You are on page 1of 63

VIRTUAL SECURE SYSTEM

A PROJECT REPORT

Submitted to

QUANTUM UNIVERSITY

SHUBHAM SAURABH
(1801302047)
PIYUSH RAJ
(1801301029)
ARPIT SINGHAL
(1801302012)

in partial fulfillment for the award of the degree


of
Bachelor of Technology (Hons.) in Computer Science and Engineering with
specialization in Cyber Security

Department of Computer Science and Engineering


Quantum University, Roorkee
MAY 2022
CERTIFICATE

This is to certify that the project report entitled VIRTUAL SECURE SYSTEM being
submitted by Mr. Shubham Saurabh, Mr. Piyush Raj and Mr. Arpit Singhal in partial fulfillment
for the award of the Degree of Bachelor of Technology (Hons.) in Computer Science and
Engineering with specialization in Cyber Security to the Quantum University, Roorkee as a record
of bonafide work carried out by them under my guidance and supervision.

Mr. Basudev Singh Roohani


Project Guide
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
QUANTUM UNIVERSITY, ROORKEE

Dr. Prabhat Kumar Srivastava


PROGRAM OFFICER
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
QUANTUM UNIVERSITY, ROORKEE

Dr. Satender Kumar


HOD, CSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
QUANTUM UNIVERSITY, ROORKEE

ii
DECLARATION

We hereby declare that the project entitled “VIRTUAL SECURE SYSTEM” submitted for
the Bachelor of Technology in Computer Science and Engineering Degree is our original work
and the project has not formed the basis or submitted for the award of any degree, diploma, or
any other similar titles in any other college / institute / university.

Members: Shubham Saurabh Piyush Raj Arpit Singhal


Signature:
Place:
Date:

iii
ACKNOWLEDGEMENT

We take this opportunity with much pleasure to thank all the people who have helped us
through the course of our project development.
We would like to express our sincere thanks to Mr. Basudev Singh Roohani (Project Guide)
for his valuable guidance, review and support in completing our project.
We are also thankful to Dr. Prabhat Kumar Srivastava (Program Officer) for helping us in all
possible ways.
We would also like to express our gratitude to Dr. Satender Kumar (HOD, Department
Computer Science & Engineering) for his guidance.
Your valuable guidance and suggestions helped us in various phases of the completion of this
project. We will always be thankful to you in this regard.

iv
ABSTRACT

Cyber Security plays an important role in the field of information technology .Securing the
information have become one of the biggest challenges in the present day. Whenever we think
about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are
increasing immensely day by day. Various Governments and companies are taking many measures
in order to prevent these cybercrimes. Besides various measures cyber security is still a very big
concern to many. This project mainly focuses on how to make any website fully secure. It also
focuses on latest about the cyber security techniques, ethics and the trends changing the face of
cyber security. This project will help to register and complaint regarding cybercrime.

