You are on page 1of 9

MICROPROJECT REPORT

ON
A of measures to be taken for ensuring cyber

security.

SUBMITTED BY

Karan sathe.(40)

Under Guidance of

MS.Manisha shelke.

Diploma Course in Computer Technology

(As per directives of I Scheme, MSBTE)

JAYWANT SHIKSHAN PRASARK MANDA

BHIVARABAI SAWANT POLYTECHNIC, PUNE – 412207


Maharashtra State

Board of technical Education

Certificate

This is to certify that Mr.karan prakash sathe with Roll No. 40 of

Sixth Semester of Diploma in Computer Engineering of Institute

Bhivarabai Sawant Polytechnic Wagholi , Pune has successfully

completed the Micro-Project in Management (22509)

for the academic year 2021-2022

Place: Wagholi, Pune Enrollment No: 1910870046

Date: 24 Apr 2022 Exam seat No:

Ms.manisha shelke. MS.S.GAIKWAD . Dr.P.T KALE

Subject Teacher Head of Department Princelple


INDEX
SR. NO Contents

1 INTRODUCTION.

2 TREND OF CYBER SECURITY.

3 IMPORTANCE OF CYBER SECURITY.

4 CHALLENGES OF CYBER SECURITY.

5 CYBER ETHICS.

6 SAFETY MEASURES OF
CYBERSECURITY.

7 CONCLUSION.

8 REFERENCES.
1.INTRODUCTION :
Cyber Security refers to the all safety measure taken to protect from all deception practices done online to steal

personal data and to protect networks, programs, devices, damage and any unauthorized access. Any

information which transferred through network can be easily hacked these days and everyone access most of the

things only whether it is professional or personal. In organisation most of the work done through email, audio

video conferences, HRMS, etc., and in personal people do online banking as well. Even the online chats are also

not safe these days [1-4]. Cyber-crime is increasing day by day therefore there are various organisation and

Government who come in front to deal with all kind of cyber-crimes. IT industry must focus on safety measure

as 60 percent of total transactions are done online so this field must have high quality of security to give all

safety to users while doing any transactions. Even the cyber space these days are not safe. The latest

technologies like E-commerce, mobile computing, cloud computing, big data science, artificial intelligence need

high cyber security standards. Making the internet safer is the important and integral part of the development IT

Services and for Government also important to look into it to safeguards IT Services. Though we have

individual cyber cells to deal every individual case and the response time is great. In 1903, first attack came into

existence and after that frequent crimes came up. People associated with cyber security but it is more than that.

The modern hackers are there who are breaking down cyber securities. Method has increased of hacking, new

techniques and new ways came up of cybercrime. These tools know a exploit kits which is designed to exploit

human and to blackmail them and get all information. Effective cyber security will protect but not necessary to

protect network where hackers will not attempt to attack and target to track the system or whole server. But by

cyber security, it will difficult for hackers to crack the firewall and get into it [4-7].

Cyber security is important in the world of networks where people are always online doing work and it can

provide opportunity for users to protect their personal information on the network or on device. Cyber security

gives Right to know and Right to information. Computer is safe through cyber security in terms of all damages

from virus, bacteria, online bugs etc. Cyber security also helps in monitoring the network and protects from

various kinds of threats. Also it protects from all cybercrimes where attackers didn’t get entrance on networks. It

allows protecting computers security a high level. Cyber security protects the confidential data, protects the

integrity and availability of computer system and resource data of systems. Therefore, cyber security is must to

get all confidential trade secrets and identifying lost data, integrity is sure so that data which is used have some

valuable and ethical data, and it helps from restrain all kind of viruses and data stolen. People have lost their
mental and financial stability due to cybercrime. Many of them lost their huge amount of money, personal

photos are viral through crimes and not only photos but videos as well due to which people lost their trust from

digital world. Therefore, cyber security must be there and government should take legal action against the cyber

2 . Trend of cyber security :


Web Servers

Cyber criminals create their fake servers which look exactly like the original one with their malicious code so

that one can easily visit and input the personal information and they can easily track all detail. Cyber security

need to put more emphasis on protecting web servers so that users can’t be dragged into it and be safe. Always

check twice while doing any transaction and see about the server in detail.

Cloud space and its services- These days everyone is preferring for cloud space to store data. This latest

service becomes the challenge for cyber security as it requires large number of access and applications to

prevent important information. Hackers know all techniques to get into it.

Mobile Networks – Mobile is the need of everyone. We can see in everyone’s hand and its user do almost

every activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat etc. are very

common and it’s a big concern for the cyber security. These days ‘cyber security and firewalls becoming

permeable as people are using different kind of devices like smartphones, IPad, Tablet etc. all of which require

high level of security with two factor authentication. Mobile phones are very prone to cybercrime and user must

download latest software and application and make themselves protect from cybercrime.

Encrypted Code- Encryption is the process of encoding messages where only users or coders can read that and

hackers doesn’t know about it and unable to read the code. Therefore, encryption of code is must in the system

or networks. Every user must learn how to encode the messages and keep their data encrypted safe. Encryption

at every level is important and protect the data privacy and the integrity. But use of encryption is the big

challenge for cyber security. Encrypted code not only secure persona data on computers or mobile but it is also

helpful and secure data on all networks which is present online [5-10].

3. Imortance of security :
Cyber security is important as every organisation whether private or public both financial and non-financial,

corporate and military also access their data online and keep data, programs, process, files on computers, clouds,

and other devices. And these data must be important and carries sensitive information may be personal

information, intellectual property, financial information, unauthorized data etc. which might be access by the
cybercrimes and that is why cyber security is very important and everyone must know all safety measures which

need to be taken while working on networks [5-9]. Its importance is risen these days. Fundamentally, our

community is increasing for internet and network from days before and many of them doesn’t aware of hackers

and data stolen. They easily trust anyone online and share the details. Even many of them share all personal

detail on the wall of their social media which is highly not recommended.

