Professional Documents
Culture Documents
SIXTH SEMESTER
(Year: 2023-24)
Micro Project
ETI (22618)
1
Loknete Ma. Hanmantrao Patil Charitable Trust’s
CERTIFICATE
This is to certify that the micro project report entitled
For Sixth Semester of Diploma in Computer Technology of course ETI- 22618 for academic year 2023-24
as per MSBTE, Mumbai curriculum of ‘I’ scheme.
DIPLOMA OF ENGINEERING
(Computer Technology)
SUBMITTED TO
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION MUMBAI
ACADEMIC YEAR 2023-24
2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI
MICRO PROJECT
Progress Report / Weekly Report
Title of the Project: “Prepare report on Need of Cyber Security.”
Sign of
Week Duration
Date Work / Activity Performed the
No in Hrs.
Faculty
1 / / 2023 2 hours Knowing the basic topic
3
Teacher Evaluation Sheet for Micro Project
Marks:-
Marks obtained
Marks for by the Total
Roll No. Name Of Student Group Work individual Marks
(06) based on viva (10)
(04)
3104 Tanisha Kiran Kamble
3113 Shubham Dhondiram Mahadik
3119 Janhavi Satish Gade
3126 Sanika Santosh Jadhav
Signature: _______________________
4
ACKNOWLEDGEMENT
I am extremely thankful to Principal Dr.P.S.Patil for this motivation and providing me infrastructural
facilities to work in, without which this work would not have been possible.
I would like to express my gratitude to all my colleagues for their support, co-operation and faithful
discussions on diverse seminar topics and technical help.
5
Index
1.0 Rationale 07
10.0 Conclusion 16
6
PART A- Micro Project Proposal
4.0 Rationale :
In recent years, the Cyber Security is most important challenge which plays most important role and must
require in digital era where cybercrime become so frequent. Cyber Security is all about to stop cybercrime.
Cyber security is must and we have to know about all safety measures required to stop cybercrime. This
paper gives details information about cyber security and its safety measure. Also we will discuss about the
activities related to it and how actually cybercrime happens and all steps taken by the various organizations
and Government to have cyber ethics everywhere. Cyber security provides protection against the cybercrime
and teaches us what essential safety measures one need to follow from all cybercrimes. Securing online
information is priority where everyone is involved with technology. Whenever anyone talked about cyber
security, straight one thing comes in mind that is cybercrime and what safety measures need to take to be
safe from it.
1. In this micro project, first of all I have focused on selection of appropriate topic for micro-project.
2. Select the topic i.e. Prepare report on Need of Cyber Security.
3. Then I started with our brief study as well as a survey on our topic.
4. Then I gathered all information based on the topic of micro project.
5. I have done analysis and study of our topic in details.
6. Following all the above methodologies we successfully completed with micro project.
6.0Action Plan
8
PART B- Micro Project Proposal
Work: Collect information and discuss with group members about proposal.
Sr.
Name of Resource/material Specifications Qty Remarks
No.
Laptop i5 8th gen, 8
1 Computer System 1
GB Ram
MP4-file format, 640
2 YouTube x 360 pixels 1
More software should be made available to the users to overcome the threats.
More acts should be enhanced and come into force.
More Alertness and awareness should be done.
Introduction :
Cyber Security refers to the all safety measure taken to protect from all deception practices done online
to steal personal data and to protect networks, programs, devices, damage and any unauthorized access. Any
information which transferred through network can be easily hacked these days and everyone access most of
the things only whether it is professional or personal. In organisation most of the work done through email,
audio video conferences, HRMS, etc., and in personal people do online banking as well. Even the Online
chats are also not safe these days. Cybercrime is increasing day by day therefore there are various
organisation and government which come in front to deal with all kind of cybercrimes. IT industry must
focus on safety measure as 60 percent of total transactions are done online so this field must have high
quality of security to give all safety to users while doing any transactions. Even the cyber space these days
are not safe. The latest technologies like E-commerce, mobile computing, cloud computing, big data
science, artificial intelligence need high cyber security standards. Making the internet safer is the important
and integral part of the development IT services and for Government also important to look into it to
safeguards IT services. Though we have individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into existence and after that frequent crimes came up.
10
People associated with cyber security but it is more than that. The modern hackers are there who are
breaking down cyber securities. Method has increased of hacking, new techniques and new ways came up of
cybercrime. These tools know a exploit kits which is designed to exploit human and to blackmail them and
get all information. Effective cyber security will protect but not necessary to protect network where hackers
will not attempt to attack and target to track the system or whole server. But by cyber security, it will
difficult for hackers to crack the firewall and get into it.
Cyber security is important in the world of networks where people are always online doing
work and it can provide opportunity for users to protect their personal information on the network or on
device. Cyber security gives Right to know and Right to information. Computer is safe through cyber
security in terms of all damages from virus, bacteria, online bugs etc. Cyber security also helps in
monitoring the network and protects from various kinds of threats. Also it protects from all cybercrimes
where attackers didn’t get entrance on networks. It allows protecting computers security a high level.