v
TABLE OF CONTENTS

Certificate ………………………………………………………………………………………... ii

Declaration ……………………………………………………………………………………… iii

Acknowledgement ………………………………………………………………………………. iv

Abstract ………………………………………………………………………………………….. v

Chapter: 1 Introduction ………………………………………………………………………….. 1

Chapter: 2 Objectives of the Project …………………………………………………………….. 2

Chapter: 3 SDLC ………………………………………………………………………………… 3

3.1 Project Planning ………………………………………………………………………….. 4

3.2 Requirements ……………………………………………………………………………... 4

3.3 Design …………………………………………………………………………………….. 5

3.3.1 DFD (Data Flow Diagram) …………………………………………………………. 5

Fig 3.3.1.1 Zero Level DFD …………………………………………………………… 5

Fig 3.3.1.2 First Level DFD …………………………………………………………… 6

Fig 3.3.1.3 Second Level DFD ………………………………………………………… 6

3.3.2 ERD (Entity Relationship Diagram) ………………………………………............... 7

Fig 3.3.2.1 Diagram ……………………………………………………………………. 8

3.4 Coding or Implementation ……………………………………………………………….. 9

3.4.1 Code ………………………………………………………………………………..


45

3.4.2 Databases …………………………………………………………………………... 10

Fig 3.4.2.1 Structure of registration table ……………………………………………… 5

Fig 3.4.2.2 Data stored in registration table …………………………………………… 6

Fig 3.4.2.3 Structure of services table …………………………………………………. 6

Chapter: 4 Snapshots …………………………………………………………………………… 13


vi
Fig 4.1 Home Page ………………………………………………………………………….. 13

Fig 4.2 Login Page ………………………………………………………………………….. 13

Fig 4.3 Admin Home Page ………………………………………………………………….. 14

Fig 4.4 Books Page ………………………………………………………………………….. 14

Fig 4.5 Member Page ……………………………………………………………………….. 15

Fig 4.6 Borrow Table Page …………………………………………………………………. 15

Fig 4.7 Borrowed Books Page ………………………………………………………………. 16

Fig 4.8 Archive Page ………………………………………………………………............... 16

Fig 4.9 Users page …………………………………………………………………............... 16

Fig 4.10 Student Home Page ………………………………………………………............... 17

Fig 4.11 Advance Search Page ……………………………………………………………… 17

Chapter: 5 Conclusion ………………………………………………………………………….. 18

Chapter: 6 Future Work ………………………………………………………………………… 19

Chapter: 7 References ………………………………………………………………………….. 20

vii
Chapter 1
Introduction

Today peoples are able to send and receive any form of data may be an e-mail or an
audio or video just by the click of a button but did he ever think how securely his data id
being transmitted or sent to the other person safely without any leakage of information??
The answer lies in cyber security. Today Internet is the fastest growing infrastructure in
everyday life. In today’s technical environment many latest technologies are changing the
face of the mankind. But due to these emerging technologies we are unable to safeguard
our private information in a very effective way and hence these days cybercrimes are
increasing day by day. Today more than 60 percent of total commercial transactions are
done online, so this field required a high quality of security for transparent and best
transactions. Hence cyber security has become a latest issue. The scope of cyber security is
not just limited to securing the information in IT industry but also to various other fields
like cyber space etc.

Even the latest technologies like cloud computing, mobile computing, E-commerce, net
banking etc. also needs high level of security. Since these technologies hold some
important information regarding a person their security has become a must thing.
Enhancing cyber security and protecting critical information infrastructures are essential to
each nation's security and economic wellbeing. Making the Internet safer (and protecting
Internet users) has become integral to the development of new services as well as
governmental policy. The fight against cybercrime needs a comprehensive and a safer
approach. Given that technical measures alone cannot prevent any crime, it is critical that
law enforcement agencies are allowed to investigate and prosecute cybercrime effectively.
Today many nations and governments are imposing strict laws on cyber securities in order
to prevent the loss of some important information. Every individual must also be trained on
this cyber security and save themselves from these increasing cybercrimes.

1
Chapter 2
Objectives of the Project

This website will be fully secure so no one can perform any types of attack like sql
injection, Dos attack, brute forcing etc. We will provide services related to cyber security.
In this website there will some contents related to cyber security like cyber law, some
study material related to cyber security so user can gain knowledge in the field of cyber
security. User can learn how to make any website secure.

User can know about different careers in cyber security domain through this website.

User can also learn cyber law, if any user performs any attack on other users’ website
and steal information so what will be the punishment for that crime.

User can register complain of any cybercrime which happens to that user. In this
website there will be some government link for registering cybercrime so user can register
cybercrime. User can register cybercrime on this website also, so we can solve that
cybercrime fast and for that we will charge some amounts.

2
Chapter 3
SDLC

SDLC is a systematic process for building software that ensures the quality and
correctness of the software built. SDLC process aims to produce high-quality software that
meets customer expectations. The system development should be complete in the pre-
defined time frame and cost. SDLC consists of a detailed plan which explains how to plan,
build, and maintain specific software. Every phase of the SDLC life Cycle has its own
process and deliverables that feed into the next phase. SDLC stands for Software
Development Life Cycle and is also referred to as the Application Development life-cycle

Phases of SDLC
1. Project Planning
2. Gathering Requirements & Analysis
3. Design
4. Coding or Implementation
5. Testing & Deployment
6. Maintenance

3
3.1 Project Planning
 Our project is virtual secure system. This website will be fully secure so no one can
attack and harm this website by sql injection attack , DOS attack etc.
 From this website user can enhance their cyber security skills that how to make any
website secure. How any user can secure their sensitive information.
 Before committing any cybercrime, user can read cyberlaw.
 If any type of cybercrime happens to any user so he/she can register complaint
either by going to government link or he/she can register complaint to our website.
 For registering complaint on our website, we will charge some amount.
 User can buy any cyber security course or research paper.
 We will add payment gateway on our website so user can pay charges for
registering complaint or for buy our services.

