Professional Documents
Culture Documents
SAL Engineering & Technical Institute: Gujarat Tehnological University Ahmedabad
SAL Engineering & Technical Institute: Gujarat Tehnological University Ahmedabad
AHMEDABAD
Affiliated
“Cyber Security”
Under the Subject of
(Computer Engineering)
Submitted By:
Sr. No Name Enrollment No
1 Patel Priyansh P 181260107066
2 Patel Kevin R 181260107056
3 Patel Simoli J 181260107072
4 Prajapati Riddhi N 181260107081
5 Patel Kishan 181260107057
Academic Year
(2019-20)
Table of Contents
Acknowledgement 3
1. Introduction 4
Preparation of Canvas 4
3 Empathy Mapping 6
Mind Mapping 10
Empathy Mapping 11
6 Rough Prototype 20
9 Conclusion 21
References
Cyber Security plays an important role in the field of information technology. Securing the information
have become one of the biggest challenges in the present day. When ever we think about the cyber security
the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day.
Various Governments and companies are taking many measures in order to prevent these cyber crimes.
Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on
challenges faced by cyber security on the latest technologies. It also focuses on latest about the cyber
security techniques, ethics and the trends changing the face of cyber security.
ACKNOWLEDGEMENT
I have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals and organization. I would like to extend my sincere thanks to
all of them.
I am highly indebted to prof. RAMA MALIYA FOR their guidance and constant supervision as well
as for providing necessary information
Regarding the project and also for their supporting in completing the project. I would like the express
my gratitude to word member of my project for their kind co-operation and encouragement which help
me in completion of this project.
1.Introduction
(a) Design thinking is a process for creative problem solving. Design thinking has a
human-centered core. It encourages organizations to focus on the people they're creating for, which
leads to better products, services, and internal processes......The process starts with taking action and
understanding the right questions.
(b) Design is how it works for someone. A designer solves challenges through creativity, rapid
iteration, and most importantly, empathy. Empathy is critical in design because learning and
understanding how people use, interact with, and feel about a design is crucial to design success.
The solutions that were made in the past for above problems is mentioned below:
School Security System (SSS) using RFID, This System ensures safety of the students by making their
parents aware about the various important status about their students like in-time, out-time, everything
about their arrival. By using RFID technology it is easy track the student thus enhances the security and
safety in selected zone. The information about student such as in time and out time from Bus and campus
will be recorded to web based system and SMS will be automatically sent to their parents that the student
arrived to Bus/Campus safely. SMS will be sent to parents whose children are absent without taking leave.
The parents can log into system website and monitor the details of their children. The implementation of
School Security System(SSS) via RFID to avoid crime, illegal activates by students and reduce worries
among parents.
3.Empathy Mapping
3.1.AEIOU SUMMURY :
This is the very first canvas of our design engineering subject. After thinking on different
Domains we have selected one domain and have done the observations after completing our
Observation we have divided complete observation in 5 parts into AEIOU i.e. is A for Activity, E
for Environment, I for interaction, O for object, U for Users. With the help of this canvas we have
make the partition of our complete observation through
Which we can easily identify the key points of our observation from which we can know about
The problems which are faced.
Activity:
In this part we have included all the activities which was being performed by the different
1. Programming
2. Hacking
3. Privacy
4. Information
5. Cybersecurity
Environment:
1. Internet
3. Virtual World
4. Network
Interaction: This includes the conversation.
1. Security Analyst
2. Security Engineer
3. Gujarat Cybersecurity
4. Security Administrator
5. Security Architect
Objects:
This section is completely filled up with all the non-living things. Through this section we could
1.Mobile
2.Computer
3.Applications
4.Internet
5. Anti-virus
From this section we could know how different objects play role in the process and which also
show the possibilities of the problems and solutions.
User:
Users are the people who are involved during the observation. They are the people who have
played the role and will be one who will use our product.
