You are on page 1of 31

Loknete Ma.

Hanmantrao Patil Charitable Trust’s


ADARSH INSTITUTE OF TECHNOLOGY AND
RESEARCH CENTRE ,VITA
MSBTE- 0991

SIXTH SEMESTER
(Year: 2023-24)
Micro Project

ETI (22618)

Title of the Project: “Prepare report on Need of Cyber Security.”

Branch: Computer Technology (CM6I)

Micro-project done by:

Sr. No. Name of Student Roll No.

01 Tanisha Kiran Kamble 3104


02 Shubham Dhondiram Mahadik 3113

03 Janhavi Satish Gade 3119

04 Sanika Santosh Jadhav 3126

1
Loknete Ma. Hanmantrao Patil Charitable Trust’s

Adarsh Institute of Technology & Research Centre, Vita

CERTIFICATE
This is to certify that the micro project report entitled

“Prepare report on Need of Cyber Security”


Submitted by

Sr. No. Name of Student Roll No.

01 Tanisha Kiran Kamble 3104


02 Shubham Dhondiram Mahadik 3113

03 Janhavi Satish Gade 3119

04 Sanika Santosh Jadhav 3126

For Sixth Semester of Diploma in Computer Technology of course ETI- 22618 for academic year 2023-24
as per MSBTE, Mumbai curriculum of ‘I’ scheme.

DIPLOMA OF ENGINEERING
(Computer Technology)

SUBMITTED TO
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION MUMBAI
ACADEMIC YEAR 2023-24

Project Guide H.O.D. Principal

Prof.A.A.Vankudre Prof.A.A.Vankudre Dr.P.S.Patil

2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI

MICRO PROJECT
Progress Report / Weekly Report
Title of the Project: “Prepare report on Need of Cyber Security.”

Course: ETI (22618) Program: Computer Technology (CM6I)

Sign of
Week Duration
Date Work / Activity Performed the
No in Hrs.
Faculty
1 / / 2023 2 hours Knowing the basic topic

2 / / 2023 1 hours Decide aim

3 / / 2023 2 hours Collect the data

4 / / 2023 2 hours Prepare project proposal

5 / / 2023 1 hours Search literature review

6 / / 2023 1 hours Analysis of data

7 / / 2023 2 hours Discussion over preparing

8 / / 2023 1 hours Correction in book let and report

9 / / 2023 2 hours Report writing

10 / / 2023 1 hours Checking report

11 / / 2023 1 hours Correction report write

12 / / 2023 1 hours Rechecking report

13 / / 2023 1 hours Finalizing report writing

14 / / 2023 1 hours Final submission

15 / / 2023 2 hours Oral presentation of micro project

3
Teacher Evaluation Sheet for Micro Project

Course Title and Code: ETI (22618)

Title of the Project: “Prepare report on Need of Cyber Security”

COs addressed by the Micro Project:

CO 1:- Describe Artificial Intelligence, Machine learning and deep learning.

CO 2:- Interpret IoT concepts.

CO 3:- Describe Models of Digital Forensic Investigation.

CO4:- Describe Evidence Handling procedures.

CO5:- Describe Ethical Hacking process.

CO6:- Detect Network, Operating System and applications vulnerabilities.

Marks:-

Marks obtained
Marks for by the Total
Roll No. Name Of Student Group Work individual Marks
(06) based on viva (10)
(04)
3104 Tanisha Kiran Kamble
3113 Shubham Dhondiram Mahadik
3119 Janhavi Satish Gade
3126 Sanika Santosh Jadhav

Name and designation of Faculty Member: Prof.A.A.Vankudre


HOD (Computer Technology Department)

Signature: _______________________

4
ACKNOWLEDGEMENT

I express my sincere gratitude to Prof.A.A.Vankudre for his stimulating guidance, continuous


encouragement and supervision throughout the course of present work.

I would like to place on record my deep sense of gratitude to Prof.A.A.Vankudre HOD-Department of


Computer Technology, for his generous guidance, help and useful suggestions.

I am extremely thankful to Principal Dr.P.S.Patil for this motivation and providing me infrastructural
facilities to work in, without which this work would not have been possible.

