You are on page 1of 47

MIS PROJECT REPORT

ON

CYBER SECURITY

SUBMITTED IN PARTIAL FULFILLMENT OF THE


REQUIREMENT FOR THE AWARD OF THE

DEGREE OF BACHELOR OF BUSINESS


ADMINISTRATION 2016- 19

UNDER THE GUIDANCE OF SUBMITTED BY

Dr. SUSHILA GUPTA HARDIK PAHUJA

ANGAD MEHTA

Assistant professor, MAIMS 04061101716 (BBA 5A2S)

01161101716 (BBA 5A2S)

MAHARAJA AGRASEN INSTITUTE OF MANAGEMENT STUDIES

Affiliated to Guru Gobind Singh Indraprastha University, Delhi

PSP Area, Plot No. 1, Sector-22, Rohini Delhi-110086


CERTIFICATE

It is to certify that the html website on “CYBER SECURITY” has been carried out by
Angad Mehta and Hardik Pahuja of Maharaja Agrasen Institute of Management
Studies who have worked under my guidance and supervision.

They have been in constant touch with me and the matter embodied in this is authentic
and same recommended for evaluation. The project report is complete in all aspects.

Dr. SUSHILA GUPTA


ASSISTANT PROFESSOR (MAIMS)
STUDENT DECLARATION

This is to certify that we have completed the project titled ‘Cyber Security’ in
“M.A.I.M.S” under the guidance of “Dr. Sushila Gupta” in partial fulfillment of the
requirement for the award of Degree of Bachelor of Business Administration from
Maharaja Agrasen Institute of Management Studies, Delhi. This is an original piece
of work and I have not submitted it earlier elsewhere.

Name: HARDIK PAHUJA & ANGAD MEHTA


BBA (G) 5th Semester
University Enrollment No: 04061101716 & 01161101716
ACKNOWLEDGEMENT

I take this opportunity to express my deep sense of gratitude to all those who have
contributed significantly by sharing their knowledge and experience in the completion
of this project work. I would like to extend my sincere thanks to all of them. I would
be failing to fulfill my duty if I do not acknowledge the deep debt owe to these
individuals.

Our heart full thanks to my guide, Dr. Sushila Gupta Without her continuous help the
project would not have been materialized in the present form. Her valuable suggestions
helped us at every step. She constantly encouraged me right from the selection of the
title of project to final preparation of my project.

Name: Hardik Pahuja & Angad Mehta


BBA (G) 5th Semester
University Enrollment No: 04061101716 & 01161101716
TABLE OF CONTENTS

TOPIC

CHAPTER 1: INTRODUCTION

1.1 DATABASE INTRODUCTION


1.2 PROBLEM IN EXISTING SYSTEM
1.3 OBJECTIVES OF THE PROPOSED SYSTEM
1.3.1 Reduces exposure to cyber risk
1.3.2 Ensure priority response and recovery
1.3.3 Maintain shared situational awareness
1.3.4 Empower individual and organization to operate separately
1.3.5 Make and use more trustworthy cyber protocols, products, services,
configurations and architectures
1.3.6 Build collaborative communities
1.3.7 Establish transparent processes
1.4 DATA COLLECTION
1.4.1 Secondary Data
1.5 PROJECT PLANNING

CHAPTER 2: SYSTEM ANALYSIS AND DESIGN


2.1 OVERALL DESIGN OF THE SYSTEM

CHAPTER 3: SYSTEM CODING AND IMPLEMENTATION

3.1 WELCOME PAGE


3.2 HOME PAGE

3.2.1 TOP FRAME

3.2.2 HOME

3.2.3 INTRODUCTION

3.2.4 CYBERWARFARE

3.2.5 MEANING

3.2.6 CAUSES
3.2.7 EFFECTS

3.2.8 REFERENCES

CHAPTER 4: SUMMARY, CONCLUSION AND FUTURE SCOPE

4.1 SUMMARY

4.2 CONCLUSION

4.3 FUTURE SCOPE


CHAPTER- 1

INTRODUCTION
INTRODUCTION

1.1 DATABASE INTRODUCTION:


Almost everyone uses Internet in this world. Many of these people become victims of cyber
crime. Therefore, our project report is an online website on “Cyber Security”. In this project we
are giving detailed information about effects and causes of cyber crime. Through the website
user can get all kind of cyber crimes. . This website contains hyperlinks for cyber warfare ,
meaning and conclusion.