Cyber security protects the confidential data, protects the integrity and availability of computer system and
resource data of systems. Therefore, cyber security is must to get all confidential trade secrets and
identifying lost data, integrity is sure so that data which is used have some valuable and ethical data, and it
helps from restrain all kind of viruses and data stolen. People have lost their mental and financial stability
due to cybercrime. Many of them lost their huge amount of money, personal photos are viral through crimes
and not only photos but videos as well due to which people lost their trust from digital world. Therefore,
cyber security must be there and government should take legal action against the cyber criminals.
11
Cyber criminals create their fake servers which look exactly like the original one with their
malicious code so that one can easily visit and input the personal information and they can easily track all
detail Cyber security check twice while doing any transaction and see about the server in detail.
These days everyone is preferring for cloud space to store data. This latest service becomes the
challenge for cyber security as it requires large number of access and applications to prevent important
information. Hackers know all techniques to get into it.
3. Mobile Networks:
Mobile is the need of everyone. We can see in everyone’s hand and its user does almost every
activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat etc. are very
permeable as people are using different kind of devices like smartphones, IPad, Tablet etc. all of which
require high level of security with two factor authentication. Mobile phones are very prone to cybercrime
and user must download latest software and application and make they protect from cybercrime.
12
4. Encrypted Code:
Encryption is the process of encoding messages where only users or coders can read that and or
networks. Every user must learn how to encode the messages and keep their data encrypted safe. Encryption
at every level is important and protect the data privacy and the integrity. But use of encryption is the big
challenge for cyber security Encrypted code not only secure persona data on computers or mobile but it is
also helpful and secure data on all networks which is present online.
Cyber security is important because it safeguards individuals and organizations against cyber-attacks
and theft or loss of sensitive and confidential information. Cyber security can monitor systems to protect
personal data (PII, PHI, financial details etc.), trade secrets, intellectual property and any sensitive
government information.
Obtaining a cyber security certification can help you protect yourself against fraud and online assaults!
1. Network Security - The networks are not secure enough as there are many unwanted users who can
attack and destruct the interventions.
13
2. Application Security- Application of both computer and mobile device need to be updated and tested
on regular basis to ensure any kind of attacks.
3. Data Security - Securing data on applications and network need second layer of security which is very
challenging. One must protect their data very highly by two factor authentication so that no one can easily
access it.
4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its require large amount of
space and online safe environment.
5. Mobile Security- It involves every type of security from login to space, from chat to banking which
again require conscious user’s involvement.
1. Internet Security Suite- One can use various anti malware software that are available for
purchase either through online or offline that helps them to protect and secure their information
from various malware.
2. Strong Password- One should use strong and new password frequently. Password must be
changed frequently by using combination of letters, numbers and special characters and try to erase
history of browser once work done specially if using public or common computers or laptop.
3. Regular Update Software – It is important for OS and internet security to update regular
software to avoid any kind of cybercrime as criminal use known exploits and flaw to gain access
of system
4. Manage Social Media Settings- It is always very important to keep personal and private
information to keep personal; and private information locked down. Cyber criminals keep an eye
on social media information so it must be locked and frequently changes like passwords share as
much as less information on social media so that anyone won’t be able to guess security questions
answers
5. Intensify Home Network- Home network must have strong encrypted password and have virtual
private network. A VPN stands for Virtual Private Network; which allows you to create a secure
connection to another network over the internet. It allows you to connect to the public networks
more securely. It’s a great idea to use VPN in both public and personal network so that it protects
everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus,
malware software and block spyware attacks by regularly installation and updating software.
7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor
authentication and applications must be downloaded from trusted sources.
8. Install latest Operating System- Current and updated operating system must be used in
Windows, Mac, and Linux to prevent potential attacks on older software.
14
Advantages of cyber security:
Protects system against viruses, worms, spyware and other unwanted programs.
Protection against data from theft.
Protects the computer from being hacked.
Minimizes computer freezing and crashes.
Gives privacy to users.
10.0 Conclusion:-
We learnt about cybercrimes is one of the largest crime in today’s time. Hackers and thief are like
sitting online and watching all data online. Cases like tracking of online banking and personal data is common
and most increasing crime. There are data available where we can see daily cybercrime like OTP call, online
money transfer, personal information data, etc. Even organization is facing these crimes like leaking
information of their work, project, plans, infrastructure details, etc.
There is no absolute solution of cybercrimes but we can do our best by using networks and online
work safely. Cyber security takes all measures to protect online crime and use as safeguards for all networks,
programs, software and data. The protection and prevention of network is must and provide all intentional and
unintentional intrusion for both inside and outside system to protect and ensure assurance, integrity of
information and data online.
15
Annexure
Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection
Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)
17
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly
Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.
18
Name and designation of the Faculty Member
_______________________________________
_______________________________________
Dated Signature
__________________________________________
*****
19
Annexure
Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection
Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)
21
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly
Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.
22
Name and designation of the Faculty Member
_______________________________________
_______________________________________
Dated Signature
__________________________________________
*****
23
Annexure
Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection
Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)
25
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly
Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.
26
Name and designation of the Faculty Member
_______________________________________
_______________________________________
Dated Signature
__________________________________________
*****
27
Annexure
Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection
Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)
29
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly
Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.
30
Name and designation of the Faculty Member
_______________________________________
_______________________________________
Dated Signature
__________________________________________
*****
31