You are on page 1of 5

A

Mini Project
Report on

“Title of Mini Project”

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE IN


PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF

SECOND YEAR COMPUTER ENGINEERING

SUBMITTED BY
ABC ROLL NO – C34448
UNDER THE GUIDANCE OF
Prof. Kajal Vatekar

DEPARTMENT OF COMPUTER ENGINEERING


STES SMT. KASHIBAI NAVALE COLLEGE OF
ENGINEERING,
VADGAON BK, PUNE – 411041
2022-23

AFFILIATED TO
CERTIFICATE
This is to certify that the seminar report entities

“TITLE”
Submitted by
ABC ROLL NO – C34448

is a bonafide work carried out by above students under the guidance of


Prof.Kajal Vatekar and it is approved for the Computer Graphics Laboratory –
Mini Project fulfilment of the requirement of Savitribai Phule Pune University.

Prof. K.A.Vatekar Prof. R.H. Borhade


Subject Teacher HOD, Computer Engineering

Dr. A.V. Deshpande


Principal
STES’ S SMT. KASHIBAI NAVALE COLLEGE OF
ENGINEERING,VADGAON,
PUNE.

Place:
Date: / /2022
ACKNOWLEDGEMENT

With due respect and gratitude I take the opportunity to thank those who have Helped me
directly and indirectly. I convey my sincere thanks to Prof.R.H.Borhade HoD computer
Dept. and Prof. Kajal Vatekar for their help in selecting The mini project topic and support. I
thank to my Mini Project guide Prof.Kajal Vatekar for her guidance, timely Help and
valuable suggestions without which this project would not have been. Possible. Her direction
has always been encouraging as well as inspiring for me. Attempts have been made to
minimize the errors in the report. I would also like to express my appreciation and thanks to
all my friends who Knowingly or unknowingly have assisted and encourage me throughout
my hard Work.
ABSTRACT

The broad objective of this study is an attack, threat and vulnerabilities of cyber
infrastructure, which include hardware and software systems, networks, enterprise networks,
intranets, and its use of the cyber intrusions. To achieve this objective, the paper attempts to
explain the importance g in network intrusions and cyber-theft. It also discusses in vivid
detail, the reasons for the quickdilation of cybercrime. The paper also includes a complete
description and definition of cyber security, the role it plays in network intrusion and cyber
recognize theft, a discussion of the reasons for the rise in cybercrime and their impact. In
closing the authors recommend some preventive measures and possible solutions to the
attack, threats and vulnerabilities of cyber security. The paper concludes that while
technology has a role to play in reducing the impact of cyber attacks, the vulnerability resides
with human behaviour and psychological predispositions. While literature supports the
dangers of psychological susceptibilities in cyber attacks investment in organizational
education campaigns offer optimism that cyber attacks can be reduced

// Write abstract related to your project. Above


abstract is just for your reference.
TABLE OF CONTENTS

 Introduction
 Future Prospect
 Application
 Conclusion
 Screenshots
 References

You might also like