3.2 Requirements

Minimum Hardware Requirements:


 Operating system: Microsoft Windows XP
 Processor: 800MHz Intel Pentium III or equivalent
 Memory: 512 MB
 Disk space: 750 MB of free disk space

Recommended Hardware Requirements:


 Operating System: Microsoft Windows XP Professional SP3/Vista SP1/Windows
 7/Windows 8/Windows 10
 Processor: 2.6 GHz Intel Pentium IV or equivalent
 Memory: 2 GB
 Disk space: 1 GB of free disk space

Software Requirements:

4
 MYSQL Database , Brackets or any other code editor, XAMPP Server
 Web Browser: Chrome/Edge

Language Requirements:
 HTML, CSS, Bootstrap, PHP, MySQL

3.3 Design

3.3.1 DFD (Data Flow Diagram)

DFD is the abbreviation for Data Flow Diagram. The flow of data of a system or a
process is represented by DFD. It also gives insight into the inputs and outputs of each
entity and the process itself. DFD does not have control flow and no loops or decision rules
are present. Specific operations depending on the type of data can be explained by a
flowchart. Data Flow Diagram can be represented in several ways. The DFD belongs to
structured-analysis modeling tools. Data Flow diagrams are very popular because they help
us to visualize the major steps and data involved in software-system processes.

Fig 3.3.1.1 Zero Level DFD

5
Fig 3.3.1.2 First Level DFD

Fig 3.3.1.3 Second Level DFD

6
3.3.2 ERD (Entity Relationship Diagram)

ERD is a diagram that displays the relationship of entity sets stored in a database. In
other words, ER diagrams help to explain the logical structure of databases. ER diagrams
are created based on three basic concepts: entities, attributes and relationships.

ER Diagrams contain different symbols that use rectangles to represent entities, ovals to
define attributes and diamond shapes to represent relationships.

At first look, an ER diagram looks very similar to the flowchart. However, ER Diagram
includes many specialized symbols, and its meanings make this model unique. The purpose
of ER Diagram is to represent the entity framework infrastructure.

7
Fig 3.3.2.1 Diagram

8
3.4 Coding or Implementation

3.4.1 Code

signup.php
<?php

session_start();

include 'connection.php';

if(isset($_POST['submit'])){

$username = mysqli_real_escape_string($conn,$_POST['username']);

$email = mysqli_real_escape_string($conn,$_POST['email']);

$password = mysqli_real_escape_string($conn,$_POST['password']);

$cpassword = mysqli_real_escape_string($conn,$_POST['cpassword']);

$captcha = $_POST['captcha'];

if($_SESSION['CODE']==$captcha){

$pass = password_hash($password, PASSWORD_BCRYPT);

$cpass = password_hash($cpassword, PASSWORD_BCRYPT);

$token = bin2hex(random_bytes(15));

$emailquery =" select * from registration where email='$email' ";

$query = mysqli_query($conn,$emailquery);

$emailcount = mysqli_num_rows($query);

if($emailcount>0){

?>

<script>

9
alert("Email already exist");

</script>

<?php}

else{
if($password === $cpassword){

$insertquery = "insert into registration(username,email,password,cpassword,token,status)


values('$username','$email','$pass','$cpass','$token','inactive')";

$iquery = mysqli_query($conn, $insertquery);

if($iquery){

$subject = "Email Activation";

$body = "HI, $username.Verify your email here http://localhost/php/activate.php?


token=$token";

$sender_mail = "From: eyepatch325@gmail.com";

if(mail($email, $subject, $body, $sender_mail)){

//echo "Email sent";

$_SESSION['msg'] ="Email sent";


$_SESSION['msg'] = "Check your mail to activate your account $email";

header('location:login.php');

else{

?>

<script>

alert("Invalid email...")

10
</script>

<?php

}
}
if($conn){

?>
<script>

alert("Connection is sucessful")

</script>

<?php

?>
<script>

alert(" No Connection ");

</script>

<?php

else{
?>
<script>

alert("Password Does not match");

</script>
<?php

else{

11
?>

<script>

alert("Captcha Does not match");

</script>

<?php

?>

<!DOCTYPE html>

<html lang="en" dir="ltr">

<head>

<meta charset="utf-8">

<title></title>

<link rel="stylesheet" href="style.css">

<script type="text/javascript">

function preventBack(){window.history.forward()};

setTimeout("preventBack()",0);

window.onunload=function(){null};

