You are on page 1of 17

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCTAION

NAVJEEVAN EDUCATION SOCIETY


POLYTECHNIC

MICRO PROJECT

Academic year: 2023-24

TITLE OF MICRO PROJECT


Need of Cyber Security

Program: Information Technology


Program code: IF6I
Course: ETI
Course code: 22618
MHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
CERTIFICATE
This is to certify that 1. Saurabh Verma(732)
2. Omkar Shinde(733)
3. Purva Natalkar(734)
Of 6th semester of diploma in Information Technology of Institute,
Navjeevan Education Society Polytechnic (code:- 0144) has
completed the term work satisfactorily in subject Emerging Trends
in Computer and Information Technology(22618) for the
academic year 2023 to 2024 as prescribed in the curriculum.

Place: Bhandup Enrollment no:


2201440214
2201440215
2201440216

Date:- Exam Seat no:-

Subject Teacher Head of the Department Principal

Seal of

Institute
Emerging Trends in Computer
and Information Technology

Navjeevan Education Society Polytechnic


Bhandup [ W ]
Group Details

SR Name of Group Rol Enrollment Seat No.


No. Members l No.
No
.
1. Saurabh Verma 732 2201440214
2. Omkar Shinde 733 2201440215
3. Purva Natalkar 734 2201440216

Helped and guided by

Mrs.Mamta Mayekar
Brief Description:

Cybersecurity is important because it protects all categories of data


from theftand damage. This includes sensitive data, personally
identifiable information (PII), protected health information (PHI),
personal information, intellectual property, data, and governmental and
industry information systems.

It is the protection of internet-connected systems such as hardware,


software, anddata from cyberthreats. The practice is used by individuals
and enterprises to protect against unauthorized access to data centers and
other computerized.

systems. Computer security, cybersecurity (cyber security), or information technology


security (IT security) is the protection of computer systems and networks from attack by
malicious actors that may result in unauthorized information disclosure, theft of, or
damage to hardware, software,or data, as well as from the networking unit. The field has
become.
Cybersecurity is a critical aspect of our digital age, encompassing the technologies,
processes, and practices designed to protect networks, devices, programs, and data from
attack, damage, or unauthorized access. In your project, you can emphasize the
importance of cybersecurity in safeguarding individuals, organizations, and even nations
from various cyber threats such as malware, phishing attacks, data breaches, and
ransomware.

Aim of Micro Project


1. To have fun
2. To start thinking more carefully
3. To use constants and variable appropriately

Actual Resources Used

Sr. Name of Resources Specificatio OT


No. ns Y
1. Computer System Operating System: Windows 7 or 1
higherRam: 2GB HDD: 500GB or
largerProcessor: Core i3
2. Software Android Studio -
INDEX

Academic Year: 2023-24 Name of Faculty: Mrs.Mamta Mayekar


Program Code: Information Technology (IF6I)..
Semester: VI Course & Course Code: Network and Information Security.
Roll No.: 732,733,734.
Enrollment No: 2201440214,2201440215,2201440216.
Name of Candidate: Saurabh verma, Omkar shinde, Purva natalkar

SR CONTENT Page no.


