Professional Documents
Culture Documents
Man Rep
Man Rep
A
MICRO PROJECT REPORT
ON
Certificate
This is to certify that
BALSARAF KUNAL KUNDAN ROLL NO. 03
CHAUDHARI SARTHAK BALU ROLL NO. 05
HINGE JAY SURESH ROLL NO. 13
KUTE BALKRUSHNA VILAS ROLL NO. 25
1. Micro-Project Proposal(Part A)
2. Micro-Project Report(Part B)
3. Micro-Project Evolution(Part C)
(PART – A)
Micro-Project
Proposal
Micro-Project Proposal
Study Of Measures To Be Taken For Ensuring Cyber Security
Subject Teacher :
Miss.Warule B. M.
(PART – B)
Micro-Project
Report
Micro-Project Report
Study Of Measures To Be Taken For Ensuring Cyber Security
Brief Description
Cyber security refers to measures taken to protect internet-connected devices.
networks, and data from unauthorized access and criminal use. Additionally, cyber
security ensures the confidentiality, integrity, and availability of data over its entire
life cycle.
Cyber security applies to both software and hardware, as well as information on
the internet. It can be used to protect everything from personal information to
complex government systems.
Cyber security refers to the measures taken to protect devices, networks, and data
from unauthorized access and criminal use. Cyber security can span various protection
measures, such as preventing cybercriminals from hacking into computers and other
connected devices and stealing sensitive information Password protection and
encryption are types of cyber security measures. Common types of cyber attacks
include phishing, malware, eavesdropping attacks, and denial-of-service (DoS)
attacks.
Cyber security is important in the world of networks where people are always
online doing work and it can provide opportunity for users to protect their personal
information on the network or on device. Cyber security gives Right to know and
Right to information. Computer is safe through cyber security in terms of all
damages from virus, bacteria, online bugs etc.
Cyber security also helps in monitoring the network and protects from various kinds
of threats. Also it protects from all cybercrimes where attackers didn't get entrance on
networks. It allows protecting computers security a high level. Cyber security protects
the confidential data, protects the integrity and availability of computer system and
resource data of systems.
Understanding Cybersecurity:-
Types of Cyberattacks:-
Cyber security professionals should have an in-depth understanding of the following
types of cyber security threats
1. Malware
Malware is malicious software such as spyware, ransomware, viruses and worms.
Malware is activated when a user clicks on a malicious link or attachment, which leads
to installing dangerous software. Cisco reports that malware, once activated, con:
3. Denial of Service
A denial of service (DoS) is a type of cyber attack that floods a computer or
network so it can't respond to requests. A distributed DoS (DDoS) does the same
thing, but the attack originates from a computer network. Cyber attackers often use a
flood attack to disrupt the "handshake" process and carry out a DoS. Several other
techniques may be used, and some cyber attackers use the time that a network is
disabled to launch other attacks. A botnet is a type of DDoS in which millions of
systems can be infected with malware and controlled by a hacker, according to Jeff
Melnick of Netwrix, an information technology security software company.
Botnets, sometimes called zombie systems, target and overwhelm a target's processing
capabilities. Botnets are in different geographic locations and hard to trace.
5. Phishing
Phishing attacks use fake communication, such as an email, to trick the receiver
into opening it and carrying out the instructions inside, such as providing a credit card
number. "The goal is to steal sensitive data like credit card and login information or to
install malware on the victim's machine," Cisco reports
6.SQL Injection
A Structured Query Language (SQL) injection is a type of cyber attack that
results from inserting malicious code into a server that uses SQL. When infected, the
server releases information. Submitting the malicious code can be as simple as
entering it into a vulnerable website search box.
7. Password Attacks
With the right password, a cyber attacker has access to a wealth of information.
Social engineering is a type of password attack that Data Insider defines as "a strategy
cyber attackers use that relies heavily on human interaction and often involves tricking
people into breaking standard security practices." Other types of password attacks
include accessing a password database or outright guessing. Businesses should use
different cyber security measures to keep their
The following processes and tools are fairly easy to introduce and, combined, they
will give you a basic level of security against the most common IT risks.
Use strong passwords
Strong passwords are vital to good online security. Make your password difficult to
guess by:
Create a password policy for your business to help staff follow security best
practices. Look into different technology solutions to enforce your password policy, e
g scheduled password reset. For detailed guidance on passwords, read the National
Cyber Security Centre's (NCSC) guide on using passwords to protect your data and
consider different password strategies that could boost your business security.
