Professional Documents
Culture Documents
ON
A of measures to be taken for ensuring cyber
security.
SUBMITTED BY
Karan sathe.(40)
Under Guidance of
MS.Manisha shelke.
Certificate
1 INTRODUCTION.
5 CYBER ETHICS.
6 SAFETY MEASURES OF
CYBERSECURITY.
7 CONCLUSION.
8 REFERENCES.
1.INTRODUCTION :
Cyber Security refers to the all safety measure taken to protect from all deception practices done online to steal
personal data and to protect networks, programs, devices, damage and any unauthorized access. Any
information which transferred through network can be easily hacked these days and everyone access most of the
things only whether it is professional or personal. In organisation most of the work done through email, audio
video conferences, HRMS, etc., and in personal people do online banking as well. Even the online chats are also
not safe these days [1-4]. Cyber-crime is increasing day by day therefore there are various organisation and
Government who come in front to deal with all kind of cyber-crimes. IT industry must focus on safety measure
as 60 percent of total transactions are done online so this field must have high quality of security to give all
safety to users while doing any transactions. Even the cyber space these days are not safe. The latest
technologies like E-commerce, mobile computing, cloud computing, big data science, artificial intelligence need
high cyber security standards. Making the internet safer is the important and integral part of the development IT
Services and for Government also important to look into it to safeguards IT Services. Though we have
individual cyber cells to deal every individual case and the response time is great. In 1903, first attack came into
existence and after that frequent crimes came up. People associated with cyber security but it is more than that.
The modern hackers are there who are breaking down cyber securities. Method has increased of hacking, new
techniques and new ways came up of cybercrime. These tools know a exploit kits which is designed to exploit
human and to blackmail them and get all information. Effective cyber security will protect but not necessary to
protect network where hackers will not attempt to attack and target to track the system or whole server. But by
cyber security, it will difficult for hackers to crack the firewall and get into it [4-7].
Cyber security is important in the world of networks where people are always online doing work and it can
provide opportunity for users to protect their personal information on the network or on device. Cyber security
gives Right to know and Right to information. Computer is safe through cyber security in terms of all damages
from virus, bacteria, online bugs etc. Cyber security also helps in monitoring the network and protects from
various kinds of threats. Also it protects from all cybercrimes where attackers didn’t get entrance on networks. It
allows protecting computers security a high level. Cyber security protects the confidential data, protects the
integrity and availability of computer system and resource data of systems. Therefore, cyber security is must to
get all confidential trade secrets and identifying lost data, integrity is sure so that data which is used have some
valuable and ethical data, and it helps from restrain all kind of viruses and data stolen. People have lost their
mental and financial stability due to cybercrime. Many of them lost their huge amount of money, personal
photos are viral through crimes and not only photos but videos as well due to which people lost their trust from
digital world. Therefore, cyber security must be there and government should take legal action against the cyber
Cyber criminals create their fake servers which look exactly like the original one with their malicious code so
that one can easily visit and input the personal information and they can easily track all detail. Cyber security
need to put more emphasis on protecting web servers so that users can’t be dragged into it and be safe. Always
check twice while doing any transaction and see about the server in detail.
Cloud space and its services- These days everyone is preferring for cloud space to store data. This latest
service becomes the challenge for cyber security as it requires large number of access and applications to
prevent important information. Hackers know all techniques to get into it.
Mobile Networks – Mobile is the need of everyone. We can see in everyone’s hand and its user do almost
every activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat etc. are very
common and it’s a big concern for the cyber security. These days ‘cyber security and firewalls becoming
permeable as people are using different kind of devices like smartphones, IPad, Tablet etc. all of which require
high level of security with two factor authentication. Mobile phones are very prone to cybercrime and user must
download latest software and application and make themselves protect from cybercrime.
Encrypted Code- Encryption is the process of encoding messages where only users or coders can read that and
hackers doesn’t know about it and unable to read the code. Therefore, encryption of code is must in the system
or networks. Every user must learn how to encode the messages and keep their data encrypted safe. Encryption
at every level is important and protect the data privacy and the integrity. But use of encryption is the big
challenge for cyber security. Encrypted code not only secure persona data on computers or mobile but it is also
helpful and secure data on all networks which is present online [5-10].