I would like to express my gratitude to all my colleagues for their support, co-operation and faithful
discussions on diverse seminar topics and technical help.

Name of Student Sign


1. Tanisha Kiran Kamble
2. Shubham Dhondiram Mahadik.
3. Janhavi Satish Gade.
4. Sanika Santosh Jadhav.

5
Index

Sr.No. Content Page No.

1.0 Rationale 07

2.0 Aim of the micro-project 07

3.0 Intended course outcome 07

4.0 Literature review 08

5.0 Proposed methodology 08

6.0 Skill Developed / learning out of this Micro Project 09

7.0 Future Scope 11

8.0 Output of the Micro Project 11

9.0 Application of this micro-project 16

10.0 Conclusion 16

6
PART A- Micro Project Proposal

Title of Micro project-: “Prepare report on Need of Cyber Security.”

4.0 Rationale :
In recent years, the Cyber Security is most important challenge which plays most important role and must
require in digital era where cybercrime become so frequent. Cyber Security is all about to stop cybercrime.
Cyber security is must and we have to know about all safety measures required to stop cybercrime. This
paper gives details information about cyber security and its safety measure. Also we will discuss about the
activities related to it and how actually cybercrime happens and all steps taken by the various organizations
and Government to have cyber ethics everywhere. Cyber security provides protection against the cybercrime
and teaches us what essential safety measures one need to follow from all cybercrimes. Securing online
information is priority where everyone is involved with technology. Whenever anyone talked about cyber
security, straight one thing comes in mind that is cybercrime and what safety measures need to take to be
safe from it.

2.0 Aim of the Micro-Project:

This Micro-Project aim to prepare report on Need of Cyber Security.

3.0 Intended Course Outcomes:

1. Describe Artificial Intelligence, Machine learning and deep learning.


2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

4.0 Literature Review:


Cyber security is important as every organisation whether private or public both financial and non-
financial, corporate and military also access their data online and keep data, programs, process, files on
computers, clouds, and other devices. And these data must be important and carries sensitive information
may be personal information, intellectual property, financial information, unauthorized data etc. which
might be access by the cybercrimes and that is why cyber security is very important and everyone must
know all safety measures which need to be taken while working on networks. Its importance is risen these
days. Fundamentally, our and data stolen. They easily trust anyone and share the details. Even many of them
share all personal detail on the wall of their social media which is highly not recommended. Cloud storage
7
are also risky where people share their identity information like PAN, AADHAR, Social security number,
credit card number which is very unsafe.

5.0 Proposed Methodology:

1. In this micro project, first of all I have focused on selection of appropriate topic for micro-project.
2. Select the topic i.e. Prepare report on Need of Cyber Security.
3. Then I started with our brief study as well as a survey on our topic.
4. Then I gathered all information based on the topic of micro project.
5. I have done analysis and study of our topic in details.
6. Following all the above methodologies we successfully completed with micro project.

6.0Action Plan

Sr. Planned Planned Name of Responsible


Details of activity
No. Start date Finish date Team Members
Project Proposal Shubham Dhondiram
1 Mahadik

2 Data Collection & Analysis Janhavi Satish Gade

3 Preparation of Prototype /Model Sanika Santosh Jadhav

4 Preparation of Report Tanisha Kiran Kamble

5 Presentation and submission All Members.

8
PART B- Micro Project Proposal

3.0 Intended Course Outcomes:

1. Describe Artificial Intelligence, Machine learning and deep learning.


2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

4.0 Literature Review:


Cyber security is important as every organisation whether private or public both financial and non-
financial, corporate and military also access their data online and keep data, programs, process, files on
computers, clouds, and other devices. And these data must be important and carries sensitive information
may be personal information, intellectual property, financial information, unauthorized data etc. which
might be access by the cybercrimes and that is why cyber security is very important and everyone must
know all safety measures which need to be taken while working on networks. Its importance is risen these
days. Fundamentally, our and data stolen. They easily trust anyone and share the details. Even many of them
share all personal detail on the wall of their social media which is highly not recommended. Cloud storage
are also risky where people share their identity information like PAN, AADHAR, Social security number,
credit card number which is very unsafe.

