You are on page 1of 10

SUBJECT NAME – MANAGEMENT

ACADEMIC YEAR – 2022-2023


COURSE NAME – CE 6I
SEMESTER – SIXTH

MICRO – PROJECT REPORT

“STUDY OF MEASURES TO BE TAKEN FOR


ENSURING CYBER SECURITY”
SHIVAJIRAO S. JONDHLE POLYTHECHNIC, ASANGAON

Maharashtra State Board of Technical Education


-- INDEX --

STUDY OF MEASURES TO BE TAKEN FOR


ENSURING CYBER SECURITY

SR.NO. TITLES PAGE NO.

1 INTRODUCTION 1

2 IMPORTANCE OF CYBER
2
SECURITY

3 CHALLENGES OF CYBER
3
SECURITY

4 SAFETY MEASURES OF
3
CYBERSECURITY

5 TREND OF CYBER SECURITY 4-5

10 STEPS TO CYBER
6 5-6
SECURITY

7 CONCLUSION 7

8 REFERENCES 8
INTRODUCTION

Cyber Security refers to the all safety measure taken to protect from all deception
practices done online to steal personal data and to protect networks, programs,
devices, damage and any unauthorized access. Any information which transferred
through network can be easily hacked these days and everyone access most of the
things only whether it is professional or personal. In organisation most of the work
done through email, audio video conferences, HRMS, etc., and in personal people do
online banking as well. Even the online chats are also not safe these days Cyber-crime is
increasing day by day therefore there are various organisation and Government who
come in front to deal with all kind of cyber-crimes. IT industry must focus on safety
measure as 60 percent of total transactions are done online so this field must have high
quality of security to give all safety to users while doing any transactions. Even the
cyber space these days are not safe. The latest technologies like E-commerce,
mobile computing, cloud computing, big data science, artificial intelligence need high
cyber security standards. Making the internet safer is the important and integral part of
the development IT Services and for Government also important to look into it to
safeguards IT Services.

Though we have individual cyber cells to deal every individual case and the response
time is great. In 1903, first attack came into existence and after that frequent crimes
came up. People associated with cyber security but it is more than that. The modern
hackers are there who are breaking down cyber securities. Method has increased of

1
hacking, new techniques and new ways came up of cybercrime. These tools know a
exploit kits which is designed to exploit human and to blackmail them and get all
information. Effective cyber security will protect but not necessary to protect network
where hackers will not attempt to attack and target to track the system or whole
server. But by cyber security, it will difficult for hackers to crack the firewall and get
into it . Cyber security is important in the world of networks where people are always
online doing work and it can provide opportunity for users to protect their personal
information on the network or on device. Cyber security gives Right to know and right
to information. Computer is safe through cyber security in terms of all damages from
virus, bacteria, online bugs etc. Cyber security also helps in monitoring the network
and protects from various kinds of threats. Also it protects from all cybercrimes where
attackers didn’t get entrance on networks. It allows protecting computers security a
high level. Cyber security protects the confidential data, protects the integrity and
availability of computer system and resource data of systems. Therefore, cyber
security is must to get all confidential trade secrets and identifying lost data, integrity is
sure so that data which is used have some valuable and ethical data, and it helps from
restrain all kind of viruses and data stolen. People have lost their mental and financial
stability due to cybercrime. Many of them lost their huge amount of money, personal
photos are viral through crimes and not only photos but videos as well due to which
people lost their trust from digital world. Therefore, cyber security must be there and
government should take legal action against the cyber criminals

 IMPORTANCE OF CYBER SECURITY

Cyber security is important as every organisation whether private or public both


financial and non-financial, corporate and military also access their data online and
keep data, programs, process, files on computers, clouds, and other devices. And
these data must be important and carries sensitive information may be personal
information, intellectual property, financial information, unauthorized data etc. which
might be access by the cybercrimes and that is why cyber security is very important
and everyone must know all safety measures which need to be taken while working
on networks. Its importance is risen these days. Fundamentally, our community is
increasing for internet and network from days before and many of them doesn’t aware
of hackers and data stolen. They easily trust anyone online and share the details. Even
many of them share all personal detail on the wall of their social media which is highly
not recommended. Cloud storage are also risky where people share their identity
information like PAN, AADHAR, Social security number, bank details, credit card
number which is very unsafe.

