Professional Documents
Culture Documents
1|Page
2 collect information Parnika More
from the textbook
3 collect information Shafe Ahmed
from the internet
4 arrange all Dhruvraj Wankhede
information in ms
word
5 discuss with the Sofian Khan
project guide
6 print micro project Rutu Patel
2 internet Wikipedia/YouTube
2|Page
PART B
Need of Cyber security
3|Page
Cyber security becomes necessary as Businesses are being
carried out now on a Network of Networks. Computer networks
have always been the target of criminals, and it is likely that the
danger of cyber security breaking will only rise in the future as
these networks grow, but there are reasonable precautions that
organizations can take to minimize losses from those who desire
to do harm.
Confidentiality
4|Page
behavior or by accident. Such a failure of confidentiality is
commonly known as a breach.
Integrity
Availability
5|Page
attacks, and virus deployment. In India DEITY-Dept., of
Electronics & Information Technology operating under MCIT-
Ministry of Communication & Information Technology is
accountable for Cyberspace security other than delivering Govt.,
services online and promoting the IT Sector. The National
Information Board (NIB) a policy-making body for cyber security
works independently and is chaired by National Security Advisor
(NSA), CERT-In performs emergency cyber security functions
and releases annual reports on security incidents.
Cyberattack
• Virus
• Hacker
• Malware
• Trojan horses
• Password cracking
6|Page
1. Viruses and worms
Solution
2. Hackers
Types of Hackers
7|Page
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• The term "grey hat", "grey hat" or "gray hat" refers to a computer
hacker or computer security specialist who may sometimes break
laws or typical ethical standards, but does not have the malicious
intent typical of a black hat hacker.
1. Malware
To Stop Malware
3. Password Cracking
Securing Password
10 | P a g e
•Never use the exact password for two different sites.
Insider attacks
External attacks
Hack Hacktivism
11 | P a g e
Hack + Activism = Hacktivism is the usage of legal and/or illegal
digital tools in pursuit of a political/ personal objective
website defacements
Redirects
Identity Theft
E-mail Bombing
Web-Site Mirroring
Doxing
12 | P a g e
Phishing - attempt to obtain sensitive information, like bank
account information or an account password, by posing as an
honest entity in an electronic communication
You get an email that looks like it comes from your bank, credit
card company, etc. Asking you to "update their records" may be
due to potential scams, or other reasons Provides a hyperlink to a
web page where you enter your personal information The link
takes you to a thief's website that is disguised to look like the
company's.
14 | P a g e
Standards & Regulations
15 | P a g e
4.0 Skill Developed / Learning outcomes of this Micro-Project
16 | P a g e