NO.
1. Brief Description 1

2. Aim of the Micro-Project 1

3. Course Outcomes Integrated 1

4. Actual Procedure Followed 1

5. Actual Resources Used 2

6. Skill Developed/Learning out of this 2


Micro-Project

7. Implementation and Result 3-6

8. Conclusion 10

9. Micro-Project Evaluation Sheet 11-13


Need Of Cyber Security

 Introduction

In 2009, compared to physical theft fraudulent money transfers has exceeded in bank
branchesof United States. Crimes have gone up by 60% every year, in 2012, 3500 cases and
2070 in 2011 reported in India. As per report from National Crime records Bureau (NCRS),
Maharashtra reports 561 cases, Andhra 454 cases, Karnataka 437 cases in the year 2012
crimes which are done by age group of 18 to 30 [18]. Haryana registered 3 cases in 2011 but
116in the year 2012 which is a drastic raise. Compared to other crimes, this cybercrime
doesn’t require much investment and can be done in various locations. These crimes
originate from various sources and exhibits socio-educational/economic and technological
including addiction which also includes counterfeiting, economic crimes, money
laundering,child pornography, sexual exploitation, drug trafficking, human trafficking,
terrorism, fraudetc.
In our interconnected world, where digital technology pervades every aspect of our lives,
cybersecurity stands as a paramount concern. With the rapid expansion of the digital
landscape comes an equally rapid proliferation of cyber threats, ranging from malicious
software and phishing attacks to sophisticated cyber espionage campaigns. These threats
pose significant risks to individuals, businesses, and governments alike, jeopardizing
sensitive data, financial assets, and even national security. In this project, we delve into
the pressing need for cybersecurity, exploring its vital role in protecting our digital
infrastructure, safeguarding against cyber attacks, and ensuring the resilience of our
increasingly digitized society. Through an examination of emerging threats, technological
solutions, policy implications, and future trends, we aim to shed light on the critical
importance of proactive cybersecurity measures in mitigating risk and fostering a secure
digital environment for all.

Why Cyber Crime is more now days?

The increase in cybercrimes in recent years can be given to several valid reasons here are
some:

1. Expanding Digital Footprint: As society becomes more reliant on digital technologies for
communication, commerce, and entertainment, the potential attack surface for
cybercriminals expands. The proliferation of internet-connected devices, known as the
Internet of Things (IoT), provides cybercriminals with more entry points to exploit
vulnerabilities.

2. Sophisticated Attack Techniques: Cybercriminals continuously develop and deploy


sophisticated attack techniques, such as ransomware, phishing, and social engineering, to
exploit human and technological weaknesses. These tactics often evade traditional
security measures, making it challenging for individuals and organizations to defend
against them effectively.

3. Financial Incentives: Cybercrime has become increasingly lucrative, with cybercriminals


motivated by financial gain. Activities such as data theft, identity fraud, and ransomware
attacks offer cybercriminals opportunities to extort money from individuals, businesses,
and even government entities.

4. Anonymity and Global Reach: The anonymity provided by the internet allows
cybercriminals to operate from anywhere in the world, making it difficult for law
enforcement agencies to track and apprehend them. Additionally, the borderless nature of the
internet enables cybercriminals to target victims globally, amplifying the impact of their
attacks.

5. Evolving Cyber Threat Landscape: The rapid evolution of technology introduces new cyber
threats and vulnerabilities, outpacing the ability of individuals and organizations to keep pace
with cybersecurity defenses. Emerging technologies such as artificial intelligence,
cryptocurrency, and quantum computing present both opportunities and challenges for
cybersecurity.

6. Lack of Awareness and Training: Many individuals and organizations lack awareness of
cybersecurity best practices and fail to implement adequate security measures. Additionally,
a shortage of skilled cybersecurity professionals exacerbates the problem, leaving gaps in
cybersecurity defenses and making it easier for cybercriminals to exploit vulnerabilities.
7. State-Sponsored Cyber Attacks: Nation-states and state-sponsored threat actors engage in
cyber espionage, cyber warfare, and sabotage for political, economic, or military purposes.
These sophisticated and highly orchestrated attacks target critical infrastructure,
government agencies, and private sector organizations, posing significant cybersecurity
challenges.

More online transactions and digital data. Transaction and customer information, resultsof
product launches, and other market information are easily available. Creating valuable
intellectual property online is an attractive target.
Comparatively Corporations and companies are expected to be more transparent
than before.
Majority of people want to access to corporate networks through their
mobile devices for day to day activities. Though smarter technology devices increases
connectivity and but present latest types of security threats.

What is cyber Security?