4. Challenges of cyber security :


There are few challenges while doing effective cyber security in an organization or for personal reasons:

1. Network Security - The networks are not secure enough as there are many unwanted users who can attack

and destruct the interventions.

2. Application Security- Application of both computer and mobile device need to be updated and tested on

regular basis to ensure any kind of attacks.

3. Data Security - Securing data on applications and network need second layer of security which is very

challenging. One must protect their data very highly by two factor authentication so that no one can easily

access it.

4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its require large amount of

space and online safe environment.

5. Mobile Security- It involves every type of security from login to space, from chat to banking which again

require conscious user’s involvement.

5. Cyber Ethics :
Cyber ethics is the code of internet. It is the practice which is use for good chance to use proper and safer

internet. There are few things which need to be consider for cyber ethics-

 Offensive language- Do not use rude and any kind of violent language

 Cyber Bully- Never do any cyber bully as it’s a crime.

 Plagiarism – Never plagiarised any content of any one as it us under stolen and hacking.

- Do not involve with anyone else computer or network as its comes under cybercrime.

Copyright- Obey the copyright rules, never download material or software’s which involve the information

of other. Always us free data available on internet or software’s.

Cyber ethics are important and must be followed by everyone and if everyone takes the responsibility then

cybercrime will decline.


6. SAFETY MEASURES OF CYBERSECURITY :
Basic precautions must be taken by everyone who use internet and online transactions and work:

1. Internet Security Suite- One can use various anti malware software that are available for purchase either

through online or offline that helps them to protect and secure their information from various malware.

2. Strong Password- One should use strong and new password frequently. Password must be changed

frequently by using combination of letters, numbers and special characters and try to erase history of

browser once work done specially if using public or common computers or laptop.

3. Regular Update Software – It is important for OS and internet security to update regular software to avoid

any kind of cybercrime as criminal’s use known exploits and flaws to gain access of system.

4. Manage Social Media Settings- It is always very important to keep personal and private information

locked down. Cyber criminals keep an eye on social media information so it must be locked and frequently

change like password. Share as much less information on social media so that anyone won’t be able to

guess security questions answers.

5. Intensify Home Network- Home network must have strong encrypted password and have virtual private

network. A VPN stands for Virtual Private Network; which allows you to create a secure connection to

another network over the internet.. It allows you to connect to the public networks more securely. It’s a

great idea to use VPN in both public and personal network so that it protects everywhere.

6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware

software and block spyware attacks by regularly installing and updating software’s.

7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor

authentication and applications must be downloaded from trusted sources.

8. Install latest Operating System- Current and updated operating system must be used in Windows, Mac,

Linux to prevent potential attacks on older software.


7. CONCLUSION :
Cybercrimes is one of the largest crime in today’s time. Hackers and thief are like sitting online and watching all

data online. Cases like tracking of online banking and personal data is common and most increasing crime.

There are data available where we can see daily cybercrime like OTP call, online money transfer, personal

information data, etc. Even organization is facing these crimes like leaking information of their work, project,

plans, infrastructure details etc. There is no absolute solution of cybercrimes but we can do our best by using

networks and online work safely. Cyber security takes all measures to protect online crime and use as

safeguards for all networks, programs, software and data. The protection and prevention of network is must and

provide all intentional and unintentional intrusion for both inside and outside system to protect and ensure

assurance, integrity of information and data online.

8. REFERENCES:
[1] M. Lakshmi Prasanthi. Cyber Crime: Prevention & Detection International Journal of Advanced

Research in Computer and Communication Engineering Vol. 4, Issue 3, March 2015

[2] S. B. N. Godbole. Cyber Security: Understanding Cyber Crimes- https://digitalguardian.com/blog/what-

cyber-security

[3] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips-conseils-eng.htm

[4] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-security analysis of smart SCADA systems with game

models. Proceedings of the 9th annual cyber and information security research conference, ACM, 2014,

pp. 109–112.

[5] Rachna Buch, Dhatri Ganda, Pooja Kalola, NiraliBorad, World of Cyber Security and Cybercrime.

Recent Trends in Programming Languages .ISSN: 2455-1821 (Online) Volume 4, Issue 2

[6] R.R. Nadikattu, New Ways of Implementing Cyber Security to Help in Protecting America (May 14,

2020). Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at

SSRN: https://ssrn.com/abstract=3622822

[7] M.S. Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT) in IT and its Help in

the Various Sectors across the World (April 4, 2020). International Journal of Computer Trends and

Technology (IJCTT) – Volume 68 Issue 4 – April 2020. Available at SSRN:

https://ssrn.com/abstract=3630513
[8] M.S. Mohsienuddin, Cloud Computing in IT and How It’s Going to Help United States Specifically

(October 4, 2019). International Journal of Computer Trends and Technology (IJCTT) – Volume 67 Issue

10 - October 2019. Available at SSRN: https://ssrn.com/abstract=3629018

[9] R.R. Nadikattu, Data Warehouse Architecture – Leading the Next Generation Data Science (September

11, 2019). Rahul Reddy Nadikattu "Data Warehouse Architecture – Leading the next generation Data

Science" International Journal of Computer Trends and Technology 67.9 (2019):78-80.. Available at

SSRN: https://ssrn.com/abstract=3622840 or http://dx.doi.org/10.2139/ssrn.3622840

[10] S.V. Dineshkumar, Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA (June

10, 2020). Available at SSRN: https://ssrn.com/abstract=3624487 or

http://dx.doi.org/10.2139/ssrn.3624487.

You might also like