3. Imortance of security :
Cyber security is important as every organisation whether private or public both financial and non-financial,
corporate and military also access their data online and keep data, programs, process, files on computers, clouds,
and other devices. And these data must be important and carries sensitive information may be personal
information, intellectual property, financial information, unauthorized data etc. which might be access by the
cybercrimes and that is why cyber security is very important and everyone must know all safety measures which
need to be taken while working on networks [5-9]. Its importance is risen these days. Fundamentally, our
community is increasing for internet and network from days before and many of them doesn’t aware of hackers
and data stolen. They easily trust anyone online and share the details. Even many of them share all personal
detail on the wall of their social media which is highly not recommended.
1. Network Security - The networks are not secure enough as there are many unwanted users who can attack
2. Application Security- Application of both computer and mobile device need to be updated and tested on
3. Data Security - Securing data on applications and network need second layer of security which is very
challenging. One must protect their data very highly by two factor authentication so that no one can easily
access it.
4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its require large amount of
5. Mobile Security- It involves every type of security from login to space, from chat to banking which again
5. Cyber Ethics :
Cyber ethics is the code of internet. It is the practice which is use for good chance to use proper and safer
internet. There are few things which need to be consider for cyber ethics-
Offensive language- Do not use rude and any kind of violent language
Plagiarism – Never plagiarised any content of any one as it us under stolen and hacking.
- Do not involve with anyone else computer or network as its comes under cybercrime.
Copyright- Obey the copyright rules, never download material or software’s which involve the information
Cyber ethics are important and must be followed by everyone and if everyone takes the responsibility then
1. Internet Security Suite- One can use various anti malware software that are available for purchase either
through online or offline that helps them to protect and secure their information from various malware.
2. Strong Password- One should use strong and new password frequently. Password must be changed
frequently by using combination of letters, numbers and special characters and try to erase history of
browser once work done specially if using public or common computers or laptop.
3. Regular Update Software – It is important for OS and internet security to update regular software to avoid
any kind of cybercrime as criminal’s use known exploits and flaws to gain access of system.
4. Manage Social Media Settings- It is always very important to keep personal and private information
locked down. Cyber criminals keep an eye on social media information so it must be locked and frequently
change like password. Share as much less information on social media so that anyone won’t be able to
5. Intensify Home Network- Home network must have strong encrypted password and have virtual private
network. A VPN stands for Virtual Private Network; which allows you to create a secure connection to
another network over the internet.. It allows you to connect to the public networks more securely. It’s a
great idea to use VPN in both public and personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus, malware
software and block spyware attacks by regularly installing and updating software’s.
7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor
8. Install latest Operating System- Current and updated operating system must be used in Windows, Mac,
data online. Cases like tracking of online banking and personal data is common and most increasing crime.
There are data available where we can see daily cybercrime like OTP call, online money transfer, personal
information data, etc. Even organization is facing these crimes like leaking information of their work, project,
plans, infrastructure details etc. There is no absolute solution of cybercrimes but we can do our best by using
networks and online work safely. Cyber security takes all measures to protect online crime and use as
safeguards for all networks, programs, software and data. The protection and prevention of network is must and
provide all intentional and unintentional intrusion for both inside and outside system to protect and ensure
8. REFERENCES:
[1] M. Lakshmi Prasanthi. Cyber Crime: Prevention & Detection International Journal of Advanced
cyber-security
[3] https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips-conseils-eng.htm
[4] R. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-security analysis of smart SCADA systems with game
models. Proceedings of the 9th annual cyber and information security research conference, ACM, 2014,
pp. 109–112.
[5] Rachna Buch, Dhatri Ganda, Pooja Kalola, NiraliBorad, World of Cyber Security and Cybercrime.
[6] R.R. Nadikattu, New Ways of Implementing Cyber Security to Help in Protecting America (May 14,
2020). Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at
SSRN: https://ssrn.com/abstract=3622822
[7] M.S. Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT) in IT and its Help in
the Various Sectors across the World (April 4, 2020). International Journal of Computer Trends and
https://ssrn.com/abstract=3630513
[8] M.S. Mohsienuddin, Cloud Computing in IT and How It’s Going to Help United States Specifically
(October 4, 2019). International Journal of Computer Trends and Technology (IJCTT) – Volume 67 Issue
[9] R.R. Nadikattu, Data Warehouse Architecture – Leading the Next Generation Data Science (September
11, 2019). Rahul Reddy Nadikattu "Data Warehouse Architecture – Leading the next generation Data
Science" International Journal of Computer Trends and Technology 67.9 (2019):78-80.. Available at
[10] S.V. Dineshkumar, Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA (June
http://dx.doi.org/10.2139/ssrn.3624487.