5.0 Actual Methodology Followed


Member 1) Shubham Dhondiram Mahadik.

Work: Search information regarding project subject.

Member 2) Janhavi Satish Gade.

Work: Collect information and discuss with group members about proposal.

Member 3) Sanika Santosh Jadhav.

Work: Analyses and finalize the information of the project report.

Member 4) Tanisha Kiran Kamble.

Work: Write project report

Member 5) Tanisha Kiran Kamble.

Work: Prepare rough sketch and final chart


9
5.0 Actual Resources Used

Sr.
Name of Resource/material Specifications Qty Remarks
No.
Laptop i5 8th gen, 8
1 Computer System 1
GB Ram
MP4-file format, 640
2 YouTube x 360 pixels 1

6.0 Skill Developed/ learning out of this Micro-Project:

 Concept related to cyber security.


 Trends in cyber security.
 Need of cyber security.

7.0 Future Scope:

 More software should be made available to the users to overcome the threats.
 More acts should be enhanced and come into force.
 More Alertness and awareness should be done.

8.0 Output of the Micro project:-

 Introduction :

Cyber Security refers to the all safety measure taken to protect from all deception practices done online
to steal personal data and to protect networks, programs, devices, damage and any unauthorized access. Any
information which transferred through network can be easily hacked these days and everyone access most of
the things only whether it is professional or personal. In organisation most of the work done through email,
audio video conferences, HRMS, etc., and in personal people do online banking as well. Even the Online
chats are also not safe these days. Cybercrime is increasing day by day therefore there are various
organisation and government which come in front to deal with all kind of cybercrimes. IT industry must
focus on safety measure as 60 percent of total transactions are done online so this field must have high
quality of security to give all safety to users while doing any transactions. Even the cyber space these days
are not safe. The latest technologies like E-commerce, mobile computing, cloud computing, big data
science, artificial intelligence need high cyber security standards. Making the internet safer is the important
and integral part of the development IT services and for Government also important to look into it to
safeguards IT services. Though we have individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into existence and after that frequent crimes came up.
10
People associated with cyber security but it is more than that. The modern hackers are there who are
breaking down cyber securities. Method has increased of hacking, new techniques and new ways came up of
cybercrime. These tools know a exploit kits which is designed to exploit human and to blackmail them and
get all information. Effective cyber security will protect but not necessary to protect network where hackers
will not attempt to attack and target to track the system or whole server. But by cyber security, it will
difficult for hackers to crack the firewall and get into it.

Cyber security is important in the world of networks where people are always online doing
work and it can provide opportunity for users to protect their personal information on the network or on
device. Cyber security gives Right to know and Right to information. Computer is safe through cyber
security in terms of all damages from virus, bacteria, online bugs etc. Cyber security also helps in
monitoring the network and protects from various kinds of threats. Also it protects from all cybercrimes
where attackers didn’t get entrance on networks. It allows protecting computers security a high level.
Cyber security protects the confidential data, protects the integrity and availability of computer system and
resource data of systems. Therefore, cyber security is must to get all confidential trade secrets and
identifying lost data, integrity is sure so that data which is used have some valuable and ethical data, and it
helps from restrain all kind of viruses and data stolen. People have lost their mental and financial stability
due to cybercrime. Many of them lost their huge amount of money, personal photos are viral through crimes
and not only photos but videos as well due to which people lost their trust from digital world. Therefore,
cyber security must be there and government should take legal action against the cyber criminals.

 Trends of Cyber Security:


1. Web Servers:

11
Cyber criminals create their fake servers which look exactly like the original one with their
malicious code so that one can easily visit and input the personal information and they can easily track all
detail Cyber security check twice while doing any transaction and see about the server in detail.

2. Cloud space and its services:

These days everyone is preferring for cloud space to store data. This latest service becomes the
challenge for cyber security as it requires large number of access and applications to prevent important
information. Hackers know all techniques to get into it.

3. Mobile Networks:

Mobile is the need of everyone. We can see in everyone’s hand and its user does almost every
activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat etc. are very
permeable as people are using different kind of devices like smartphones, IPad, Tablet etc. all of which
require high level of security with two factor authentication. Mobile phones are very prone to cybercrime
and user must download latest software and application and make they protect from cybercrime.

