Professional Documents
Culture Documents
SEO (1) New Arpit
SEO (1) New Arpit
“Internet Issue”
A report submitted
in partial fulfilment of the requirements for the degree of
Bachelor of Technology in Computer Science and Engineering
by
Aman Sharama (2022502699)
Arpit Yadav (2022496878)
Supervised by:
Dr. Kusum Lata
Assistant Professor
June, 2023
1
2
CERTIFICATE
Signature of Supervisor
Date:
Signature of Examiner
Date:
2
3
ACKNOWLEDGEMENT
My grateful thanks to Dr. Kusumlata for her guidance in our project work
and took time out to hear, guide and keep us on the correct path.
Abstract
3
4
The project begins by exploring the issue of online privacy and data
security, shedding light on the vulnerabilities that arise from digital
transactions, social media usage, and cloud storage practices. It
investigates the ethical concerns related to the collection, storage,
and use of personal data by internet companies, as well as the
potential consequences of data breaches and cyber attacks.
4
5
TABLE OF CONTENTS:
• INTRODUCTION................................................................................6
• RELIABILITY OF INFORMATION ........................................................7
• UNDESIRABLE INFORMATION..........................................................9
• SECURITY OF DATA TRANSFER USING INTERNET ..........................11
• PHISING..........................................................................................13
• PHARMING.....................................................................................14
• CONCLUSION..................................................................................15
• References......................................................................................17
5
6
1. INTRODUCTION
The Internet links are computer networks all over the world so that users can
share resources and communicate with each other. The Internet is an inherently
participative medium. Anybody can publish information or create new services
that´s why it is a fantastic resource for finding and sharing information. The Web
contains literally billions of web pages containing information about every topic
imaginable. However we need to take care when using the Internet to look for
information, or to send Information
2. RELIABILITY OF INFORMATION
The Internet and Web are not regulated - there is no organisation that controls who can
create web pages or what those pages can contain.
So... how do you which web pages to believe, which information to trust
Stick to websites that belong to trusted organisations. If the website address ends
in .gov.uk it is more likely to be reliable than one that ends in .com
Look at the spelling and grammar used.
Who is the author or sponsor of the page?
Are there obvious reasons for bias
Is there a copyright symbol on the page?
If so, who holds the copyright?
Is this page a "zombie," or one considered "walking dead" because the person who
posted it no longer maintains or updates it?
What is the purpose of the page? Why is this information being posted--as
information, as a public service, as a news source, as a research tool for academics,
as a personal ax to grind, or as a way to gain attention?
How well organized is the page? Is the page easy to navigate? Is it complete?
When was the page last updated? Is the information on it current? How credible
are the links it provides?
Can you verify the information on the Web page some other way?
6
1
2
1
UNDESIRABLE INFORMATION
In addition to the Web being full of websites with inaccurate information, there
are also a huge number of websites that contain highly offensive, or illegal
material.
Avoiding this type of material can be tricky. Many organisations and also many
parents, make use of web page filtering software. This software attempts to
prevent offensive and illegal material being accessed. Even if filtering software is
not installed on a computer, you can still take steps to help you avoid these types
of sites: Use the 'safe search' feature on search engines such as Google.
Don’t click the links that are shown in junk email (spam)
Think carefully about the keywords that you use to search with
Many websites, especially online shopping or online banking sites, require you to
enter personal information, such as credit card numbers, social security IDs, etc.
To make sure your data is safe, these websites use encryption - they are called
secure websites.
You should always make sure that a website is secure before giving personal
information... The website URL (address) should begin with https://... (normal,
unsecure sites have addresses that start with http://...) § Your web browser should
show a closed padlock icon
1
2
PHISING
'Phishing' is the nickname given to the sending of fraudulent e- mails
that attempt to trick people into revealing details about their bank
accounts, or other online accounts (e.g. Amazon, eBay, etc.)
The 'phishers' then use these bank details to login to the victim's bank
account and take their money. The e-mail looks very convincing. It even
has the bank's logo. And it sounds urgent and scary... If you were to click
the link, you would be taken to a fake bank website. Then if you were to
enter your login details, these would be recorded by the phishers and
used to empty your real bank account.
PHARMING
2
3
3
4
numbers (“1234”) or personal information that someone who knows you might
guess, such as your date of birth or a pet’s name.
To make your passwords more complex, you could consider creating a
'passphrase' instead. Passphrases involve picking a meaningful phrase that is
easy to remember and then making the first letter of every word the password.
2.Limit social media sharing:-
Familiarize yourself with each social networking platform’s security
settings and ensure these are set to a level you are comfortable with.
Avoid disclosing personal information like your address or date of birth in
your social media bios – criminals can use this data to build up a picture
about you
3.Monitor your accounts
Regularly check your bank or credit card statements, or other accounts, so
you can see if any unauthorized charges or other anomalies have taken
place. You may not receive a notification when a company you transact
with has a data breach, so it's advisable to stay vigilant yourself.
4
1
1.
Understanding Data Security:
2.
Definition of data security and its key components.
Types of data at risk: personal, financial, intellectual property, etc.
Common threats and vulnerabilities to data security.
3.
Assessing Data Security Risks:
4.
Conducting a comprehensive risk assessment.
Identifying potential vulnerabilities and threats specific to the organization.
Understanding the consequences of data breaches.
5.
Best Practices for Data Security:
6.
Implementing strong access controls and authentication mechanisms.
Encryption techniques for data protection in transit and at rest.
Regular data backups and disaster recovery planning.
Employee training on data security awareness and best practices.
7.
Network and Infrastructure Security:
8.
Securing networks through firewalls, intrusion detection systems, and virtual
private networks.
Implementing robust authentication mechanisms and secure remote access
protocols.
Regular network monitoring and threat detection.
9.
Application Security:
10.
Ensuring secure coding practices and regular software updates.
Conducting vulnerability assessments and penetration testing.
Implementing web application firewalls and secure development frameworks.
11.
Physical Security Measures:
12.
Securing data centers and server rooms.
1
2
2
1
1
2
CONCLUSION
Please note that this content is a general guideline, and you can
expand and modify it according to your project's specific
requirements
2
1
REFERENCE
Please note that this reference assumes that the project is an unpublished
manuscript or a work in progress. If your project is based on a published source
or includes specific citations, please provide more details, such as the author(s),
publication title, year, and other relevant information, so that I can create a
more accurate reference for you.