1.2 PROBLEM IN EXISTING SYSTEM:


 the state of being protected against the unauthorized use of information, especially
electronic data, or the measures taken to achieve this.

 Ransomware is the bane of cybersecurity, IT, data professionals, and executives.

 Serverless apps can invite cyber-attacks.

 he exponential growth in data from business systems and the security sensors meant to
protect those businesses

 the extreme and growing shortage of skilled cybersecurity personnel to analyze and
respond to incidents illuminated by this data.

1.3 OBJECTIVES OF THE PROPOSED SYSTEM:


1.3.1 Reduce exposure to cyber risk

 Advert Threats
 Identify and harden critical information infrastructure
 Pursue operational architectural and technical innovations
1.3.2 Ensure Priority Response and Recovery
 Leverage the enterprise in taking priority actions
 Prepare for Contingencies
1.3.3 Maintain shared situational awareness
 Fuse information
 Distribute information effectively
 Provide specialized and continuing security training to the cyber workforce
 Increase systems fault tolerance
1.3.4 empower individuals and organizations to operate securely
 develop the cyber workforce in public and private sectors
 build a base for distributed security
1.3.5 Make and use more trustworthy cyber protocols, products, services, configurations and
architectures
 Reduce Vulnerabilities
 Improve usability
1.3.6 build collaborative communities
 Appropriately validate Indentities in cyberspace
 Increase technical and policy interoperability
 Automate security processes
1.3.7 establish transparent processes
 publicize the root causes and extent of adverse events in cyberspace
 deploy security measures based on proven effectiveness
 focus on the return on investment
 incentivize performances
1.4 DATA COLLECTION:

The data for the project has been collected using the secondary sources which are as follows:

1.4.1 Secondary Data

 The Secondary data will be mainly collected from Internet.


1.5 PROJECT PLANNING:

Table 1 Project Planning

Enrolment No. Name Job to be done

01161101716 Angad Mehta Coding & Designing


04061101716 Hardik Pahuja Coding & Designing

CHAPTER- 2

SYSTEM ANALYSIS & DESIGN


SYSTEM ANALYSIS & DESIGN

2.1 OVERALL DESIGN OF THE SYSTEM

Figure 1 Website Map

WELCOME PAGE

HOME PAGE

HOME

ITRODUCTION
About

CYBER WARFARE

OFFENSIVE
OPERARATIONS

DEFENSIVE
OPERATIONS

MEANING
CAUSES
How much big
is the problem

Sources of
problem

Facts and figures

Cost of cyber crime

EFFECTS
Attacks that are effecting
industries at different level

REFRENCES
www.unfccc.in
t

www.unccc.int/kyoto_protocol/items/2830.bhp

www.slideshare.com

www.hindustantimes.com

www.timesofindia.com
Languages

CONCLUSION
CHAPTER-3

SYSTEM CODING & IMPLEMENTATION


SYSTEM CODING & IMPLEMENTATION

3.1 WELCOME PAGE:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

<title>Cyber Security</TITLE>

</head>

<body background="main.jpg" width=100%>


<marquee behavior="alternate" direction="up" scrollingamount=4><marquee behavior="alternate"
direction="left" scrollingamount=4>

<font face="Monotype Corsiva" color="yellow" size="6" align=center>

"CYBERSECURITY IS A SHARED RESPONSIBILITY,<br>

AND IT BOILS DOWN TO THIS:IN CYBERSECURITY,<br>

THE MORE SYSTEMS WE SECURE,<br> THE MORE SECURE WE ALL ARE"

</font></MARQUEE></marquee>

<br>

<br>

<br>

<br>

<br>

<br>

<br><br>

<br>

<br>

<br><br>

<br>

<br>
<br><br><br><br><br><br><br><br>

<center><font face="rage italic" color="white" size="28"><b>TO ENTER THE SITE</b></font>


<a href="1.htm"><font face="freestyle script" color="red" size="28"><b>&nbsp;CLICK
HERE</b></font></a></center>

</body>

</html>
3.2 HOME PAGE:

OUTPUT

INPUT

<html>

<head>

<META HTTP-EQUIV="Page-Enter"

CONTENT="RevealTrans(Duration=2.0,Transition=23)">

<title>HOME PAGE</TITLE>

</HEAD>

<frameset rows="25%,70%,5%" border="0">

<frame src="2.htm" scrolling=no>

<frameset cols="24%,76%" border="1">

<frame src="side.htm">
<frame src="3.htm" name="b" scrolling=no>

</frameset><frame src="13.htm" scrolling=no>

</frameset>
3.2.1 TOP FRAME:

