Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

GUJARAT TEHNOLOGICAL UNIVERSITY

AHMEDABAD
Affiliated

SAL Engineering & Technical Institute


A Report on

“Cyber Security”
Under the Subject of

Design Engineering 1A (3130008)


B. E. II, semester-III

(Computer Engineering)

Submitted By:
Sr. No Name Enrollment No
1 Patel Priyansh P 181260107066
2 Patel Kevin R 181260107056
3 Patel Simoli J 181260107072
4 Prajapati Riddhi N 181260107081
5 Patel Kishan 181260107057

Prof. Rama M. Maliya


(Internal Guide)

Prof. Pravina Shah


(HoD of the Department)

Academic Year
(2019-20)
Table of Contents

Content Page No.


Abstract 2

Acknowledgement 3

1. Introduction 4

What is Design Thinking? 4

Why & How selectthis Domain? 4

Preparation of Canvas 4

2 Prior arts Search 5

3 Empathy Mapping 6

Observation through AEIOU 6

Mind Mapping 10

Empathy Mapping 11

4 Ideation Canvas & it’s method 14

5 Product Development Canvas 17

Description of Final Problem Statement 17

Description of Problem Solution 18

Discussion on Product Experience 19

6 Rough Prototype 20

7 Individual Log Book (duly signed by faculty guide)

8 Continuous Assessment Card

9 Conclusion 21

References

Design Engineering-1A (3130008) (3rd Page 1


Semester)
ABSTRACT

Cyber Security plays an important role in the field of information technology. Securing the information
have become one of the biggest challenges in the present day. When ever we think about the cyber security
the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day.
Various Governments and companies are taking many measures in order to prevent these cyber crimes.
Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on
challenges faced by cyber security on the latest technologies. It also focuses on latest about the cyber
security techniques, ethics and the trends changing the face of cyber security.
ACKNOWLEDGEMENT

I have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals and organization. I would like to extend my sincere thanks to
all of them.

I am highly indebted to prof. RAMA MALIYA FOR their guidance and constant supervision as well
as for providing necessary information

Regarding the project and also for their supporting in completing the project. I would like the express
my gratitude to word member of my project for their kind co-operation and encouragement which help
me in completion of this project.
1.Introduction
(a) Design thinking is a process for creative problem solving. Design thinking has a

human-centered core. It encourages organizations to focus on the people they're creating for, which
leads to better products, services, and internal processes......The process starts with taking action and
understanding the right questions.

(b) Design is how it works for someone. A designer solves challenges through creativity, rapid
iteration, and most importantly, empathy. Empathy is critical in design because learning and
understanding how people use, interact with, and feel about a design is crucial to design success.

(c) Learning to use design thinking tools for successful innovation

1. Purpose. – Design thinking is a process of continuously redesigning

a business to achieve both product and process innovation...2.


Design/methodology/approach. ... 3. Findings.....4. Research
limitations/implications. .... 5. Practical implications......6. Originality/value.
2.Prior arts Search

The solutions that were made in the past for above problems is mentioned below:

School Security System (SSS) using RFID, This System ensures safety of the students by making their
parents aware about the various important status about their students like in-time, out-time, everything
about their arrival. By using RFID technology it is easy track the student thus enhances the security and
safety in selected zone. The information about student such as in time and out time from Bus and campus
will be recorded to web based system and SMS will be automatically sent to their parents that the student
arrived to Bus/Campus safely. SMS will be sent to parents whose children are absent without taking leave.
The parents can log into system website and monitor the details of their children. The implementation of
School Security System(SSS) via RFID to avoid crime, illegal activates by students and reduce worries
among parents.
3.Empathy Mapping

Observations through AEIOU and other methods

3.1.AEIOU SUMMURY :
This is the very first canvas of our design engineering subject. After thinking on different
Domains we have selected one domain and have done the observations after completing our
Observation we have divided complete observation in 5 parts into AEIOU i.e. is A for Activity, E

[Figure 3.1 : AEIOU CANVAS]

for Environment, I for interaction, O for object, U for Users. With the help of this canvas we have
make the partition of our complete observation through

Which we can easily identify the key points of our observation from which we can know about
The problems which are faced.
Activity:
In this part we have included all the activities which was being performed by the different

users, People, etc. during our observation.

The activity includes:-

1. Programming

2. Hacking

3. Privacy

4. Information

5. Cybersecurity

Environment:

This section contains different factors which shows different situation.

Key points of environment are as follow :

1. Internet

2. World Wide Web

3. Virtual World

4. Network
Interaction: This includes the conversation.

Key points of interactions are as follow:

1. Security Analyst

2. Security Engineer

3. Gujarat Cybersecurity

4. Security Administrator

5. Security Architect

Objects:

This section is completely filled up with all the non-living things. Through this section we could

also know many things.

Key points of objects are as follow:

1.Mobile

2.Computer

3.Applications

4.Internet

5. Anti-virus

From this section we could know how different objects play role in the process and which also
show the possibilities of the problems and solutions.
User:

Users are the people who are involved during the observation. They are the people who have

played the role and will be one who will use our product.