</script>

</head>

<body oncontextmenu="return false;">

<div class="login-box">

<h1>Sign Up</h1>

<form action="<?php echo htmlentities($_SERVER['PHP_SELF']); ?>" method="post">

12
<div class="textbox">

<input type="text" placeholder="Username" name="username" required>

</div>

<div class="textbox">

<input type="text" placeholder="Email Id" name="email" required>

</div>

<div class="textbox">

<input type="password" placeholder="Password" name="password" required>

</div>

<div class="textbox">

<input type="password" placeholder="Confirm Password" name="cpassword"


required>

</div>

<div class="textbox" style="text-align: center">

<center>

<input type="text" placeholder=" Captcha Code" name="captcha" required>

</center>

<div class="captcha" >

<img src=captcha.php/>

</div>

</div>

<input type="submit" class="btn" name="submit" value="Sign Up">

13
<p>Already a User <a href='login.php' type="button" class="btn1" value="Sign In">Sign
In</a> </p>

</form>

</div>

</body>

</html>

connection.php
<?php

$host = "127.0.0.1";

$dbUser = 'root';

$password = '';

$database = 'emailphp';

$conn = mysqli_connect($host , $dbUser , $password , $database);

if($conn){

?>

<script>

alert("Connection is sucessful");

</script>

<?php

else{

?>

<script>

14
alert(" No Connection ");

</script>

<?php

?>

login.php
<?php

session_start();

?>

<?php

include 'connection.php';

if(isset($_POST['submit'])){

$email = mysqli_real_escape_string($conn,$_POST['email']);

$password = mysqli_real_escape_string($conn,$_POST['password']);

$captcha = $_POST['captcha'];

if($_SESSION['CODE']==$captcha){

$emailsearch = "select * from registration where email='$email' AND status='active' ";

$query = mysqli_query($conn, $emailsearch);

$emailcount = mysqli_num_rows($query);

echo "$emailcount";

15
if($emailcount){

$emailpass = mysqli_fetch_assoc($query);

$dbpass = $emailpass['password'];

$passdecode = password_verify($password, $dbpass);

if($passdecode){

?>

<script>

alert("Login Sucessful");

</script>

<?php

else{

?>

<script>

alert("Password Incorrect");

</script>

<?php

else{

?>

<script>

alert("Invalid Email");

</script>

16
<?php

else{

?>

<script>

alert("Captcha Does not match");

</script>

<?php

?>

<!DOCTYPE html>

<html lang="en" dir="ltr">

<head>

<meta charset="utf-8">

<title></title>

<link rel="stylesheet" href="style.css">

<script type="text/javascript">

function preventBack(){window.history.forward()};

setTimeout("preventBack()",0);

window.onunload=function(){null};

</script>

</head>

<body oncontextmenu="return false;">

17
<form action="AFTERLOGIN.html" method="post">

<div class="login-box">

<h1>Login</h1>

<div class="textbox">

<input type="text" placeholder="Email Id" name="email" required>

</div>

<div class="textbox">

<input type="password" placeholder="Password" name="password" required>

</div>

<div class="textbox">

<input type="text" placeholder="Captcha Code" name="captcha" required>

<div class="captcha"style="text-align: center"

<img src=captcha.php/>

</div>

</div>

<div>

<input type="submit" class="btn" name="submit" value="Sign in">

</div>

<div>

<p> <?php

if(isset($_SESSION['msg'])){

echo $_SESSION['msg'];

18
}

?>

</p>

</div>

<p>New User <a href='signup.php' type="button" class="btn1" value="Sign Up">Sign


Up</a> </p>

</div>

</form>

</body>

</html>

Index.html
<!DOCTYPE html>

<html lang="en">

<head>

<meta charset="UTF-8" />

<meta http-equiv="X-UA-Compatible" content="IE=edge" />

<meta name="viewport" content="width=device-width, initial-scale=1.0" />

<link

rel="stylesheet"

href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.0/css/all.min.css"

integrity="sha512-
BnbUDfEUfV0Slx6TunuB042k9tuKe3xrD6q4mg5Ed72LTgzDIcLPxg6yI2gcMFRyomt+
yJJxE+zJwNmxki6/RA=="

crossorigin="anonymous"

19
referrerpolicy="no-referrer"