2
 CHALLENGES OF CYBER SECURITY

There are few challenges while doing effective cyber security in an organization or for
personal reasons: 1. Network Security - The networks are not secure enough as there
are many unwanted users who can attack and destruct the interventions. 2.
Application Security- Application of both computer and mobile device need to be
updated and tested on regular basis to ensure any kind of attacks. 3. Data Security -
Securing data on applications and network need second layer of security which is very
challenging. One must protect their data very highly by two factor authentication so
that no one can easily access it. 4. Cloud Security- Protecting data 100 percent on
cloud is very challenging as its require large amount of space and online safe
environment.
require conscious user’s involvement

 SAFETY MEASURES OF CYBERSECURITY

Basic precautions must be taken by everyone who use internet and online transactions
and work:

1. Internet Security Suite- One can use various anti malware software that are
available for purchase either through online or offline that helps them to protect
and secure their information from various malware.
2. Strong Password- One should use strong and new password frequently.
Password must be changed frequently by using combination of letters, numbers
and special characters and try to erase history of browser once work done
specially if using public or common computers or laptop.
3. Regular Update Software – It is important for OS and internet security to update
regular software to avoid any kind of cybercrime as criminal’s use known exploits
and flaws to gain access of system.
4. Manage Social Media Settings- It is always very important to keep personal and
private information locked down. Cyber criminals keep an eye on social media
information so it must be locked and frequently change like password. Share as
much less information on social media so that anyone won’t be able to guess
security questions answers.
5. Intensify Home Network- Home network must have strong encrypted password
and have virtual private network. A VPN stands for Virtual Private Network;
which allows you to create a secure connection to another network over the
internet.. It allows you to connect to the public networks more securely. It’s a
3
great idea to use VPN in both public and personal network so that it protects
everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using
anti-virus, malware software and block spyware attacks by regularly installing and
updating software’s.
7. Secure Mobile Devices- Mobile devices must be updated and password
protected in two-factor authentication and applications must be downloaded from
trusted sources.
8. Install latest Operating System- Current and updated operating system must be
used in Windows, Mac, Linux to prevent potential attacks on older software

 TREND OF CYBER SECURITY

Web Servers
Cyber criminals create their fake servers which look exactly like the original one with
their malicious code so that one can easily visit and input the personal information and
they can easily track all detail. Cyber security need to put more emphasis on protecting
web servers so that users can’t be dragged into it and be safe. Always check twice while
doing any transaction and see about the server in detail.
Cloud space and its services
These days everyone is preferring for cloud space to store data. This latest service
becomes the challenge for cyber security as it requires large number of access and
applications to prevent important information. Hackers know all techniques to get into
it.
Mobile Networks
Mobile is the need of everyone. We can see in everyone’s hand and its user do
almost every activity on mobile. From social media to banking, from pictures to videos,
WhatsApp chat etc. are very common and it’s a big concern for the cyber security.
These days ‘cyber security and firewalls becoming permeable as people are using
different kind of devices like smartphones, IPad, Tablet etc. all of which require high
level of security with two factor authentication. Mobile phones are very prone to
cybercrime and user must download latest software and application and make
themselves protect from cybercrime.
Encrypted Code
Encryption is the process of encoding messages where only users or coders can read
that and hackers doesn’t know about it and unable to read the code. Therefore,
4
encryption of code is must in the system or networks. Every user must learn how to
encode the messages and keep their data encrypted safe. Encryption at every level is
important and protect the data privacy and the integrity. But use of encryption is
the big challenge for cyber security. Encrypted code not only secure persona data on
computers or mobile but it is also helpful and secure data on all networks which is
present online.