Key points of user as follow:

1. Hacker

2. Cyber Attacker

3. Cyber Cell

4. Website visitor

5. Cyber Threats
3.2.Mind Mapping

As we know that for remembering & keeping the points in mind graphical or diagrammatic
representation is the best way. So in the Design Engineering for representation of
complete observation Mind Mapping Canvas is used.

[Figure 3.2 : MIND MAPPING CANVAS]

Mind Mapping is the diagrammatical representation of complete Observation.


3.3.Empathy Mapping Canvas :Empathy means to feel what the others
feel.Empathy mapping canvas helps as to experience, feel and understand another person's

[Figure 3.3 : EMPATHY MAPPING CANVAS]

condition, situation & emotions with the help of observation. Empathy Mapping Canvas is the
evolution of problem, which are faced by people, by experiencing it with faced by us. This helps
us to experience the problems & think about the solution for it.

Empathy Mapping Canvas have 4 components:

• User

• Stackholder

• Activities

• Story Boarding
User:

Users are the people who play the key role in whole observation.

Key points of User are as follow:

1. Hacker

2. Cyber Cell

3. Website Visitors

4. Cyber Attacker

5. Cyber Threats

Stakeholder:

Stakeholders include all the people other than users who are involved in the observation.

Key points of Stakeholder are as

follow: 1.Cyber Security Expert

2.CEO

3.Developers

4.Directors
Activities:
This section consist of the activity which people experiencing & seeing that activates how &
which activity have been explained by us. Key points of Activity are as follow:

1. Privacy

2. Cyber Security
Awareness

3. Programming

4. Hacking

5. Information
Story:

This component can also be said as the heart of the empathy mapping canvas.

Happy Story 1:

The Pune cyber crime cell is succeeded in arresting two accused and two more in the cosmos
bank online robbery case where Rs 94.42 crore were stolen.

Happy Story 2:

In Mumbai cyber crime branch detected a case in which the accounts of 125 users were hacked
and the case was solved by the cyber crime department.

Sad Story 1 :

In a high profile hacking case 137 million accounts from linkedin user accounts got compromised
by a Russian hacker.

Sad Story 2:

In 2013, Hackers stole roughly 3 million encrypted credit card numbers and login data from
the technology giant Adobe’s server.
4.Ideation Canvas

Ideation canvas helps us in doing work creatively. Because ideation canvas develops the
new thoughts and idea in mind through which we can know about the problems and what should be

the situation for it.

Ideation canvas has 4 main parts :

People
Activity
Situation\Location

[Figure 4.1 : Ideation Canvas]

People:

People who play the key role in whole observation.


1. Hacker

2.Cybercell

3.Website visitors

4.Cyber Attackers

5.Cyber Threats

Activity:
Props\Possible Solution

In this part we have included all the activities which were being performed by the different users,

people, etc. During our observation. The activity includes

1.Privacy

2.Programming

3.Hacking

4.Information

5.Cyber security

awareness
Situation/location: This content includes the situation in which the user uses this
application. Key points of situation/location are as follows:

1. Facebook

2.Whatsapp

3. Amazon

4.Google

5.Quick Heal

Props/ Possible Solutions


In this content the possible solution that our application resolves are included. key points of
props/possible solution are as follows:

1. Application Security

2. Cyber Security

3. Antivirus
5.Product Development Canvas

Product Development Canvas concentrates on the solution of problems. In this canvas we

describe about the product that is solution of entire problem. Solution includes features

like people, purpose, product features and product component.

[Figure 5.1 : Product Development Canvas]

Purpose:
1. Secure Banking
2. Reduce data theft

3. Communication Safety

4. Prevent Net banking

5. More device security

6. Digital wallet

7. Privacy Protection

People:
This portion contains the user who can use the product, to whom this product is useful.

Example:

1. Hacker

2. Cybercell

3. Website visitors

4. Cyber Threats

5. Cyber Attackers

Product Experience:

The components which are used in making the product are included in this.

1. Faster
2. Secure
3. Easy to use
4. Efficient
5. Easy to Understand

Product Features:

Features of the Product are included in this section. What are the options, specifications

of the Product are known as Product Features.

The product features are as follows:

1. Security
2. Safety
3. Easier

Product Function:

Product Function includes how product will be helpful other than it features. They are as

1. Security
2. Antitheft
3. Antivirus
4. Easy Communication

Components
In this section if there is any customer’s review related to redesign or related to

rejection are included. The reviews we got are

1. Internet

2. Mobile

3. Application software

4. Computers
6.Rough Prototype :

[Figure 6.1 : Rough Prototype]


6.Individual Log Book:

[181260107066]
[181260107056]
[181260107072]
[181260107081]
[181260107057]
7.Continuous Assessment card:
8.Conclusion:

Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they
don’t always occur behind the computer, but they executed by computer. The hacker’s identity is ranged
between 12 years young to 67years old. The hacker could live three continents away from its victim, and
they wouldn’t even know they were being hacked. Crimes done behind the computer are the 21st century’s
problem. With the technology increasing, criminals don’t have to rob banks, nor do they have to be outside
in order to commit any crime. They have everything they need on their lap. Their weapons aren’t guns
anymore; they attack with mouse cursors and passwords. That is why there is a need for cyber security.

Reference : https://digitalguardian.com/blog/what-cyber-security
https://searchsecurity.techtarget.com/definition/cybersecurity

You might also like