12
4. Encrypted Code:

Encryption is the process of encoding messages where only users or coders can read that and or
networks. Every user must learn how to encode the messages and keep their data encrypted safe. Encryption
at every level is important and protect the data privacy and the integrity. But use of encryption is the big
challenge for cyber security Encrypted code not only secure persona data on computers or mobile but it is
also helpful and secure data on all networks which is present online.

 Importance of Cyber Security:

Cyber security is important because it safeguards individuals and organizations against cyber-attacks
and theft or loss of sensitive and confidential information. Cyber security can monitor systems to protect
personal data (PII, PHI, financial details etc.), trade secrets, intellectual property and any sensitive
government information.

Obtaining a cyber security certification can help you protect yourself against fraud and online assaults!

 Challenges of Cyber Security :


There are few challenges while doing effective cyber security in an organization or for personal
reasons:

1. Network Security - The networks are not secure enough as there are many unwanted users who can
attack and destruct the interventions.

13
2. Application Security- Application of both computer and mobile device need to be updated and tested
on regular basis to ensure any kind of attacks.

3. Data Security - Securing data on applications and network need second layer of security which is very
challenging. One must protect their data very highly by two factor authentication so that no one can easily
access it.

4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its require large amount of
space and online safe environment.

5. Mobile Security- It involves every type of security from login to space, from chat to banking which
again require conscious user’s involvement.

 Safety Measures Of Cyber Security:


Basic precautions must be taken by everyone who use internet and online transactions and work:

1. Internet Security Suite- One can use various anti malware software that are available for
purchase either through online or offline that helps them to protect and secure their information
from various malware.
2. Strong Password- One should use strong and new password frequently. Password must be
changed frequently by using combination of letters, numbers and special characters and try to erase
history of browser once work done specially if using public or common computers or laptop.
3. Regular Update Software – It is important for OS and internet security to update regular
software to avoid any kind of cybercrime as criminal use known exploits and flaw to gain access
of system
4. Manage Social Media Settings- It is always very important to keep personal and private
information to keep personal; and private information locked down. Cyber criminals keep an eye
on social media information so it must be locked and frequently changes like passwords share as
much as less information on social media so that anyone won’t be able to guess security questions
answers
5. Intensify Home Network- Home network must have strong encrypted password and have virtual
private network. A VPN stands for Virtual Private Network; which allows you to create a secure
connection to another network over the internet. It allows you to connect to the public networks
more securely. It’s a great idea to use VPN in both public and personal network so that it protects
everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-virus,
malware software and block spyware attacks by regularly installation and updating software.
7. Secure Mobile Devices- Mobile devices must be updated and password protected in two-factor
authentication and applications must be downloaded from trusted sources.
8. Install latest Operating System- Current and updated operating system must be used in
Windows, Mac, and Linux to prevent potential attacks on older software.

14
 Advantages of cyber security:

 Protects system against viruses, worms, spyware and other unwanted programs.
 Protection against data from theft.
 Protects the computer from being hacked.
 Minimizes computer freezing and crashes.
 Gives privacy to users.

 Disadvantages of cyber security:

 Firewalls can be difficult to configure correctly.


 Incorrectly configured firewalls may block users from performing certain actions on the
Internet, until the firewall configured correctly.
 Makes the system slower than before.
 Need to keep updating the new software in order to keep security up to date.
 Could be costly for average user.

10.0 Conclusion:-

We learnt about cybercrimes is one of the largest crime in today’s time. Hackers and thief are like
sitting online and watching all data online. Cases like tracking of online banking and personal data is common
and most increasing crime. There are data available where we can see daily cybercrime like OTP call, online
money transfer, personal information data, etc. Even organization is facing these crimes like leaking
information of their work, project, plans, infrastructure details, etc.

There is no absolute solution of cybercrimes but we can do our best by using networks and online
work safely. Cyber security takes all measures to protect online crime and use as safeguards for all networks,
programs, software and data. The protection and prevention of network is must and provide all intentional and
unintentional intrusion for both inside and outside system to protect and ensure assurance, integrity of
information and data online.

