Professional Documents
Culture Documents
A PROJECT REPORT
Submitted to
QUANTUM UNIVERSITY
SHUBHAM SAURABH
(1801302047)
PIYUSH RAJ
(1801301029)
ARPIT SINGHAL
(1801302012)
This is to certify that the project report entitled VIRTUAL SECURE SYSTEM being
submitted by Mr. Shubham Saurabh, Mr. Piyush Raj and Mr. Arpit Singhal in partial fulfillment
for the award of the Degree of Bachelor of Technology (Hons.) in Computer Science and
Engineering with specialization in Cyber Security to the Quantum University, Roorkee as a record
of bonafide work carried out by them under my guidance and supervision.
ii
DECLARATION
We hereby declare that the project entitled “VIRTUAL SECURE SYSTEM” submitted for
the Bachelor of Technology in Computer Science and Engineering Degree is our original work
and the project has not formed the basis or submitted for the award of any degree, diploma, or
any other similar titles in any other college / institute / university.
iii
ACKNOWLEDGEMENT
We take this opportunity with much pleasure to thank all the people who have helped us
through the course of our project development.
We would like to express our sincere thanks to Mr. Basudev Singh Roohani (Project Guide)
for his valuable guidance, review and support in completing our project.
We are also thankful to Dr. Prabhat Kumar Srivastava (Program Officer) for helping us in all
possible ways.
We would also like to express our gratitude to Dr. Satender Kumar (HOD, Department
Computer Science & Engineering) for his guidance.
Your valuable guidance and suggestions helped us in various phases of the completion of this
project. We will always be thankful to you in this regard.
iv
ABSTRACT
Cyber Security plays an important role in the field of information technology .Securing the
information have become one of the biggest challenges in the present day. Whenever we think
about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are
increasing immensely day by day. Various Governments and companies are taking many measures
in order to prevent these cybercrimes. Besides various measures cyber security is still a very big
concern to many. This project mainly focuses on how to make any website fully secure. It also
focuses on latest about the cyber security techniques, ethics and the trends changing the face of
cyber security. This project will help to register and complaint regarding cybercrime.
v
TABLE OF CONTENTS
Certificate ………………………………………………………………………………………... ii
Acknowledgement ………………………………………………………………………………. iv
Abstract ………………………………………………………………………………………….. v
vii
Chapter 1
Introduction
Today peoples are able to send and receive any form of data may be an e-mail or an
audio or video just by the click of a button but did he ever think how securely his data id
being transmitted or sent to the other person safely without any leakage of information??
The answer lies in cyber security. Today Internet is the fastest growing infrastructure in
everyday life. In today’s technical environment many latest technologies are changing the
face of the mankind. But due to these emerging technologies we are unable to safeguard
our private information in a very effective way and hence these days cybercrimes are
increasing day by day. Today more than 60 percent of total commercial transactions are
done online, so this field required a high quality of security for transparent and best
transactions. Hence cyber security has become a latest issue. The scope of cyber security is
not just limited to securing the information in IT industry but also to various other fields
like cyber space etc.
Even the latest technologies like cloud computing, mobile computing, E-commerce, net
banking etc. also needs high level of security. Since these technologies hold some
important information regarding a person their security has become a must thing.
Enhancing cyber security and protecting critical information infrastructures are essential to
each nation's security and economic wellbeing. Making the Internet safer (and protecting
Internet users) has become integral to the development of new services as well as
governmental policy. The fight against cybercrime needs a comprehensive and a safer
approach. Given that technical measures alone cannot prevent any crime, it is critical that
law enforcement agencies are allowed to investigate and prosecute cybercrime effectively.
Today many nations and governments are imposing strict laws on cyber securities in order
to prevent the loss of some important information. Every individual must also be trained on
this cyber security and save themselves from these increasing cybercrimes.
1
Chapter 2
Objectives of the Project
This website will be fully secure so no one can perform any types of attack like sql
injection, Dos attack, brute forcing etc. We will provide services related to cyber security.
In this website there will some contents related to cyber security like cyber law, some
study material related to cyber security so user can gain knowledge in the field of cyber
security. User can learn how to make any website secure.
User can know about different careers in cyber security domain through this website.
User can also learn cyber law, if any user performs any attack on other users’ website
and steal information so what will be the punishment for that crime.