OUTPUT

INPUT

<html>

<head>

</head>

<body bgcolor="black">

<table border="2" type="border:collapse" width=100%>

<tr>

<td width=30%><marquee behavior="alternate" scrollamount=6 onmouseover=stop()


onmouseout=start()>

<img src=1.jpg height=90></marquee>

<td width=40% cellpadding=0 cellspacing=0>


<font face="comic sans ms" color="#FF00CC"><center><img src="0.jpg" height=100 width=400>

<td width=30%>

<marquee behavior="alternate" scrollamount=6 onmouseover=stop() onmouseout=start()>

<img src=2.jpg height=90></marquee>

</tr>

</table>

<center>

<table frame=hsides bgcolor=#663399 width=100% border=4><tr><td>

<a href="3.htm" target="b"><font color="white" size=+1 face="Comic Sans


MS">Home</a>&nbsp;&nbsp;

<a href="4.htm" target="b"><font color="white">Introduction</a>&nbsp;&nbsp;

<a href="5.htm" target="b"><font color="white">Cyber Warfare</a>&nbsp;&nbsp;

<a href="6.htm" target="b"><font color="white">Meaning</a>&nbsp;&nbsp;

<a href="27.htm" target="b"><font color="white">Causes</a>&nbsp;&nbsp;

<a href="8.htm" target="b"><font color="white">Effects</a>&nbsp;&nbsp;

<a href="11.htm" target="b"><font color="white">References</a>&nbsp;&nbsp;

<a href="10.htm" target="b"><font color="white">Conclusion</a>&nbsp;&nbsp;


</td></tr></table>

</font>

</center>

</body>

</html>
3.2.2 HOME

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>Ensuring cybersecurity requires


the coordination of efforts throughout an information system!!</u></font></marquee>

</font>
</td>

</tr>

</table>

</center>

<center><h3>

<img src="sec.jpg" align="Center" Width="700" height="425" AUTOSTART="false">

</p>

</h3>

</body>

</html>
3.2.3 INTRODUCTION:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>INTRODUCTION</u></font>

</font>

</td>

</tr>
</table>

</center>

<br><br><center>

<img src="5.jpg" width="560" height="400">

</center>
3.2.4 CYBER WARFARE:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>CYBER WARFARE</u></font>

</font>

</td>
</tr>

</table>

</center>

<br><br>

<table width="100%" border="collapse" bordercolor="white" border="2" bgcolor="black"


cellpadding="10" cellspacing="0">

<tr>

<td width="70%"><font color="white" size="5"><ul>

<li><u>OFFENSIVE OPERATIONS</li><br>

<li>DEFENCIVE OPERATIONS</li><br>

</ul>

</font>

</td>

<td width="30%"><img src="1212.jpg" width="400" height="380">

</td></table>
3.2.5 MEANING:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>MEANING</u></font>

</font>

</td>
</tr>

</table>

</center><br><br>

<table width="100%" border="collapse" bordercolor="white" border="2" bgcolor="black"


cellpadding="10" cellspacing="0">

<tr>

<td width="70%" cellpadding="2" ALIGN="justify"><font color="white" size="5">Cybersecurity


is the protection of internet-connected systems, including hardware, software and data, from
cyberattacks.

</td>

<td width="30%"><font color="white"><img src="6.jpg" width="500" height="380">

</td></table>
3.2.6 CAUSES

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>CAUSES</u></font>

</font>

</td>
</tr>

</table>

<align="right"><a href="7.htm"><font color=white size=4>Next--></font></a>

<br><br>

<center>

<center><img src="23.png" width=600 height=350></center>


OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>CAUSES</u></font>

</font>

</td>
</tr>

</table><a href="27.htm"><font color=white size=4><--Previous</font></a>????????

<align="right"><a href="7b.htm"><font color=white size=4>Next--></font></a>

<br><br><center><br><br>

<table width="100%" bgcolor="black" cellspacing="0" cellpadding"0">

<tr>

<td width="70%"><font color="white" size="5"><ul type="disc">

<li>Depending on their sources, the media and analysts quote the global cost of cyber-crime as
anywhere between $100bn and $1tr annually -different reports and surveys are based on
inconsistent parameters. This lack of continuity with respect to calculating the true cost-impact of
cyber-attacks has, arguably, become a significant impediment to addressing the problem as
effectively as the situation calls for. If we are to tackle cyber security threats we need individuals
and companies

</ul>

</td>

<td width="30%"><font color="white"><img src="7a.png" width="350" height="300">

</td></table>

</center>
OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>CAUSES</u></font>

</font>

</td>
</tr>

</table><a href="7.htm"><font color=white size=4><--Previous</font></a>????????