15
Annexure

Teacher Evaluation Sheet

Name of Student: Tanisha Kiran Kamble Enrolment No.: 2109910036

Name of Programme: Computer Technology Semester: CM-6-I


Course Title: ETI Code: 22618

Title of the Micro-Project: Prepare report on Need of Cyber Security.

Course Outcomes Achieved:


1. Describe Artificial Intelligence, Machine learning and deep learning.
2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

Evaluation as per Suggested Rubric for Assessment of Micro Project


 (Please tick in appropriate cell for each characteristic)
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Relate to very few Related to some Take care of at- Take care of more
Relevance to Los Los least one CO than one CO
1
the course

Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection

Completion Completed less Completed 50 to Completed 60 to Completed more


of the Target than 50% 60% 80% than 80 %
3 as per
project
proposal
Sample Size small, Sufficient and Sufficient and Enough data
data neither appropriate sample, appropriate sample, collected by
Analysis of
organized nor enough data enough data sufficient and
Data and
4 presented well generated but not generated which is appropriate sample
representatio
organized and not organized and size. Proper
n
presented well. No presented well but inferences drawn
or poor inferences poor inferences by organizing and
16
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
drawn drawn presenting data
through tables,
charts and graphs.

Incomplete Just Well Well


fabrication/assembl assembled/fabricate assembled/fabricate assembled/fabricate
y. d and parts are not d with proper d with proper
functioning well. functioning parts. functioning parts.
Not in proper In proper shape, In proper shape,
Quality of shape, dimensions within tolerance within tolerance
Prototype/ beyond tolerance dimensions and dimensions and
5
Model limit. good good
Appearance/finish finish/appearance. finish/appearance.
is shabby. But no creativity in Creativity in design
design and use of and use of material
material

Very short, poor Nearly sufficient Detailed, correct Very detailed,


quality sketches, and correct details and clear correct, clear
Details about about methods, description of description of
methods, material, material, methods, materials, methods, materials,
precaution and precautions and precautions and precautions and
Report conclusions conclusion, but Conclusions. conclusions.
6
Preparation omitted, some clarity is not there Sufficient Graphic Enough tables,
details are wrong in presentation. But Description. charts and sketches
not enough graphic
description.

Major information Includes major Includes major Well organized,


is not included, information but not information and includes major
7 Presentation
information is not well organized and well organized but information ,well
well organized . not presented well not presented well presented

Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)

17
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly

Micro-Project Evaluation Sheet

Process Assessment Product Assessment


Part A - Total
Part B - Project individual
Project Project Methodology Marks
Report/Working Model Presentation/Viva
Proposal (2 marks) 10
(2 marks) (4 marks)
(2 marks)

Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
_______________________________________

Any Other Comment:


________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________

18
Name and designation of the Faculty Member

_______________________________________
_______________________________________

Dated Signature

__________________________________________

*****

19
Annexure

Teacher Evaluation Sheet

Name of Student: Shubham Dhondiram Mahadik Enrolment No.: 2109910075

Name of Programme: Computer Technology Semester: CM-6-I


Course Title: ETI Code: 22618

Title of the Micro-Project: Prepare report on Need of Cyber Security.

Course Outcomes Achieved:


1. Describe Artificial Intelligence, Machine learning and deep learning.
2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

Evaluation as per Suggested Rubric for Assessment of Micro Project


 (Please tick in appropriate cell for each characteristic)
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Relate to very few Related to some Take care of at- Take care of more
Relevance to Los Los least one CO than one CO
1
the course

Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection

Completion Completed less Completed 50 to Completed 60 to Completed more


of the Target than 50% 60% 80% than 80 %
3 as per
project
proposal
Sample Size small, Sufficient and Sufficient and Enough data
data neither appropriate sample, appropriate sample, collected by
Analysis of
organized nor enough data enough data sufficient and
Data and
4 presented well generated but not generated which is appropriate sample
representatio
organized and not organized and size. Proper
n
presented well. No presented well but inferences drawn
or poor inferences poor inferences by organizing and
20
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
drawn drawn presenting data
through tables,
charts and graphs.

