You are on page 1of 13

JAWAHAR NAVODAYA VIDYALAYA

EAST GODAVARI-1(DT.)

CERTIFICATE
This is to certify that the project work
“DATA SECURITY AND MANAGEMENT”
IS THE BONAFIDE WORK BY
NAME: Y V V S NAGA GANESH
HT NO:
IN THE DEPARTMENT OF COMPUTER SCIENCE, JAWAHAR
NAVODAYA VIDYALAYA, PEDDAPURAM, EAST GODAVARI_1
SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENT OF AS PER THE CIRCULUM OF THE XII
LEVEL DURING THE YEAR 2022-2023

Internal Examiner External Examiner

PRINCIPAL

Page 1 of 13
INVESTIGATORY PROJECT ON

TOPIC: DATA SECURITY AND MANAGEMENT


NAME: Y V V S NAGA GANESH
HT NO:
CLASS: XIITH SCIENCE

PROJECT SUBMITTED TO DEPARTMENT OF


COMPUTER SCIENCE
JAWAHAR NAVODAYA VIDYALAYA, E.G
2022-23

Page 2 of 13
ACKNOWLEDGEMENT
It is with pleasure that I acknowledge my sincere
gratitude to our teacher, K. SRIDEVI (PGT IT) who
taught and undertook the responsibility of teaching the
subject computer science. I have been greatly benefited
from his classes.
I am especially indebted to our Principal K.RAMIREDDY
sir who has always been a source of encouragement and
support and without whose inspiration this project would
not have been a successful I would like to place on record
heartfelt thanks to him.
Finally, I would like to express my sincere appreciation
for all the other students for my batch their friendship &
the fine times that we all shared together.

NAME: Y V V S NAGA GANESH


CLASS: XIITH SCIENCE
HT. NO.:

Page 3 of 13
TABLE OF CONTENTS

S NO. DESCRIPTION PAGE NO

1. ACKNOWLEDGEMENT 3
2. INTRODUCTION 5
3. NECESSITY OF THE PROJECT 6
4. PROJECT: DATA ENCRYPTION AND 6
DECRYPTION
5. OBJECTIVES OF THE PROJECT 6
6. SOURCE-CODE 7-8
7. OUTPUT 9-10
8. BIBILOGRAPHY 11

Page 4 of 13
INTRODUCTION

A single company may possess the personal information of millions of


customers—data that it needs to keep private so that customers’ identities
stay as safe and protected as possible, and the company’s reputation
remains untarnished.

We live in a In the digital age, where we typically apply the concept of


data privacy to critical personal information, also known as personally
identifiable information (PII) and personal health information (PHI). This
can include Social Security numbers, health and medical records, financial
data, including bank account and credit card numbers, and even basic, but
still sensitive, information, such as full names, addresses and birthdates.
and other information you wouldn’t want to share.

DATA BREACH:

There can be various chance of a security violation, in which sensitive,


protected or confidential data is copied, transmitted, viewed, stolen or
used by an individual unauthorized to do so. Other terms are unintentional
information disclosure, data leak, information leakage, and data spill
commonly known as (DATA BREACH.....)

Data breach may include in exploitation of:

1) PERSONALLY IDENTIFIABLE INFORMATION: This includes


data such as social security numbers, contact information, birth dates,
education and other personal information.

2) FINANCIAL INFORMAION: This includes charge card numbers


and expiry dates, bank accounts, investment details and similar data.

3) HEALTH INFORMATION: This includes details on


health conditions, prescription drugs, treatments and medical
records.

4) INTELLECTUAL PROPERTY: This includes product drawings and


manuals, specifications, scientific formulas, marketing texts and symbols,
proprietary software and other material that the business has developed.
Page 5 of 13
5) COMPETITION INFORMATION: This includes data on
competitors, market studies, pricing information and business plans.

6) LEGAL INFORMATION: This includes documentation on court


cases the company may be pursuing, legal opinions on business practices,
merger and acquisition details and regulatory rulings

7) IT SECURITY DATA: This includes lists usernames and


passwords, encryption keys, security strategies and network structure.

Effects of DATA BREACH on a particular organisation:

1) Loss of Sales After a Data Breach:


Reputational damage also leads to a loss of customers and, in turn, a
decrease in sales. When current customers lose trust in a business, they
begin to look elsewhere

2) The financial impact:


The financial impact of a data breach is undoubtedly one of the most
immediate and hard-hitting consequences that organisations will have to
deal with Costs can include compensating affected customers, setting up
incident response efforts, investigating the breach, investment into new
security measures, legal fees, not to mention the eye-watering regulatory
penalties that can be imposed for non-compliance with the GDPR
(General Data Protection Regulation) .

3) Loss of sensitive data:


Biometric data is also extremely valuable to cybercriminals and worth a
lot more than basic credit card information and email addresses. The
fallout from breaches that expose this data can be disastrous and exceed
any financial and reputational damage,
Personal data is any information that can be used to directly or indirectly
identify an individual. This will include everything from a name to an
email address, IP address and images. It also includes sensitive personal
data such as biometric data or genetic data which could be processed to
identify an individual.

Page 6 of 13
NECESSITY OF THE PROJECT:
There is no foolproof method of protecting your company or data from
any of the types of data breaches mentioned previously. You can educate
yourself and your employees on the consequences of data breaches and
how likely it is for someone to hack into the system.

You can also ensure that your employees change their passwords
regularly by setting time-outs and timers on passwords. You can also
remind your employees to keep sensitive information they may carry with
them outside of work as safe as possible.

Page 7 of 13
PROJECT :

DATA ENCRYPTION AND DECRYPTION:

Encryption: is the process of translating plain text data into something


that appears to be random and meaningless (cipher text). Decryption is the
process of converting cipher text back to plaintext.

The goal of every encryption algorithm is to make it as difficult as possible


to decrypt the generated cipher text without using the key. If a really
good encryption algorithm is used, then there's no technique significantly
better than methodically trying every possible key. For such an algorithm,
the longer the key, the more difficult it is to decrypt a piece of cipher text
without possessing the key.

IMPORTANCE OF THE PROJECT:

* Storing the data in a better way that is to make data not readable for
anyone until it was given some set of separate commands or through any
trusted process assigned by the programmer ALSO CALLED DATA
ENCRPTION AND DECRYPTION

OBJECTIVES OF THE PROJECT:

 This can enhance the security of communication between client apps

 It helps protect private information, sensitive data, and servers.

 In essence, when your data is encrypted, even if an unauthorized


person or entity gains access to it, they will not be able to read
it.

Page 8 of 13
SOURCE CODE:
:

Page 9 of 13
Page 10 of
OUTPUT:


EXECUTION OF THE PROGRAM:

Page 11 of
Page 12 of
BIBLIOGRAPHY

Books

● Computer Science with Python – Sumita Arora

WEBSITES

● ladderpython.com
 w3schools.com

Page 13 of

You might also like