1. Hacker
2. Cyber Attacker
3. Cyber Cell
4. Website visitor
5. Cyber Threats
3.2.Mind Mapping
As we know that for remembering & keeping the points in mind graphical or diagrammatic
representation is the best way. So in the Design Engineering for representation of
complete observation Mind Mapping Canvas is used.
condition, situation & emotions with the help of observation. Empathy Mapping Canvas is the
evolution of problem, which are faced by people, by experiencing it with faced by us. This helps
us to experience the problems & think about the solution for it.
• User
• Stackholder
• Activities
• Story Boarding
User:
Users are the people who play the key role in whole observation.
1. Hacker
2. Cyber Cell
3. Website Visitors
4. Cyber Attacker
5. Cyber Threats
Stakeholder:
Stakeholders include all the people other than users who are involved in the observation.
2.CEO
3.Developers
4.Directors
Activities:
This section consist of the activity which people experiencing & seeing that activates how &
which activity have been explained by us. Key points of Activity are as follow:
1. Privacy
2. Cyber Security
Awareness
3. Programming
4. Hacking
5. Information
Story:
This component can also be said as the heart of the empathy mapping canvas.
Happy Story 1:
The Pune cyber crime cell is succeeded in arresting two accused and two more in the cosmos
bank online robbery case where Rs 94.42 crore were stolen.
Happy Story 2:
In Mumbai cyber crime branch detected a case in which the accounts of 125 users were hacked
and the case was solved by the cyber crime department.
Sad Story 1 :
In a high profile hacking case 137 million accounts from linkedin user accounts got compromised
by a Russian hacker.
Sad Story 2:
In 2013, Hackers stole roughly 3 million encrypted credit card numbers and login data from
the technology giant Adobe’s server.
4.Ideation Canvas
Ideation canvas helps us in doing work creatively. Because ideation canvas develops the
new thoughts and idea in mind through which we can know about the problems and what should be
People
Activity
Situation\Location
People:
2.Cybercell
3.Website visitors
4.Cyber Attackers
5.Cyber Threats
Activity:
Props\Possible Solution
In this part we have included all the activities which were being performed by the different users,
1.Privacy
2.Programming
3.Hacking
4.Information
5.Cyber security
awareness
Situation/location: This content includes the situation in which the user uses this
application. Key points of situation/location are as follows:
1. Facebook
2.Whatsapp
3. Amazon
4.Google
5.Quick Heal
1. Application Security
2. Cyber Security
3. Antivirus
5.Product Development Canvas
describe about the product that is solution of entire problem. Solution includes features
Purpose:
1. Secure Banking
2. Reduce data theft
3. Communication Safety
6. Digital wallet
7. Privacy Protection
People:
This portion contains the user who can use the product, to whom this product is useful.
Example:
1. Hacker
2. Cybercell
3. Website visitors
4. Cyber Threats
5. Cyber Attackers
Product Experience:
The components which are used in making the product are included in this.
1. Faster
2. Secure
3. Easy to use
4. Efficient
5. Easy to Understand
Product Features:
Features of the Product are included in this section. What are the options, specifications
1. Security
2. Safety
3. Easier
Product Function:
Product Function includes how product will be helpful other than it features. They are as
1. Security
2. Antitheft
3. Antivirus
4. Easy Communication
Components
In this section if there is any customer’s review related to redesign or related to
1. Internet
2. Mobile
3. Application software
4. Computers
6.Rough Prototype :
[181260107066]
[181260107056]
[181260107072]
[181260107081]
[181260107057]
7.Continuous Assessment card:
8.Conclusion:
Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they
don’t always occur behind the computer, but they executed by computer. The hacker’s identity is ranged
between 12 years young to 67years old. The hacker could live three continents away from its victim, and
they wouldn’t even know they were being hacked. Crimes done behind the computer are the 21st century’s
problem. With the technology increasing, criminals don’t have to rob banks, nor do they have to be outside
in order to commit any crime. They have everything they need on their lap. Their weapons aren’t guns
anymore; they attack with mouse cursors and passwords. That is why there is a need for cyber security.
Reference : https://digitalguardian.com/blog/what-cyber-security
https://searchsecurity.techtarget.com/definition/cybersecurity