 10 steps to cyber security


10 steps to an effective approach to cyber security

1. Risk management regime


Assess the risks to your organisation’s information and systems by embedding an
appropriate risk management regime. This should be supported by the Board and
senior managers. Ensure that all employees, contractors and suppliers are aware of the
approach and any applicable risk boundaries.

2. Secure configuration
Having an approach to identify baseline technology builds and processes for ensuring
configuration management can greatly improve the security of systems.

You should develop a strategy to remove or disable unnecessary functionality from


systems, and to quickly fix known vulnerabilities, usually via patching. Failure to do so
is likely to result in increased risk of compromise of systems and information.

3. Network security
Connections from your networks to the Internet and other partner networks, expose
your systems and technologies to a potential attack.

Reduce the chances of your systems and technologies being attacked by creating and
implementing simple policies and appropriate architectural and technical responses.
Your organisation's networks almost certainly span many sites and the use of mobile or
remote working, and cloud services, makes defining a fixed network boundary difficult.
Rather than focusing purely on physical connections, think about where your data is
stored and processed, and where an attacker would have the opportunity to interfere
with it.

4. Managing user privileges


If users are provided with unnecessary system privileges or data access rights, then the
risk of misuse or compromise is increased. All users should be provided with a
reasonable (but minimal) level of system privileges and rights needed for their role.

5
The granting of highly elevated system privileges should be carefully controlled and
managed. This principle is sometimes referred to as ‘least privilege’.

5. User education and awareness


Users have a critical role to play in their organisation’s security. It is important to
educate staff on the potential cyber risks, to ensure users can do their job as well as
help keep the organisation secure.

6. Incident management
All organisations will experience security incidents at some point.

Investment in creating effective incident management policies and processes will help
to improve resilience, support business continuity, improve customer and stakeholder
confidence and potentially reduce any impact. You should identify recognised sources
(internal or external) of specialist incident management expertise.

7. Malware prevention
Malicious software, or malware is an umbrella term to cover any code or content that
could have a malicious, undesirable impact on systems. Any exchange of information
carries with it a degree of risk that malware might be exchanged, this could seriously
impact your systems and services. The risk may be reduced by developing and
implementing appropriate anti-malware policies.

8. Monitoring
System monitoring aims to detect actual or attempted attacks on systems and business
services. Good monitoring is essential in order to effectively respond to attacks. In
addition, monitoring allows you to ensure that systems are being used appropriately in
accordance with organisational policies. Monitoring is often a key capability needed to
comply with legal or regulatory requirements.

9. Removable media controls


Produce a policy to control all access to removable media. Limit media types and use.
Scan all media for malware before importing onto the corporate system.

10. Home and mobile working


Mobile working and remote system access offers great benefits, but exposes new risks
that need to be managed. Risk based policies and procedures that support mobile
working or remote access to systems that are relevant to users, as well as service
providers should be created. Train users on the secure use of their mobile devices in
the environments they are likely to be working in.

6
CONCLUSION

Cybercrimes is one of the largest crimes in today’s time. Hackers and


thief are like sitting online and watching all data online. Cases like
tracking of online banking and personal data is common and most
increasing crime. There are data available where we can see daily
cybercrime like OTP call, online money transfer, personal information
data, etc. Even organization is facing these crimes like leaking
information of their work, project, plans, infrastructure details etc.
There is no absolute solution of cybercrimes but we can do our best by
using networks and online work safely. Cyber security takes all
measures to protect online crime and use as safeguards for all
networks, programs, software and data. The protection and prevention
of network is must and provide all intentional and unintentional
intrusion for both inside and outside system to protect and ensure
assurance, integrity of information and data online.

7
REFERENCES: -

https://www.gov.je/Pages/default.aspx
https://www.researchgate.net/

You might also like