/>

<title>People Security Services</title>

<link rel="stylesheet" href="css1/style.css" />

</head>

<body oncontextmenu="return false;">

<header>

<nav>

<!-- left side menu -->

<div class="left-side-menu">

<div class="logo">

<a href="#">

<img src="images/logo1.png" alt="logo" />

</a>

</div>

</div>

<!-- right side menu -->

<div class="right-side-menu">

<div class="sub-menu">

<a href="login.php">

<button>Sign In</button>

</a>

<a href="signup.php">

20
<button>Sign Up</button>

</a>

</div>

</div>

</nav>

</header>

<!-- ----------------------------- our hero section start, ----------------------------------------- --


>

<section class="main-hero-section">

<!-- left side code -->

<div class="hero-left-side">

<h1>Security simplified</h1>

<p>

Take control of your Security. Track Traffic, breakdown

Security.Congratulations on taking a forward step to get secure

your organization and keep your users safe.

</p>

<div class="button-group">

<a href="#">

<img

src="images/icons/appstore.png"

alt="appstore"

class="appStore"

21
/>

</a>

<a href="#">

<img src="images/icons/googlePlay.png" alt="googlePlay" />

</a>

</div>

</div>

<!-- right side code -->

<div class="hero-right-side">

<img src="images/2.jpg" alt="heropageImg" />

</div>

</section>

<!-- ----------------------------- our 2nd section start------------------------------------------ -->

<section class="common-section" id="section-two">

<!-- left side of section 2 -->

<div class="left-side">

<figure>

<img src="images/3.png" alt="section2" />

</figure>

</div>

<!-- right side of section 2 -->

<div class="right-side">

22
<h2>Your Daily Security Team</h2>

<p>

We have one of the best experienced cyber Security officers

and teams with you we can manage your all ground and above security issues.

</p>

<div class="button-group">

<button class="common-button">get started</button>

<button class="common-button-normal">how its work?</button>

</div>

</div>

</section>

<!-- ----------------------------- our 3rd section start ------------------------------------------- --


>

<section class="section-third" id="section-third">

<h2>The Tools For Your Personal and Organizational security</h2>

<p>

Below we mentioned some of our key features and types of services we provide.

</p>

<div class="section-third-task">

<div class="task-1">

<img src="images/4.png" alt="icon1" />

<h3>Secure And Monitoring Services</h3>

<p>

23
We provide 24*7*365 day realtime SOC Services and team we can monitor all

the traffic you get and we also supports DDOS protection.

</p>

</div>

<div class="task-2">

<img src="images/5.png" alt="icon1" />

<h3>24*7 Services</h3>

<p>

We have VAPT , SOC , Auditors , security manager available 24*7.

</p>

</div>

<div class="task-3">

<img src="images/6.png" alt="icon1" />

<h3>Trusted By Big Tech Giants</h3>

<p>

We are partners of big tech giants like IBM , Microsoft , Amazon , FLipkart

and trusted by more than 2000 clients.

</p>

</div>

</div>

</section>

24
<!-- ----------------------------- our 4th section start ------------------------------------------- --
>

<section class="common-section" id="section-four">

<!-- right side of section 2 -->

<div class="right-side">

<h2>Create Your Own Security Team</h2>

<p>

You can create your own security team we will provide training to your

employees to be expert in the security field.

</p>

<div class="button-group">

<button class="common-button">get started</button>

<button class="common-button-normal">how its work?</button>

</div>

</div>

<!-- left side of section 2 -->

<div class="left-side">

<img src="images/7.png" alt="section2" />

</div>

</section>

<!-- ----------------------------- our 5th section start ------------------------------------------- --


>

25
<section class="common-section" id="section-five">

<!-- left side of section 2 -->

<div class="left-side">

<img src="images/section5.png" alt="section5" />

</div>

<!-- right side of section 2 -->

<div class="right-side">

<h2>We Will Take Care Of Your Security Goals</h2>

<div class="fitness-goals">

<div class="rule1">

<h3>

<i class="fas fa-heart"></i> We will take care of your SOC

goals

</h3>

<p>

We can provide in office and virtual SOC labs and teams to monitor

all your traffic and give security to your organization.

</p>

</div>

<div class="rule2">

26
<h3>

<i class="fas fa-heart"></i> Track your daily Traffic and Analysis

</h3>

<p>

Track your daily traffic to ensure the confidentiality of your organization

and your people.