The dictionary meaning says that Cyber Security is state of being protected against the
criminal or unauthorized use of electronic data, or the measures taken to achieve this. It is
the collection of tools, policies, security concepts, security safeguards, guidelines, risk
managementapproaches, actions, training, best practices, assurance and technologies that
can be used to protect the cyber environment and organization and user’s assets.
Organization and user’s assets include connected computing devices, personnel,
infrastructure, applications, services, telecommunications systems, and the totality of
transmitted and/or stored information in the cyber environment.
Cyber security ensures the maintenance of the security properties of the organization and
user’sassets against security risks in the networked environments. It is the body of
technologies, processes and practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.
Just like physical security is aimed at protecting physical property and people from criminal
activity or accidental damage, cybersecurity protects computer systems, back-end systems
and end-user applications, the users of those systems, and the data they store.
Cyber security is aimed at preventing cybercriminals, malicious insiders, or others, from
accessing, harming, disrupting or modifying IT systems and applications.
This is part of an extensive series of guides about data security.
As human society goes digital, all aspects of our lives are facilitated by networks, computer
and other electronic devices, and software applications. Critical infrastructure including ,
financial institutions, governments, and manufacturing, all use computers or smart devices
as a core part of their operations.
Challenges in Cyber Security

Cyber security has been considered as one of the most urgent national security problems.
A report says, in a speech during his presidential campaign, President Obama promised
to “makecyber security the top priority that it should be in the 21st century and appoint a
National Cyber Advisor who will report directly” to the President.
Cyber security must address not only deliberate attacks, such as from disgruntled
employees, industrial espionage, and terrorists, but inadvertent compromises of the
information infrastructure due to user errors, equipment failures, and natural disasters.
Vulnerabilities might allow an attacker to penetrate a network, gain access to control
software, and alter load conditions to destabilize a network in unpredictable ways.
Cybercriminals continually develop advanced attack techniques, such as ransomware,
zero-day exploits, and social engineering, which evade traditional security measures
and pose significant challenges for detection and mitigation.
The human factor remains one of the weakest links in cybersecurity. Employees often
lack awareness of cybersecurity risks and best practices, making them vulnerable to
phishing attacks, social engineering, and other cyber threats. Providing comprehensive
cybersecurity awareness training and fostering a culture of security awareness are
essential for mitigating human-related risks.
Need for Cyber Security in India:
 9.4% houses in India have computer (any of Laptop or Desktop). Chandigarh (U/T),
Goa and
 NCT of Delhi are top three stats/union territories with highest computer usage.
According to 2011 Census, Only 3.1 percent of total houses have Internet access
in
India.
 The census covered 24,66,92,667(246.7 million) houses in India and found only
76,47,473 (3.1%) of this houses use Internet. The Internet includes both broadband and
low-speed connections.
 According to Internet World Stats on June 30 2012, there were 2.4 billion internet
users (2,405,510,175) worldwide. China was the largest countries in terms of internet
users with over538 million users [19]. The following graph (figure 1) shows top 20
internet countries worldwideat mid-year 2012:

internet users in million

China:
Aim of Micro Project:
1. To have fun.

2. To start thinking more carefully.

3. To use constants and variable appropriately.

Course Outcome Addressed:


1. Gain Knowledge about cryptography.

2. Handle events and components.

3. Enhance understanding and importance about cryptography.

Actual procedure followed:


1. Firstly, all the two members gathered information on the particular topic.

2. Then we sorted the information according to its importance.

3. Then we tried to get example related to the topic i.e. Trojan Attack

4. Then all the information was analyzed and accordingly the project was formatted.

Actual Resources Used:

Sr. Name of Resources Specificatio OTY


No. ns
1. Computer System Operating System: Windows 7 or higher 1
Ram: 2GB HDD: 500GB or
largerProcessor: Core i3
2. Software Windows -

Skill developed / learning out of this Micro-project:


Throughout this project we developed some important skills like leadership
quality, scheduling of the project and risk management. One of the most
important skills we developed is communication and coordination between
our team members. We alsolearned planning skills, time management and
adaptability.
Implementation and Result:
1. It also promotes problem-solving, decision-making, impulse control, etc.
2. It can also help with hand-eye coordination and spatial awareness.
3. It has even been shown to reduce stress levels and anxiety.