Incomplete Just Well Well


fabrication/assembl assembled/fabricate assembled/fabricate assembled/fabricate
y. d and parts are not d with proper d with proper
functioning well. functioning parts. functioning parts.
Not in proper In proper shape, In proper shape,
Quality of shape, dimensions within tolerance within tolerance
Prototype/ beyond tolerance dimensions and dimensions and
5
Model limit. good good
Appearance/finish finish/appearance. finish/appearance.
is shabby. But no creativity in Creativity in design
design and use of and use of material
material

Very short, poor Nearly sufficient Detailed, correct Very detailed,


quality sketches, and correct details and clear correct, clear
Details about about methods, description of description of
methods, material, material, methods, materials, methods, materials,
precaution and precautions and precautions and precautions and
Report conclusions conclusion, but Conclusions. conclusions.
6
Preparation omitted, some clarity is not there Sufficient Graphic Enough tables,
details are wrong in presentation. But Description. charts and sketches
not enough graphic
description.

Major information Includes major Includes major Well organized,


is not included, information but not information and includes major
7 Presentation
information is not well organized and well organized but information ,well
well organized . not presented well not presented well presented

Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)

21
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly

Micro-Project Evaluation Sheet

Process Assessment Product Assessment


Part A - Total
Part B - Project individual
Project Project Methodology Marks
Report/Working Model Presentation/Viva
Proposal (2 marks) 10
(2 marks) (4 marks)
(2 marks)

Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
_______________________________________

Any Other Comment:


________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________

22
Name and designation of the Faculty Member

_______________________________________
_______________________________________

Dated Signature

__________________________________________

*****

23
Annexure

Teacher Evaluation Sheet

Name of Student: Janhavi Satish Gade Enrolment No.: 2209910007

Name of Programme: Computer Technology Semester: CM-6-I


Course Title: ETI Code: 22618

Title of the Micro-Project: Prepare report on Need of Cyber Security.

Course Outcomes Achieved:


1. Describe Artificial Intelligence, Machine learning and deep learning.
2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

Evaluation as per Suggested Rubric for Assessment of Micro Project


 (Please tick in appropriate cell for each characteristic)
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Relate to very few Related to some Take care of at- Take care of more
Relevance to Los Los least one CO than one CO
1
the course

Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection

Completion Completed less Completed 50 to Completed 60 to Completed more


of the Target than 50% 60% 80% than 80 %
3 as per
project
proposal
Sample Size small, Sufficient and Sufficient and Enough data
data neither appropriate sample, appropriate sample, collected by
Analysis of
organized nor enough data enough data sufficient and
Data and
4 presented well generated but not generated which is appropriate sample
representatio
organized and not organized and size. Proper
n
presented well. No presented well but inferences drawn
or poor inferences poor inferences by organizing and
24
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
drawn drawn presenting data
through tables,
charts and graphs.

Incomplete Just Well Well


fabrication/assembl assembled/fabricate assembled/fabricate assembled/fabricate
y. d and parts are not d with proper d with proper
functioning well. functioning parts. functioning parts.
Not in proper In proper shape, In proper shape,
Quality of shape, dimensions within tolerance within tolerance
Prototype/ beyond tolerance dimensions and dimensions and
5
Model limit. good good
Appearance/finish finish/appearance. finish/appearance.
is shabby. But no creativity in Creativity in design
design and use of and use of material
material

Very short, poor Nearly sufficient Detailed, correct Very detailed,


quality sketches, and correct details and clear correct, clear
Details about about methods, description of description of
methods, material, material, methods, materials, methods, materials,
precaution and precautions and precautions and precautions and
Report conclusions conclusion, but Conclusions. conclusions.
6
Preparation omitted, some clarity is not there Sufficient Graphic Enough tables,
details are wrong in presentation. But Description. charts and sketches
not enough graphic
description.