</p>

</div>

<div class="rule3">

<h3><i class="fas fa-heart"></i> Track your Digital Security Strength </h3>

<p>

Take our security check to know how strong your security is

we will provide you full assessment report and solution to Strengthen Your

Security

</p>

</div>

</div>

</div>

</section>

<!-- ----------------------------- our 6th section start ------------------------------------------ -->

<footer>

27
<div class="logo-div">

<img src="images/logo1.png" alt="logo" />

<p>@2022 People Security Services || All Rights Reserved</p>

</div>

</footer>

<!-- ----------------------------- our 7th section social media start ----------------------->

<div class="icon-bar">

<a href="#" class="facebook" target="_thapa">

click here to visit <i class="fab fa-facebook-square"></i>

</a>

<a href="#" class="telegram" target="_thapa">

click here to visit <i class="fab fa-telegram-plane"></i>

</a>

<a

href="https://www.instagram.com/thapatechnical/"

class="instagram"

target="_thapa"

>

click here to visit <i class="fab fa-instagram"></i>

28
</a>

<a href="#" class="linkedin" target="_thapa">

click here to visit <i class="fab fa-linkedin"></i>

</a>

<a

href="https://www.youtube.com/channel/UCwfaAHy4zQUb2APNOGXUCCA"

class="youtube"

target="_thapa"

>

click here to visit <i class="fab fa-youtube-square"></i>

</a>

</div>

</body>

<script>

document.onkeydown = function (e) {

if (event.keyCode == 123) {

return false;

if (e.ctrlKey && e.shiftKey && e.keyCode == 'I'.charCodeAt(0)) {

return false;

if (e.ctrlKey && e.shiftKey && e.keyCode == 'C'.charCodeAt(0)) {

29
return false;

if (e.ctrlKey && e.shiftKey && e.keyCode == 'J'.charCodeAt(0)) {

return false;

if (e.ctrlKey && e.keyCode == 'U'.charCodeAt(0)) {

return false;

</script>

</html>

afterlogin.html
<!DOCTYPE html>

<html lang="en">

<head>

<meta charset="UTF-8" />

<meta http-equiv="X-UA-Compatible" content="IE=edge" />

<meta name="viewport" content="width=device-width, initial-scale=1.0" />

<link

rel="stylesheet"

href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.0/css/all.min.css"

integrity="sha512-
BnbUDfEUfV0Slx6TunuB042k9tuKe3xrD6q4mg5Ed72LTgzDIcLPxg6yI2gcMFRyomt+
yJJxE+zJwNmxki6/RA=="

30
crossorigin="anonymous"

referrerpolicy="no-referrer"

/>

<title>People Security Services</title>

<link rel="stylesheet" href="css1/style.css" />

</head>

<body>

<header>

<nav>

<!-- left side menu -->

<div class="left-side-menu">

<div class="logo">

<a href="#">

<img src="images/logo1.png" alt="logo" />

</a>

</div>

<div class="sub-menu">

<a href="services.html">

<li>SERVICES</li>

</a>

<a href="products.html">

<li>PRODUCTS</li>

</a>

31
<a href="careers.html">

<li>CAREERS</li>

</a>

<a href="resources.html">

<li>RESOURCES</li>

</a>

<a href="contact.html">

<li>CONTACT</li>

</a>

</div>

</div>

<!-- right side menu -->

<div class="right-side-menu">

<div class="sub-menu">

<a href="logout.php">

<button>LOG OUT</button>

</a>

</div>

</div>

</nav>

</header>

<!-- ----------------------------- our hero section start------------------------------------- -->

32
<section class="main-hero-section">

<!-- left side code -->

<div class="hero-left-side">

<h1>Security simplified</h1>

<p>

Take control of your Security. Track Traffic, breakdown

Security.Congratulations on taking a forward step to get secure

your organization and keep your users safe.

</p>

<div class="button-group">

<a href="#">

<img

src="images/icons/appstore.png"

alt="appstore"

class="appStore"

/>

</a>

<a href="#">

<img src="images/icons/googlePlay.png" alt="googlePlay" />

</a>

</div>

</div>

<!-- right side code -->

<div class="hero-right-side">

33
<img src="images/2.jpg" alt="heropageImg" />

</div>

</section> <!-- ----------------------------- our 2nd section start


------------------------------------- --

<section class="common-section" id="section-two">

<!-- left side of section 2 -->

<div class="left-side">

<figure>

<img src="images/3.png" alt="section2" />

</figure>

</div>

<!-- right side of section 2 -->

<div class="right-side">

<h2>Your Daily Security Team</h2>

<p>

We have one of the best experienced cyber Security officers

and teams with you we can manage your all ground and above security issues.