User can register complain of any cybercrime which happens to that user. In this
website there will be some government link for registering cybercrime so user can register
cybercrime. User can register cybercrime on this website also, so we can solve that
cybercrime fast and for that we will charge some amounts.
2
Chapter 3
SDLC
SDLC is a systematic process for building software that ensures the quality and
correctness of the software built. SDLC process aims to produce high-quality software that
meets customer expectations. The system development should be complete in the pre-
defined time frame and cost. SDLC consists of a detailed plan which explains how to plan,
build, and maintain specific software. Every phase of the SDLC life Cycle has its own
process and deliverables that feed into the next phase. SDLC stands for Software
Development Life Cycle and is also referred to as the Application Development life-cycle
Phases of SDLC
1. Project Planning
2. Gathering Requirements & Analysis
3. Design
4. Coding or Implementation
5. Testing & Deployment
6. Maintenance
3
3.1 Project Planning
Our project is virtual secure system. This website will be fully secure so no one can
attack and harm this website by sql injection attack , DOS attack etc.
From this website user can enhance their cyber security skills that how to make any
website secure. How any user can secure their sensitive information.
Before committing any cybercrime, user can read cyberlaw.
If any type of cybercrime happens to any user so he/she can register complaint
either by going to government link or he/she can register complaint to our website.
For registering complaint on our website, we will charge some amount.
User can buy any cyber security course or research paper.
We will add payment gateway on our website so user can pay charges for
registering complaint or for buy our services.
3.2 Requirements
Software Requirements:
4
MYSQL Database , Brackets or any other code editor, XAMPP Server
Web Browser: Chrome/Edge
Language Requirements:
HTML, CSS, Bootstrap, PHP, MySQL
3.3 Design
DFD is the abbreviation for Data Flow Diagram. The flow of data of a system or a
process is represented by DFD. It also gives insight into the inputs and outputs of each
entity and the process itself. DFD does not have control flow and no loops or decision rules
are present. Specific operations depending on the type of data can be explained by a
flowchart. Data Flow Diagram can be represented in several ways. The DFD belongs to
structured-analysis modeling tools. Data Flow diagrams are very popular because they help
us to visualize the major steps and data involved in software-system processes.
5
Fig 3.3.1.2 First Level DFD
6
3.3.2 ERD (Entity Relationship Diagram)
ERD is a diagram that displays the relationship of entity sets stored in a database. In
other words, ER diagrams help to explain the logical structure of databases. ER diagrams
are created based on three basic concepts: entities, attributes and relationships.
ER Diagrams contain different symbols that use rectangles to represent entities, ovals to
define attributes and diamond shapes to represent relationships.
At first look, an ER diagram looks very similar to the flowchart. However, ER Diagram
includes many specialized symbols, and its meanings make this model unique. The purpose
of ER Diagram is to represent the entity framework infrastructure.
7
Fig 3.3.2.1 Diagram
8
3.4 Coding or Implementation
3.4.1 Code
signup.php
<?php
session_start();
include 'connection.php';
if(isset($_POST['submit'])){
$username = mysqli_real_escape_string($conn,$_POST['username']);
$email = mysqli_real_escape_string($conn,$_POST['email']);
$password = mysqli_real_escape_string($conn,$_POST['password']);
$cpassword = mysqli_real_escape_string($conn,$_POST['cpassword']);
$captcha = $_POST['captcha'];
if($_SESSION['CODE']==$captcha){
$token = bin2hex(random_bytes(15));
$query = mysqli_query($conn,$emailquery);
$emailcount = mysqli_num_rows($query);
if($emailcount>0){
?>
<script>
9
alert("Email already exist");
</script>
<?php}
else{
if($password === $cpassword){
if($iquery){
header('location:login.php');
else{
?>
<script>
alert("Invalid email...")
