You are on page 1of 13

JAWAHAR NAVODAYA VIDYALAYA

EAST GODAVARI-1(DT.)

CERTIFICATE
This is to certify that the project work
“DATA SECURITY AND MANAGEMENT”
IS THE BONAFIDE WORK BY
NAME: Y V V S NAGA GANESH
HT NO:
IN THE DEPARTMENT OF COMPUTER SCIENCE, JAWAHAR
NAVODAYA VIDYALAYA, PEDDAPURAM, EAST GODAVARI_1
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT
OF AS PER THE CIRCULUM OF THE XII LEVEL DURING THE
YEAR 2022-2023

Internal Examiner External Examiner

PRINCIPAL

Page 1 of 13
INVESTIGATORY PROJECT ON

TOPIC: DATA SECURITY AND MANAGEMENT


NAME: Y V V S NAGA GANESH
HT NO:
CLASS: XIITH SCIENCE

PROJECT SUBMITTED TO DEPARTMENT OF


COMPUTER SCIENCE
JAWAHAR NAVODAYA VIDYALAYA, E.G

2022-23

Page 2 of 13
ACKNOWLEDGEMENT
It is with pleasure that I acknowledge my sincere gratitude
to our teacher, K. SRIDEVI (PGT IT) who taught and
undertook the responsibility of teaching the subject
computer science. I have been greatly benefited from his
classes.
I am especially indebted to our Principal K.RAMIREDDY
sir who has always been a source of encouragement and
support and without whose inspiration this project would not
have been a successful I would like to place on record
heartfelt thanks to him.
Finally, I would like to express my sincere appreciation for
all the other students for my batch their friendship & the fine
times that we all shared together.

NAME: Y V V S NAGA GANESH


CLASS: XIITH SCIENCE
HT. NO.:

Page 3 of 13
TABLE OF CONTENTS

S DESCRIPTION PAGE NO
NO.

1. ACKNOWLEDGEMENT 3
2. INTRODUCTION 5
3. NECESSITY OF THE PROJECT 6
4. PROJECT: DATA ENCRYPTION AND 6
DECRYPTION

5. OBJECTIVES OF THE PROJECT 6


6. SOURCE-CODE 7-8
7. OUTPUT 9-10
8. BIBILOGRAPHY 11

Page 4 of 13
INTRODUCTION

A single company may possess the personal information of millions of


customers—data that it needs to keep private so that customers’ identities
stay as safe and protected as possible, and the company’s reputation
remains untarnished.
 
We live in a In the digital age, where we typically apply the concept of data
privacy to critical personal information, also known as personally
identifiable information (PII) and personal health information (PHI). This
can include Social Security numbers, health and medical records, financial
data, including bank account and credit card numbers, and even basic, but
still sensitive, information, such as full names, addresses and birthdates.
and other information you wouldn’t want to share.

DATA BREACH:

 There can be various chance of a security violation, in which sensitive,


protected or confidential data is copied, transmitted, viewed, stolen or used
by an individual unauthorized to do so. Other terms are unintentional
information disclosure, data leak, information leakage, and data spill
commonly known as (DATA BREACH......)

Data breach may include in exploitation of:

1) PERSONALLY IDENTIFIABLE INFORMATION: This includes


data such as social security numbers, contact information, birth dates,
education and other personal information.

2)FINANCIAL INFORMAION: This includes charge card numbers and


expiry dates, bank accounts, investment details and similar data.

3)HEALTH INFORMATION: This includes details on health conditions,


prescription drugs, treatments and medical records.

4)INTELLECTUAL PROPERTY: This includes product drawings and


manuals, specifications, scientific formulas, marketing texts and symbols,
proprietary software and other material that the business has developed.
Page 5 of 13
5)COMPETITION INFORMATION: This includes data on competitors,
market studies, pricing information and business plans.

6)LEGAL INFORMATION: This includes documentation on court cases


the company may be pursuing, legal opinions on business practices, merger
and acquisition details and regulatory rulings

7)IT SECURITY DATA: This includes lists usernames and passwords,


encryption keys, security strategies and network structure.

Effects of DATA BREACH on a particular organisation:

1) Loss of Sales After a Data Breach:


Reputational damage also leads to a loss of customers and, in turn, a
decrease in sales. When current customers lose trust in a business, they
begin to look elsewhere

2) The financial impact:


The financial impact of a data breach is undoubtedly one of the most
immediate and hard-hitting consequences that organisations will have to
deal with Costs can include compensating affected customers, setting up
incident response efforts, investigating the breach, investment into new
security measures, legal fees, not to mention the eye-watering regulatory
penalties that can be imposed for non-compliance with the GDPR (General
Data Protection Regulation) .

3) Loss of sensitive data:


Biometric data is also extremely valuable to cybercriminals and worth a lot
more than basic credit card information and email addresses. The fallout
from breaches that expose this data can be disastrous and exceed any
financial and reputational damage,
Personal data is any information that can be used to directly or indirectly
identify an individual. This will include everything from a name to an email
address, IP address and images. It also includes sensitive personal data such
as biometric data or genetic data which could be processed to identify an

Page 6 of 13
individual.

NECESSITY OF THE PROJECT:


There is no foolproof method of protecting your company or data from any
of the types of data breaches mentioned previously. You can educate
yourself and your employees on the consequences of data breaches and
how likely it is for someone to hack into the system.

You can also ensure that your employees change their passwords regularly
by setting time-outs and timers on passwords. You can also remind your
employees to keep sensitive information they may carry with them outside
of work as safe as possible.

Page 7 of 13
PROJECT :

DATA ENCRYPTION AND DECRYPTION:

Encryption: is the process of translating plain text data into something that
appears to be random and meaningless (cipher text). Decryption is the
process of converting cipher text back to plaintext.

The goal of every encryption algorithm is to make it as difficult as possible


to decrypt the generated cipher text without using the key. If a really good
encryption algorithm is used, then there's no technique significantly better
than methodically trying every possible key. For such an algorithm, the
longer the key, the more difficult it is to decrypt a piece of cipher text
without possessing the key.
IMPORTANCE OF THE PROJECT:
* Storing the data in a better way that is to make data not readable for
anyone until it was given some set of separate commands or through any
trusted process assigned by the programmer ALSO CALLED DATA
ENCRPTION AND DECRYPTION

OBJECTIVES OF THE PROJECT:

 This can enhance the security of communication between client apps

 It helps protect private information, sensitive data, and servers.

 In essence, when your data is encrypted, even if an unauthorized


person or entity gains access to it, they will not be able to read it.

Page 8 of 13
SOURCE CODE:
:

Page 9 of 13
Page 10 of 13
OUTPUT:

⮚ EXECUTION OF THE PROGRAM:

Page 11 of 13
Page 12 of 13
BIBLIOGRAPHY

Books

● Computer Science with Python – Sumita Arora

WEBSITES

● ladderpython.com
 w3schools.com

Page 13 of 13

You might also like