</p>

<div class="button-group">

<button class="common-button">get started</button>

<button class="common-button-normal">how its work?</button>

</div>

</div>

34
</section>

<!-- ----------------------------- our 3rd section start -->

<section class="section-third" id="section-third">

<h2>The Tools For Your Personal and Organizational security</h2>

<p>

Below we mentioned some of our key features and types of services we provide.

</p>

<div class="section-third-task">

<div class="task-1">

<img src="images/4.png" alt="icon1" />

<h3>Secure And Monitoring Services</h3>

<p>

We provide 24*7*365 day realtime SOC Services and team we can monitor all

the traffic you get and we also supports DDOS protection.

</p>

</div>

<div class="task-2">

<img src="images/5.png" alt="icon1" />

<h3>24*7 Services</h3>

<p>

We have VAPT , SOC , Auditors , security manager available 24*7.

</p>

35
</div>

<div class="task-3">

<img src="images/6.png" alt="icon1" />

<h3>Trusted By Big Tech Giants</h3>

<p>

We are partners of big tech giants like IBM , Microsoft , Amazon , FLipkart

and trusted by more than 2000 clients.

</p>

</div>

</div>

</section>

<!-- ----------------------------- our 4th section start ---------------------------------------- -->

<section class="common-section" id="section-four">

<!-- right side of section 2 -->

<div class="right-side">

<h2>Create Your Own Security Team</h2>

<p>

You can create your own security team we will provide training to your

employees to be expert in the security field.

</p>

<div class="button-group">

<button class="common-button">get started</button>

36
<button class="common-button-normal">how its work?</button>

</div>

</div>

<!-- left side of section 2 -->

<div class="left-side">

<img src="images/7.png" alt="section2" />

</div>

</section>

<!-- ----------------------------- our 5th section start --------------------------------------- -->

<section class="common-section" id="section-five">

<!-- left side of section 2 -->

<div class="left-side">

<img src="images/section5.png" alt="section5" />

</div>

<!-- right side of section 2 -->

<div class="right-side">

<h2>We Will Take Care Of Your Security Goals</h2>

<div class="fitness-goals">

<div class="rule1">

<h3>

37
<i class="fas fa-heart"></i> We will take care of your SOC

goals

</h3>

<p>

We can provide in office and virtual SOC labs and teams to monitor

all your traffic and give security to your organization.

</p>

</div>

<div class="rule2">

<h3>

<i class="fas fa-heart"></i> Track your daily Traffic and Analysis

</h3>

<p>

Track your daily traffic to ensure the confidentiality of your organization

and your people.

</p>

</div>

<div class="rule3">

<h3><i class="fas fa-heart"></i> Track your Digital Security Strength </h3>

<p>

Take our security check to know how strong your security is

we will provide you full assessment report and solution to Strengthen Your

Security

38
</p>

</div>

</div>

</div>

</section>

<!-- ----------------------------- our 6th section start --------------------------------->

<footer>

<div class="logo-div">

<img src="images/logo1.png" alt="logo" />

<p>@2022 People Security Services</p>

</div>

<div class="footer-menu">

<div class="footer-div-2">

<h4>Products</h4>

<a href="#"><li>pricing</li></a>

<a href="#"><li>pricing</li></a>

</div>

<div class="footer-div-3">

<h4>Abouts</h4>

<a href="#"><li>pricing</li></a>

39
<a href="#"><li>pricing</li></a>

</div>

<div class="footer-div-4">

<h4>Blogs</h4>

<a href="#"><li>pricing</li></a>

<a href="#"><li>pricing</li></a>

</div>

<div class="footer-div-5">

<h4>Get In Touch</h4>

<a href="#"><li>Questions Or Feedback?</li></a>

<a href="#"><li>We’ll love to help you</li></a>

</div>

</div>

</footer>

<!-- ----------------------------- our 7th section social media start

---------------------------------------------------------------------- -->

<div class="icon-bar">

<a href="#" class="facebook" target="_thapa">

click here to visit <i class="fab fa-facebook-square"></i>

</a>

40
<a href="#" class="telegram" target="_thapa">

click here to visit <i class="fab fa-telegram-plane"></i>

</a>

<a

href="https://www.instagram.com/thapatechnical/"

class="instagram"

target="_thapa"

>

click here to visit <i class="fab fa-instagram"></i>

</a>

<a href="#" class="linkedin" target="_thapa">

click here to visit <i class="fab fa-linkedin"></i>

</a>

<a

href="https://www.youtube.com/channel/UCwfaAHy4zQUb2APNOGXUCCA"

class="youtube"

target="_thapa"