10
</script>
<?php
}
}
if($conn){
?>
<script>
alert("Connection is sucessful")
</script>
<?php
?>
<script>
</script>
<?php
else{
?>
<script>
</script>
<?php
else{
11
?>
<script>
</script>
<?php
?>
<!DOCTYPE html>
<head>
<meta charset="utf-8">
<title></title>
<script type="text/javascript">
function preventBack(){window.history.forward()};
setTimeout("preventBack()",0);
window.onunload=function(){null};
</script>
</head>
<div class="login-box">
<h1>Sign Up</h1>
12
<div class="textbox">
</div>
<div class="textbox">
</div>
<div class="textbox">
</div>
<div class="textbox">
</div>
<center>
</center>
<img src=captcha.php/>
</div>
</div>
13
<p>Already a User <a href='login.php' type="button" class="btn1" value="Sign In">Sign
In</a> </p>
</form>
</div>
</body>
</html>
connection.php
<?php
$host = "127.0.0.1";
$dbUser = 'root';
$password = '';
$database = 'emailphp';
if($conn){
?>
<script>
alert("Connection is sucessful");
</script>
<?php
else{
?>
<script>
14
alert(" No Connection ");
</script>
<?php
?>
login.php
<?php
session_start();
?>
<?php
include 'connection.php';
if(isset($_POST['submit'])){
$email = mysqli_real_escape_string($conn,$_POST['email']);
$password = mysqli_real_escape_string($conn,$_POST['password']);
$captcha = $_POST['captcha'];
if($_SESSION['CODE']==$captcha){
$emailcount = mysqli_num_rows($query);
echo "$emailcount";
15
if($emailcount){
$emailpass = mysqli_fetch_assoc($query);
$dbpass = $emailpass['password'];
if($passdecode){
?>
<script>
alert("Login Sucessful");
</script>
<?php
else{
?>
<script>
alert("Password Incorrect");
</script>
<?php
else{
?>
<script>
alert("Invalid Email");
</script>
16
<?php
else{
?>
<script>
</script>
<?php
?>
<!DOCTYPE html>
<head>
<meta charset="utf-8">
<title></title>
<script type="text/javascript">
function preventBack(){window.history.forward()};
setTimeout("preventBack()",0);
window.onunload=function(){null};
</script>
</head>
17
<form action="AFTERLOGIN.html" method="post">
<div class="login-box">
<h1>Login</h1>
<div class="textbox">
</div>
<div class="textbox">
</div>
<div class="textbox">
<img src=captcha.php/>
</div>
</div>
<div>
</div>
<div>
<p> <?php
if(isset($_SESSION['msg'])){
echo $_SESSION['msg'];
18
}
?>
</p>
</div>
</div>
</form>
</body>
</html>
Index.html
<!DOCTYPE html>
<html lang="en">
<head>
<link
rel="stylesheet"
href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.0/css/all.min.css"
integrity="sha512-
BnbUDfEUfV0Slx6TunuB042k9tuKe3xrD6q4mg5Ed72LTgzDIcLPxg6yI2gcMFRyomt+
yJJxE+zJwNmxki6/RA=="
crossorigin="anonymous"
19
referrerpolicy="no-referrer"
/>
</head>
<header>
<nav>
<div class="left-side-menu">
<div class="logo">
<a href="#">
</a>
</div>
</div>
<div class="right-side-menu">
<div class="sub-menu">
<a href="login.php">
<button>Sign In</button>
</a>
<a href="signup.php">
20
<button>Sign Up</button>
</a>
</div>
</div>
</nav>
</header>
<section class="main-hero-section">
<div class="hero-left-side">
<h1>Security simplified</h1>
<p>
</p>
<div class="button-group">
<a href="#">
<img
src="images/icons/appstore.png"
alt="appstore"
class="appStore"
21
/>
</a>
<a href="#">
</a>
</div>
</div>
<div class="hero-right-side">
</div>
</section>
<div class="left-side">
<figure>
</figure>
</div>
<div class="right-side">
22
<h2>Your Daily Security Team</h2>
<p>
and teams with you we can manage your all ground and above security issues.
</p>
<div class="button-group">
</div>
</div>
</section>
<p>
Below we mentioned some of our key features and types of services we provide.
