You are on page 1of 9

Bachelor of Technology – First Year

(Seminar Report Format)


Instruction for writing Seminar Report:
1. Font type (Times New Roman) must be same as in this report.

2. Normal Text of font Size 12 in Times New Roman font style, not bold
and justify format.

3. Main Headings are with font size 16 in Times New Roman font style
(Bold letters and justify format.

4. Sub-headings are with font size 14 in Times New Roman font style
(without Bold, each word is in sentence case and justify format.
Seminar Report
on

TOPIC
(Course Name and Branch II Semester Seminar SE-201)
2020-2021

Submitted to: Submitted by:


Mr.DEEPAK SINGH RANA Mr.Abhay
Tiwari
(CC-T B-II-Sem) Roll. No.: 2119469
B.TECH CSE II-Sem
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

GRAPHIC ERA HILL UNVERSITY, DEHRADUN

CERTIFICATE

Certified that Mr. Abhay Tiwari (Roll No.- 2119469) has

completed MOOC Seminar on the topic “Introduction to Cyber security”

for the fulfilment of B. tech and Cse II Semester Seminar (SE-201) in

Graphic Era Hill University, Dehradun. Student has successfully

completed this course as best of my knowledge.

Date:

(Mr.Abhay Tiwari)

Mr.DEEPAK SINGH
RANA

CC-T -II- Sem

CSE Department

GEHU, Dehradun
ACKNOWLEDGMENT

I would like to express our gratitude to the Almighty, the most Beneficent

and the most Merciful, for Successful completion of MOOC Seminar.

(optional)

I wish to thank our parents for their continuing support and

encouragement. We also wish to thank them for providing us with the

opportunity to reach this far in our studies. (optional)

I would like to thank particularly my External Supervisor Mr. XYZ for

his patience, support and encouragement throughout the completion of this

Course.

I also acknowledge to my Class coordinator Mr. XYZ and Subject

Teacher Mr. PQR Sir (if any) who help me to understand this course.

At last but not the least I greatly indebted to all other persons who

directly or indirectly helped me during this course.

Mr. Abhay Tiwari


Roll No.- 2119469
B. Tech, Cse-T-II
Session: 2020-2021
GEHU, Dehradun
TABLE OF CONTENTS

1. INTRODUCTION
1.1 Introduction to cyber security

1.2 Applications
1.2.1 Malware
1.2.2 Digital Attacks
1.3 History
1.3.1 Features of cyber security
1.3.2 Advantages and Disadvantages

2.Cyber crime

3.Challenges of cyber security


3.1 Network Security
3.2 Application Security
3.3 Data Security
3.4 Identity Security

4.Cyber Threats
4.1 Hacking
4.11 Phising
4.12 Denial of Service
4.13Malware
5. Antivirus and Firewalls
5.1 Packet filtering
5.2 Proxy Service
5.3 Specific Detection
5.4 Generic Detection
5.5 Heuristic Detection

6. CONCLUSION

7. REFERNCE
1. INTRODUCTION (Module-1 of Course)

1.1 Big Data Analytics


--------------------------------------------------------------------
-------------------------------------------------------------------
--------------------------------------------------------------------
-------------------------------------------------------------------
--------------------------------------------------------------------
-------------------------------------------------------------------

1.2 Applications of Big Data Analytics


1.2.1 Airline System
--------------------------------------------------------------------
-------------------------------------------------------------------

1.2.2 Facebook
--------------------------------------------------------------------
-------------------------------------------------------------------
1.3 History of Big Data Analytics
1.3.1 Hadoop 1.1 --------------------------------------------------------------------------
1.3.2 Hadoop 1.1 ------------------------------------------------------------------------
etc As per course

1.3.3 Any other if required according to project.

So on till last chapter


REFERENCE

1. Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Pearson


Education.

2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd


Edition, McGraw-Hill.

3. Silberschatz, Korth and Sudharshan: Data base System Concepts, 6th Edition, Mc-
GrawHill, 2010.

4. C.J. Date, A. Kannan, S. Swamynatham: An Introduction to Database Systems, 8th


Edition, Pearson education.

5. Etc.

Books on Database, Data warehouse and Big Data or any other related to course

You might also like