>

click here to visit <i class="fab fa-youtube-square"></i>

</a>

</div>

41
</body>

</html>

Style.css
.mt-8 {

margin-top: 8px;

.bg-color {

background: #006f9e

.border-top-theme-333-3px {

border-top: 3px solid #812972;

.btn-333-colored {

color: #fff;

background-color: #00496b;

border-color: #00496b;

.icon-color {

42
color: #fff;

background-color: #013c4c;

border-color: #0092bb;

.bg-img {

background: #dbf2fb

.menuzord {

background: #dbf2fb

.list-inline li a {

letter-spacing: 1.5px;

margin: 0px;

padding: 0px;

font-size: 14px;

.list-inline ul {

margin: 0px;

padding: 0px;

.btn {

letter-spacing: 1.5px;

.section-content p {

43
color: #111;

font-size: 14.5px;

letter-spacing: 1px;

line-height: 27px;

font-weight: 500;

text-align: justify

.section-content h3 {

letter-spacing: 1px;

.bg-color-light {

background-color: #dbf2fb;

background-image: url("../../www.transparenttextures.com/patterns/concrete-wall.png");

.service-block {

background: #fff;

border: 1px solid #ccc;

box-shadow: 0 1px 5px #999;

border-radius: 4px;

.bg-theme-img {

44
background-color: #006f9e;

background-image: url("../../www.transparenttextures.com/patterns/gplay.png");

.media-body p {

font-size: 14.5px;

letter-spacing: 1px;

line-height: 27px;

font-weight: 600

.section-title p {

font-size: 14.5px;

letter-spacing: 1px;

line-height: 27px;

font-weight: 500;

color: #111;

.service-block p{

font-size: 13.5px;

letter-spacing: 1px;

line-height: 27px;

font-weight: 500;

color: #111;

45
text-align: center;

padding: 1px 10px;

3.4.2 Databases

Fig 3.4.2.1 Structure of registration table

Fig 3.4.2.2 Data stored in registration table

46
Fig 3.4.2.3 Structure of services table

sChapter4
Snapshots

Fig 4.1 Home Page

Fig 4.2 Login Page

47
Fig 4.3 Admin Home Page

Fig 4.4 Books Page

48
Fig 4.5 Member Page

Fig 4.6 Borrow Table Page

49
Fig 4.7 Borrowed Books Page

Fig 4.8 Archive Page

50
Fig 4.9 Users Page

Fig 4.10 Student Home Page

Fig 4.11 Advance Search Page

51
Chapter 5
Conclusion

Computer security is a vast topic that is becoming more important because the world is
becoming highly interconnected, with networks being used to carry out critical
transactions. Cybercrime continues to diverge down different paths with each New Year
that passes and so does the security of the information. The latest and disruptive
technologies, along with the new cyber tools and threats that come to light each day, are
challenging organizations with not only how they secure their infrastructure, but how they
require new platforms and intelligence to do so. There is no perfect solution for
cybercrimes but we should try our level best to minimize them in order to have a safe and
secure future in cyber space.

So, to secure the personal information and organization information person should have
the skills in the cybersecurity field. Person should know that if I commit this crime which

52
comes under cyber law , what punishment court will give to me. If any cybercrime happens
with user they should know where I have to register the complaint.

Chapter 6
Future Work
This website can be easily implemented under various situations. We can add new
features as and when we require. Reusability is possible as and when require in this
website. There is flexibility in all the modules.

New features can be added in this project are :


1. We can add more resources in the website so users can enhance their skills more.
2. We can provide more services to the users.
3. We can add more products so users can use cyber security products.
4. We can guide users for growing their careers in cybersecurity field in detail.
5. We can add some more security features in our website.

53
Chapter 7
References

1. https://uniprojectmaterials.com/view-blog/how-to-write-an-outstanding-synopsis-
for-thesis-project [ Accessed on 10-10-2021 ]
2. https://www.javatpoint.com/software-engineering-data-flow-diagrams [ Accessed
on 10-12-2021 ]
3. https://www.smartdraw.com/entity-relationship-diagram/ [ Accessed on 11-12-
2021 ]
4. https://online.visual-paradigm.com/drive/#diagramlist:proj=0&new=ERDiagram
[ Accessed on 11-12-2021 ]

54
55
56

You might also like