</p>
<div class="section-third-task">
<div class="task-1">
<p>
23
We provide 24*7*365 day realtime SOC Services and team we can monitor all
</p>
</div>
<div class="task-2">
<h3>24*7 Services</h3>
<p>
</p>
</div>
<div class="task-3">
<p>
We are partners of big tech giants like IBM , Microsoft , Amazon , FLipkart
</p>
</div>
</div>
</section>
24
<!-- ----------------------------- our 4th section start ------------------------------------------- --
>
<div class="right-side">
<p>
You can create your own security team we will provide training to your
</p>
<div class="button-group">
</div>
</div>
<div class="left-side">
</div>
</section>
25
<section class="common-section" id="section-five">
<div class="left-side">
</div>
<div class="right-side">
<div class="fitness-goals">
<div class="rule1">
<h3>
goals
</h3>
<p>
We can provide in office and virtual SOC labs and teams to monitor
</p>
</div>
<div class="rule2">
26
<h3>
</h3>
<p>
</p>
</div>
<div class="rule3">
<p>
we will provide you full assessment report and solution to Strengthen Your
Security
</p>
</div>
</div>
</div>
</section>
<footer>
27
<div class="logo-div">
</div>
</footer>
<div class="icon-bar">
</a>
</a>
<a
href="https://www.instagram.com/thapatechnical/"
class="instagram"
target="_thapa"
>
28
</a>
</a>
<a
href="https://www.youtube.com/channel/UCwfaAHy4zQUb2APNOGXUCCA"
class="youtube"
target="_thapa"
>
</a>
</div>
</body>
<script>
if (event.keyCode == 123) {
return false;
return false;
29
return false;
return false;
return false;
</script>
</html>
afterlogin.html
<!DOCTYPE html>
<html lang="en">
<head>
<link
rel="stylesheet"
href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.0/css/all.min.css"
integrity="sha512-
BnbUDfEUfV0Slx6TunuB042k9tuKe3xrD6q4mg5Ed72LTgzDIcLPxg6yI2gcMFRyomt+
yJJxE+zJwNmxki6/RA=="
30
crossorigin="anonymous"
referrerpolicy="no-referrer"
/>
</head>
<body>
<header>
<nav>
<div class="left-side-menu">
<div class="logo">
<a href="#">
</a>
</div>
<div class="sub-menu">
<a href="services.html">
<li>SERVICES</li>
</a>
<a href="products.html">
<li>PRODUCTS</li>
</a>
31
<a href="careers.html">
<li>CAREERS</li>
</a>
<a href="resources.html">
<li>RESOURCES</li>
</a>
<a href="contact.html">
<li>CONTACT</li>
</a>
</div>
</div>
<div class="right-side-menu">
<div class="sub-menu">
<a href="logout.php">
<button>LOG OUT</button>
</a>
</div>
</div>
</nav>
</header>
32
<section class="main-hero-section">
<div class="hero-left-side">
<h1>Security simplified</h1>
<p>
</p>
<div class="button-group">
<a href="#">
<img
src="images/icons/appstore.png"
alt="appstore"
class="appStore"
/>
</a>
<a href="#">
</a>
</div>
</div>
<div class="hero-right-side">
33
<img src="images/2.jpg" alt="heropageImg" />
</div>
<div class="left-side">
<figure>
</figure>
</div>
<div class="right-side">
<p>
and teams with you we can manage your all ground and above security issues.
</p>
<div class="button-group">
</div>
</div>
34
</section>
<p>
Below we mentioned some of our key features and types of services we provide.
</p>
<div class="section-third-task">
<div class="task-1">
<p>
We provide 24*7*365 day realtime SOC Services and team we can monitor all
</p>
</div>
<div class="task-2">
<h3>24*7 Services</h3>
<p>
</p>
35
</div>
<div class="task-3">
<p>
We are partners of big tech giants like IBM , Microsoft , Amazon , FLipkart
</p>
</div>
</div>
</section>
<div class="right-side">
<p>
You can create your own security team we will provide training to your
</p>
<div class="button-group">
36
<button class="common-button-normal">how its work?</button>
</div>
</div>
<div class="left-side">
</div>
</section>
<div class="left-side">
</div>
<div class="right-side">
<div class="fitness-goals">
<div class="rule1">
<h3>
37
<i class="fas fa-heart"></i> We will take care of your SOC
goals
</h3>
<p>
We can provide in office and virtual SOC labs and teams to monitor
</p>
</div>
<div class="rule2">
<h3>
</h3>
<p>
</p>
</div>
<div class="rule3">
<p>
we will provide you full assessment report and solution to Strengthen Your
Security
38
</p>
</div>
</div>
</div>
</section>
<footer>
<div class="logo-div">