Major information Includes major Includes major Well organized,


is not included, information but not information and includes major
7 Presentation
information is not well organized and well organized but information ,well
well organized . not presented well not presented well presented

Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)

25
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly

Micro-Project Evaluation Sheet

Process Assessment Product Assessment


Part A - Total
Part B - Project individual
Project Project Methodology Marks
Report/Working Model Presentation/Viva
Proposal (2 marks) 10
(2 marks) (4 marks)
(2 marks)

Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
_______________________________________

Any Other Comment:


________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________

26
Name and designation of the Faculty Member

_______________________________________
_______________________________________

Dated Signature

__________________________________________

*****

27
Annexure

Teacher Evaluation Sheet

Name of Student: Sanika Santosh Jadhav. Enrolment No.: 2109910049

Name of Programme: Computer Technology Semester: CM-6-I


Course Title: ETI Code: 22618

Title of the Micro-Project: Prepare report on Need of Cyber Security.

Course Outcomes Achieved:


1. Describe Artificial Intelligence, Machine learning and deep learning.
2. Interpret IoT concepts.
3. Describe Models of Digital Forensic Investigation.
4. Describe Evidence Handling procedures.
5. Describe Ethical Hacking process.
6. Detect Network, Operating System and applications vulnerabilities.

Evaluation as per Suggested Rubric for Assessment of Micro Project


 (Please tick in appropriate cell for each characteristic)
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Relate to very few Related to some Take care of at- Take care of more
Relevance to Los Los least one CO than one CO
1
the course

Not more than two At-least 5 relevant At –least 7 relevant About 10 relevant
Literature sources (primary sources, at least 2 sources, most latest sources, most latest
Survey / and secondary), latest
2
information very old reference
collection

Completion Completed less Completed 50 to Completed 60 to Completed more


of the Target than 50% 60% 80% than 80 %
3 as per
project
proposal
Sample Size small, Sufficient and Sufficient and Enough data
data neither appropriate sample, appropriate sample, collected by
Analysis of
organized nor enough data enough data sufficient and
Data and
4 presented well generated but not generated which is appropriate sample
representatio
organized and not organized and size. Proper
n
presented well. No presented well but inferences drawn
or poor inferences poor inferences by organizing and
28
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
drawn drawn presenting data
through tables,
charts and graphs.

Incomplete Just Well Well


fabrication/assembl assembled/fabricate assembled/fabricate assembled/fabricate
y. d and parts are not d with proper d with proper
functioning well. functioning parts. functioning parts.
Not in proper In proper shape, In proper shape,
Quality of shape, dimensions within tolerance within tolerance
Prototype/ beyond tolerance dimensions and dimensions and
5
Model limit. good good
Appearance/finish finish/appearance. finish/appearance.
is shabby. But no creativity in Creativity in design
design and use of and use of material
material

Very short, poor Nearly sufficient Detailed, correct Very detailed,


quality sketches, and correct details and clear correct, clear
Details about about methods, description of description of
methods, material, material, methods, materials, methods, materials,
precaution and precautions and precautions and precautions and
Report conclusions conclusion, but Conclusions. conclusions.
6
Preparation omitted, some clarity is not there Sufficient Graphic Enough tables,
details are wrong in presentation. But Description. charts and sketches
not enough graphic
description.

Major information Includes major Includes major Well organized,


is not included, information but not information and includes major
7 Presentation
information is not well organized and well organized but information ,well
well organized . not presented well not presented well presented

Any other
(depending
upon nature of
8 project: please
write
indicators by
pen)

29
Sr
Characteristi
. Poor Average Good Excellent
c to be
N ( Marks 1-3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
assessed
o
Could not reply to Replied to Replied properly to Replied most of the
considerable considerable considerable questions properly
number of question. number of number of
Defence questions but not question.
9 very properly

Micro-Project Evaluation Sheet

Process Assessment Product Assessment


Part A - Total
Part B - Project individual
Project Project Methodology Marks
Report/Working Model Presentation/Viva
Proposal (2 marks) 10
(2 marks) (4 marks)
(2 marks)

Note:
Every course teacher is expected to assign marks for group evolution for each group of students in first 3
columns as per rubrics & individual evaluation in 4TH column for each group of students as per rubrics
based on viva.

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


___________________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
_______________________________________

Any Other Comment:


________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________

30
Name and designation of the Faculty Member

_______________________________________
_______________________________________

Dated Signature

__________________________________________

*****

31

You might also like