4. Restrict what can be copied from the system and saved to storage devices
Modern operating systems and network software will help you to achieve most of
this, but you will need to manage the registration of users and user authentication
systems - eg passwords. For more information, read NCSC's introduction to identity
and access management controls.
Put up a firewall
Firewalls are effectively gatekeepers between your computer and the internet.
They act as a barrier to prevent the spread of cyber threats such as viruses and
malware. It's important to set up firewall devices properly and check them regularly to
ensure their software/firmware is up to date, or they may not be fully effective. Read
more about firewalls in server security.
Raise awareness
Your employees have a responsibility to help keep your business secure. Make
sure that they understand their role and any relevant policies and procedures, and
provide them with regular cyber security awareness and training. Read about insider
threats in cyber security.
Mobile Networks
Mobile is the need everyone. We can see in everyone's hand and its user do
almost every activity on mobile. From social media to banking, from pictures to
videos, WhatsApp chat etc. are very common and it's a big concern for the cyber
security. These days 'cyber security and firewalls becoming permeable as people are
using different kind of devices like smartphones, IPad, Tablet ete, all of which require
high level of security with two factor authentication. Mobile phones are very prone to
cybercrime and user must download latest software and application and make
themselves protect from cybercrime.
Encrypted Code
Encryption is the process of encoding messages where only users or coders can read
that and hackers doesn't know about it and unable to read the code. Therefore,
encryption of code is must in the system or networks. Every user must learn how to
encode the messages and keep their data encrypted safe.
Encryption at every level is important and protect the data privacy and the
integrity. But use of encryption is the big challenge for cyber security. Encrypted
code not only secure persona data on computers or mobile but it is also helpful and
secure data on all networks which is present online.
It's importance is risen these days. Fundamentally, our community is increasing for
internet and network from days before and many of them doesn't aware of hackers and
data stolen. They easily trust anyone online and share the details. Even many of them
share all personal detail on the wall of their social media which is highly not
recommended. Cloud storage are also risky where people share their identity
information like PAN, AADHAR, Social security number, bank details, credit card
number which is very unsafe.
1. Network Security - The networks are not secure enough as there are many
unwanted users who can attack and destruct the interventions.
5. Data Security Securing data on applications and network need second layer of
security which is very challenging. One must protect their data very highly by two
factor authentication so that no one can easily access it.
6. Cloud Security Protecting data 100 percent on cloud is very challenging as its
require large amount of space and online safe environment.
7. Mobile Security- It involves every type of security from login to space, from
chat to banking which again require conscious user's involvement.
Cyber Ethics:-
Cyber ethics is the code of internet. It is the practice which is use for good chance to
use proper and safer internet. There are few things which need to be consider for
cyber ethics-
A. Offensive language- Do not use rude and any kind of violent language
B. Cyber Bully- Never do any cyber bully as it's a crime.
a. Plagiarism - Never plagiarised any content of any one as it us under stolen and
hacking.
b. Involvement- Do not involve with anyone else computer or network as its
comes cybercrime.
c. Copyright- Obey the copyright rules, never download material or software's
which involve the information of other. Always us free data available on
internet or software's. Cyber ethics are important and must be followed by
everyone and if everyone takes the responsibility then cybercrime will decline.
Safety Major Of Cyber Security:-
Basic precautions must be taken by everyone who use internet and online
transactions and work:
1. Internet Security Suite- One can use various anti malware software that
are available for purchase either through online or offline that helps them to
protect and secure their information from various malware.
2. Strong Password- One should use strong and new password frequently.
Password must be changed frequently by using combination of letters, numbers
and special characters and try to erase history of browser once work done
specially if using public or common computers or laptop.
3. Regular Update Software - It is important for OS and internet security to
update regular software to avoid any kind of cybercrime as criminal's use
known exploits and flaws to gain access of system.
4. Manage Social Media Settings- It is always very important to keep
personal and private information locked down. Cyber criminals keep an eye on
social media information so it must be locked and frequently change like
password. Share as much less information on social media so that anyone won't
be able to guess security questions answers.
5. Intensify Home Network- Home network must have strong encrypted
password and have virtual private network. A VPN stands for Virtual Private
Network; which allows you to create a secure connection to another network
over the internet.. It allows you to connect to the public networks more
securely. It's a great idea to use VPN in both public and personal network so
that it protects everywhere.