Conclusion:
It helps us to gain knowledge about the trojan virus and its importance and also learn that
how to prevent this type of virus from computer systems.
Gained knowledge about how to prevent from this virus from different
the landscape of cybersecurity presents an ever-evolving challenge in our digitally
interconnected world. As we have explored throughout this project, the rise in cyber
crimes is driven by a combination of factors, including technological advancements,
financial incentives, global connectivity, and the evolving tactics of cybercriminals. How
amidst these challenges lies an opportunity for collaboration, innovation, and resilience.
MICRO PROJECT EVALUATION SHEET
NAME OF STUDENT: SAURABH VERMA
ENROLLMENT NO: 2201440214. SEMESTER: VI.
COURSE TITLE: Emerging trends in computer and information technology.
COURSE CODE: 22618
TITLE OF MICRO PROJECT: Need of Cyber Security.
Course Outcome Addressed:
a. Identify risks related to computer security and information hazard in various situations.
b. Apply User identification and authentication method.
c. Apply cryptographics algorithms and protocols to maintain computer security.
d. Maintain secured networks and describe Information Security Compliance standards

Sr. Characteristic to be Poor Average Excellent Sub Total


accessed (Marks 1-3) (Marks Good
No. (Marks
4- (Marks 6-
8) 9-10)
5)
(A) Process and Pro duct Assessment (Convert above tot al marks out of 6 marks)
1 Relevance to the course

2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal

4 Analysis of Data and


representation

5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Viva

(A) (B)
Process and Product Assessment IndividualPresentation/Viva (4 marks) Total
(6 marks) (Marks 10)

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


………………………………………………………………………………………………………
…………………………………………………………………………………………
Name and Designation of the Teacher
Mrs. Mamta Mayekar
Dated Signature…………………………………………………………
MICRO PROJECT EVALUATION SHEET
NAME OF STUDENT: OMKAR SHINDE
ENROLLMENT NO: 2201440215. SEMESTER: VI.
COURSE TITLE: Emerging trends in computer and information technology.
COURSE CODE: 22618
TITLE OF MICRO PROJECT: Needs of Cyber Security.
Course Outcome Addressed:
a. Identify risks related to computer security and information hazard in various situations.
b. Apply User identification and authentication method.
c. Apply cryptographics algorithms and protocols to maintain computer security.
d. Maintain secured networks and describe Information Security Compliance standards

Sr. Characteristic to be Poor Average Excellent Sub Total


Good
No. accessed (Marks 1-3) (Marks (Marks
4- (Marks 6-
8) 9-10)
5)
(A) Process and Pro duct Assessment (Convert above tot al marks out of 6 marks)
1 Relevance to the course

2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal
4 Analysis of Data and
representation

5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Viva

(A) (B)
Process and Product IndividualPresentation/Viva (4 marks) Total
Assessment (6 marks) (Marks 10)

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


……………………………………………………………………………………………………………………………………………………
…………………………………………………………………………
Name and Designation of the Teacher
Mrs. Mamta Mayekar
Dated Signature…………………………………………………………
MICRO PROJECT EVALUATION SHEET
NAME OF STUDENT: PURVA NATALKAR
ENROLLMENT NO: 2201440216. SEMESTER: VI.
COURSE TITLE: Emerging trends in computer and information technology.
COURSE CODE: 22618
TITLE OF MICRO PROJECT: Needs of Cyber Security.
Course Outcome Addressed:
a. Identify risks related to computer security and information hazard in various situations.
b. Apply User identification and authentication method.
c. Apply cryptographics algorithms and protocols to maintain computer security.
Maintain secured networks and describe Information Security Compliance
standards
Sr. Characteristic to be Poor Average Excellent Sub Total
accessed (Marks 1-3) (Marks Good
No. (Marks
4- (Marks 6-
8) 9-10)
5)
(A) Process and Pro duct Assessment (Convert above tot al marks out of 6 marks)
1 Relevance to the course

2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal

4 Analysis of Data and


representation

5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation

8 Viva

(A) (B)
Process and Product IndividualPresentation/Viva (4 marks) Total
Assessment (6 marks) (Marks 10)

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


……………………………………………………………………………………………………………………………………………………
…………………………………………………………………………
Name and Designation of the Teacher
Mrs. Mamta Mayekar
Dated Signature…………………………………………………………

You might also like