You are on page 1of 7

“Transforming Live, Inventing Future”

A
Seminar Report
On
An International Study on a Risk of Cyber
Terrorism
By
Suraj S. Rane

DEPARTMENT OF COMPUTER ENGINEERING


K.C.E.S’s COLLEGE OF ENGINEERING &
INFORMATIONTECHNOLOGY, JALGAON 425001.
[2018– 2019]
“Transforming Live, Inventing Future”

A
Seminar Report
on
An International Study on a Risk of Cyber
Terrorism
In partial fulfillment of requirements for the degree of
Bachelor of Technology
In
Computer Engineering
Submitted By
Suraj S. Rane

Under the Guidance of


Mrs.Leena Waghulde

DEPARTMENT OF COMPUTER ENGINEERING


K.C.E.S’s COLLEGE OF ENGINEERING &
INFORMATIONTECHNOLOGY, JALGAON 425001.
[2018-2019]
CERTIFICATE

This is to certify that Third Year Seminar entitled “An International Study on a Risk of
Cyber Terrorism” has been submitted by Suraj Sunil Rane under my guidance in partial
fulfillment of the degree of Bachelor of Technology in Computer Engineering of Dr.
Babasaheb Ambedkar Technological University (DBATU), Jalgaon during the academic year
2019-2020 (Semester-I).

Date:

Place: Jalgaon

Guide Head, Computer Department

Mrs. Leena Waghulde Mrs. Minal T. Kolhe

Principal
KCES’s COEIT, Jalgaon
ACKNOWLEDGEMENT

I have taken efforts in this seminar. However, it would not have been possible without the
kind support and help of many individuals and institute. I would like to extend my sincere
thanks to all of them.

It is my privilege and pleasure to express my profound sense of respect gratitude and


indebtedness to Principal of KCES’s COEIT, Jalgaon for guiding and providing facilities for
the successful completion of us seminar.

I would like to express my special gratitude and thanks to Head of Computer Department
Mrs.M.T.Kolhe for giving us such attention and time.

We are highly indebted to, Mrs.Leena waghulde for their guidance and constant supervision
as well as for providing necessary information regarding the seminar and also for their
support in completing the seminar report.

I would like to express my gratitude towards my faculty members of KCES’s


COEIT,Jalgaon for their kind co-operation and encouragement which help us in completion
of this seminar report.

Last but not least we wish to acknowledge my parents and friends for giving more strength
and encouragement.

Suraj S. Rane
ABSTRACT

Cyber terrorism has been a risk since the advent of the Internet. Technology has developed at
a rapid pace, and likewise, the risk and impact of cyber terrorism. It is pertinent that secure
and updated mechanisms are in place to mitigate the risk of cyber terrorism, with
international cooperation and collaboration to further enhance investigation and information
gathering. An International Study on the Risk Of Cyber Terrorism discusses mechanisms
such as security applications, security policies, comprehending education programs,
international co-operation, monitoring and Artificial Intelligence (AI) and monitoring, using
and disrupting approach (M.U.D). Implementations of all the mechanisms allows computer
network and systems to be less vulnerable and manages the risk of cyber terrorism because
each mechanisms possess separate functions for combating cyber terrorism. Various
initiatives has been introduced by respective bodies from all over the world in order to ensure
that the threat of cyber terrorism is controllable. However, the threat of cyber terrorism
continuous to increase due to the constant development of Internet-based platforms. Thus,
law enforcements, policies, practices and necessary measures should continue developing
contemporarily to the development of computer technology.

Keywords:- Cyber terrorism, Artificial Intelligence (AI), Monitoring, Using and Disrupting
(M.U.D).
INDEX

Chapter No. Content Page No.

Abbreviations i

Figure Index Iii

1 INTRODUCTION 1

1.1 Overview 2

1.2 Purpose 4

1.2.1 What is self drivingcar ? 4

1.2.2 Why do we need sef driving car ? 5

1.3 Scope 5

1.4 Summary 5

2 LITERATURE SURVEY 6

2.1 History 6

3 METHODOLOGY 8

3.1 Software algorithm 8

3.1.1 Supervised vs unsupervised learning 9

3.2 Some common machine learning algorithm 9

3.2.1 Scale invariant feature transform 9

3.2.2 Ada Boost 10

3.2.3 Texton Boost 11

3.2.4 Histrogram of oriented gradients 12

3.3 Cruise control system 12


4 IMPLEMENTATION 15

4.1Technologies used 15

4.1.1 Antilock breaking system 16

4.1.2 Actinometer 17

4.2Artificial intelligence 19

4.3 IOT sensor 19

4.3.1 Speed sensor 19

4.3.2 Hardware sensor 20

4.4 IOT Components 22

4.4.1 IOT Controllers 23

5 ADVANTAGES AND DISADVANTAGES 28

5.1 Advantages 28

5.2 Disadvantages 39

6 APPLICATION 30

Conclusion 31

Future Scope 32

Bibilography 33

You might also like