</div>
<div class="footer-menu">
<div class="footer-div-2">
<h4>Products</h4>
<a href="#"><li>pricing</li></a>
<a href="#"><li>pricing</li></a>
</div>
<div class="footer-div-3">
<h4>Abouts</h4>
<a href="#"><li>pricing</li></a>
39
<a href="#"><li>pricing</li></a>
</div>
<div class="footer-div-4">
<h4>Blogs</h4>
<a href="#"><li>pricing</li></a>
<a href="#"><li>pricing</li></a>
</div>
<div class="footer-div-5">
<h4>Get In Touch</h4>
</div>
</div>
</footer>
---------------------------------------------------------------------- -->
<div class="icon-bar">
</a>
40
<a href="#" class="telegram" target="_thapa">
</a>
<a
href="https://www.instagram.com/thapatechnical/"
class="instagram"
target="_thapa"
>
</a>
</a>
<a
href="https://www.youtube.com/channel/UCwfaAHy4zQUb2APNOGXUCCA"
class="youtube"
target="_thapa"
>
</a>
</div>
41
</body>
</html>
Style.css
.mt-8 {
margin-top: 8px;
.bg-color {
background: #006f9e
.border-top-theme-333-3px {
.btn-333-colored {
color: #fff;
background-color: #00496b;
border-color: #00496b;
.icon-color {
42
color: #fff;
background-color: #013c4c;
border-color: #0092bb;
.bg-img {
background: #dbf2fb
.menuzord {
background: #dbf2fb
.list-inline li a {
letter-spacing: 1.5px;
margin: 0px;
padding: 0px;
font-size: 14px;
.list-inline ul {
margin: 0px;
padding: 0px;
.btn {
letter-spacing: 1.5px;
.section-content p {
43
color: #111;
font-size: 14.5px;
letter-spacing: 1px;
line-height: 27px;
font-weight: 500;
text-align: justify
.section-content h3 {
letter-spacing: 1px;
.bg-color-light {
background-color: #dbf2fb;
background-image: url("../../www.transparenttextures.com/patterns/concrete-wall.png");
.service-block {
background: #fff;
border-radius: 4px;
.bg-theme-img {
44
background-color: #006f9e;
background-image: url("../../www.transparenttextures.com/patterns/gplay.png");
.media-body p {
font-size: 14.5px;
letter-spacing: 1px;
line-height: 27px;
font-weight: 600
.section-title p {
font-size: 14.5px;
letter-spacing: 1px;
line-height: 27px;
font-weight: 500;
color: #111;
.service-block p{
font-size: 13.5px;
letter-spacing: 1px;
line-height: 27px;
font-weight: 500;
color: #111;
45
text-align: center;
3.4.2 Databases
46
Fig 3.4.2.3 Structure of services table
sChapter4
Snapshots
47
Fig 4.3 Admin Home Page
48
Fig 4.5 Member Page
49
Fig 4.7 Borrowed Books Page
50
Fig 4.9 Users Page
51
Chapter 5
Conclusion
Computer security is a vast topic that is becoming more important because the world is
becoming highly interconnected, with networks being used to carry out critical
transactions. Cybercrime continues to diverge down different paths with each New Year
that passes and so does the security of the information. The latest and disruptive
technologies, along with the new cyber tools and threats that come to light each day, are
challenging organizations with not only how they secure their infrastructure, but how they
require new platforms and intelligence to do so. There is no perfect solution for
cybercrimes but we should try our level best to minimize them in order to have a safe and
secure future in cyber space.
So, to secure the personal information and organization information person should have
the skills in the cybersecurity field. Person should know that if I commit this crime which
52
comes under cyber law , what punishment court will give to me. If any cybercrime happens
with user they should know where I have to register the complaint.
Chapter 6
Future Work
This website can be easily implemented under various situations. We can add new
features as and when we require. Reusability is possible as and when require in this
website. There is flexibility in all the modules.
53
Chapter 7
References
1. https://uniprojectmaterials.com/view-blog/how-to-write-an-outstanding-synopsis-
for-thesis-project [ Accessed on 10-10-2021 ]
2. https://www.javatpoint.com/software-engineering-data-flow-diagrams [ Accessed
on 10-12-2021 ]
3. https://www.smartdraw.com/entity-relationship-diagram/ [ Accessed on 11-12-
2021 ]
4. https://online.visual-paradigm.com/drive/#diagramlist:proj=0&new=ERDiagram
[ Accessed on 11-12-2021 ]
54
55
56