<align="right"><a href="7c.htm"><font color=white size=4>Next--></font></a>

<br><br><br><br><center><table width="100%" bgcolor="black" cellspacing="0"


cellpadding"0">

<tr>

<td width="70%"><font color="white" size="5"><ul type="disc">

<li>Only 25 percent of respondents say their organization monitors all employee and third-party file
and email activity, and 38 percent say their organization does not monitor file and email activity at
all. Only 24 percent of respondents say they are able to determine if employees are accessing
information they are not authorized to see.

</ul>

</td>

<td width="30%"><font color="white"><img src="7b.png" width="350" height="300">

</td></table>

</center>
OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2>

<align="right"><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>CAUSES</u></font>

</font>

</td>
</tr>

</table>

<a href="7b.htm"><font color=white size=4><--Previous</font></a>

<br><br>

<font color="white"><img src="7c.jpg" width="700" height="400">

</td></table>

</center>
3.3 EFFECTS:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>ATTACKS THAT ARE


EFFECTING INDUSTRIES AT DIFFERENT LEVEL</u></font>
</font>

</td>

</tr>

</table>

<br>

<img src="8.jpg" width="750" height="450">

</center>
3.4 REFERENCES:

OUTPUT

INPUT

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<table border=2><table width="100%" border="collapse" bordercolor="#ffcccc" border=2


bgcolor="purple">

<tr>

<td bgcolor="purple" align=center><font size=6 color=white><u>REFERENCES</u></font>

</font>

</td>
</tr>

</table>

<br>

<font size=6 color=white><ul>

<br><br>

<h3>WEBSITES</h3><font color="yellow">

<li>www.unfccc.int

<li>www.unfccc.int/kyoto_protocol/items/2830.bhp

<li>www.slideshare.com

<li>www.timesofindia.com

<li>www.hindustantimes.com
3.5 CONCLUSION:

OUTPUT

INPUT

<html>

<head>

<meta http-equiv="Page-Enter" content="blendTrans(Duration=2)" />

</head>

<body bgcolor=black scrolling=no>

<center><marquee behavior="alternate" direction="up" height=100><marquee


behavior="alternate" direction="left" width=750>

<font face="Monotype Corsiva" color="white" size="5">

"The only person who is going to give you security and the life you want is you."
</font></MARQUEE></marquee>

</center><br><center><img src="10.jpg" width="350" height="250"


onmouseover="this.src='10.jpg';this.height=400;this.width=600"
onmouseout="this.src='10.jpg';this.height=200;this.width=350"><br>

<font color=White>

Please Move Over The Image To Enlarge</center>


CHAPTER -4

SUMMARY, CONCLUSION AND FUTURE SCOPE


SUMMARY, CONCLUSION AND FUTURE SCOPE

4.1 SUMMARY:

Our project is an online website on “Cyber Security” . In this project we are giving details about
various causes and effects of cyber attacks on the internet users. Here the customers can get all the
knowledge about cyber security and its updates.

4.2 CONCLUSION
Computer security attempts to ensure the confidentiality, integrity, and availability of computing
systems and their components. Three principal parts of a computing system are subject to attacks:
hardware, software, and data. These three, and the communications among them, are susceptible to
computer security vulnerabilities. In turn, those people and systems interested in compromising a
system can devise attacks that exploit the vulnerabilities.

4.3 FUTURE SCOPE

Cyber security is more important than ever in the wake of increasing cyber threat incidents. Big
companies like Target, LinkedIn, JP Morgan, Sony among numerous other have been on the
recieving end of Cyber attacks in the recent past. Energy, Healthcare, retail, manufacturing are the
most vulnerable industries to cyber threats with major attacks in the form of ransomeware and
breaches. The cyber security industry is one of the best industries for job growth. There has been a
continuous increase in hiring as well as an increase in salaries.
BIBLIOGRAPHY
BIBLIOGRAPHY

WEBSITES:

 www.unfccc.int
 www.unfccc.int/kyoto_protocol/items/2830bhop
 www.slideshare.com
 www.timesofindia.com
 www.hindustantimes.com

You might also like