items/2830.bhp
www.slideshare.com
www.hindustantimes.com
www.timesofindia.com
Languages
CONCLUSION
CHAPTER-3
OUTPUT
INPUT
<html>
<head>
<title>Cyber Security</TITLE>
</head>
</font></MARQUEE></marquee>
<br>
<br>
<br>
<br>
<br>
<br>
<br><br>
<br>
<br>
<br><br>
<br>
<br>
<br><br><br><br><br><br><br><br>
</body>
</html>
3.2 HOME PAGE:
OUTPUT
INPUT
<html>
<head>
<META HTTP-EQUIV="Page-Enter"
CONTENT="RevealTrans(Duration=2.0,Transition=23)">
<title>HOME PAGE</TITLE>
</HEAD>
<frame src="side.htm">
<frame src="3.htm" name="b" scrolling=no>
</frameset>
3.2.1 TOP FRAME:
OUTPUT
INPUT
<html>
<head>
</head>
<body bgcolor="black">
<tr>
<td width=30%>
</tr>
</table>
<center>
</font>
</center>
</body>
</html>
3.2.2 HOME
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
</center>
<center><h3>
</p>
</h3>
</body>
</html>
3.2.3 INTRODUCTION:
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
</center>
<br><br><center>
</center>
3.2.4 CYBER WARFARE:
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
</center>
<br><br>
<tr>
<li><u>OFFENSIVE OPERATIONS</li><br>
<li>DEFENCIVE OPERATIONS</li><br>
</ul>
</font>
</td>
</td></table>
3.2.5 MEANING:
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
</center><br><br>
<tr>
</td>
</td></table>
3.2.6 CAUSES
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
<br><br>
<center>
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
<br><br><center><br><br>
<tr>
<li>Depending on their sources, the media and analysts quote the global cost of cyber-crime as
anywhere between $100bn and $1tr annually -different reports and surveys are based on
inconsistent parameters. This lack of continuity with respect to calculating the true cost-impact of
cyber-attacks has, arguably, become a significant impediment to addressing the problem as
effectively as the situation calls for. If we are to tackle cyber security threats we need individuals
and companies
</ul>
</td>
</td></table>
</center>
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</font>
</td>
</tr>
<tr>
<li>Only 25 percent of respondents say their organization monitors all employee and third-party file
and email activity, and 38 percent say their organization does not monitor file and email activity at
all. Only 24 percent of respondents say they are able to determine if employees are accessing
information they are not authorized to see.
</ul>
</td>
</td></table>
</center>
OUTPUT
INPUT
<html>
<head>
</head>
<center><table border=2>
<tr>
</font>
</td>
</tr>
</table>
<br><br>
</td></table>
</center>
3.3 EFFECTS:
OUTPUT
INPUT
<html>
<head>
</head>
<tr>
</td>
</tr>
</table>
<br>
</center>
3.4 REFERENCES:
OUTPUT
INPUT
<head>
</head>
<tr>
</font>
</td>
</tr>
</table>
<br>
<br><br>
<h3>WEBSITES</h3><font color="yellow">
<li>www.unfccc.int
<li>www.unfccc.int/kyoto_protocol/items/2830.bhp
<li>www.slideshare.com
<li>www.timesofindia.com
<li>www.hindustantimes.com
3.5 CONCLUSION:
OUTPUT
INPUT
<html>
<head>
</head>
"The only person who is going to give you security and the life you want is you."
</font></MARQUEE></marquee>
<font color=White>
4.1 SUMMARY:
Our project is an online website on “Cyber Security” . In this project we are giving details about
various causes and effects of cyber attacks on the internet users. Here the customers can get all the
knowledge about cyber security and its updates.
4.2 CONCLUSION
Computer security attempts to ensure the confidentiality, integrity, and availability of computing
systems and their components. Three principal parts of a computing system are subject to attacks:
hardware, software, and data. These three, and the communications among them, are susceptible to
computer security vulnerabilities. In turn, those people and systems interested in compromising a
system can devise attacks that exploit the vulnerabilities.
Cyber security is more important than ever in the wake of increasing cyber threat incidents. Big
companies like Target, LinkedIn, JP Morgan, Sony among numerous other have been on the
recieving end of Cyber attacks in the recent past. Energy, Healthcare, retail, manufacturing are the
most vulnerable industries to cyber threats with major attacks in the form of ransomeware and
breaches. The cyber security industry is one of the best industries for job growth. There has been a
continuous increase in hiring as well as an increase in salaries.
BIBLIOGRAPHY
BIBLIOGRAPHY
WEBSITES:
www.unfccc.int
www.unfccc.int/kyoto_protocol/items/2830bhop
www.slideshare.com
www.timesofindia.com
www.hindustantimes.com