Eti 6th Sem Microproject

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Branch & Code : CO (CO6I) Academic Year : 2021-2022

Course name and code : Emerging trends in computer technology(22618)


Semester : 6th

A STUDY ON

MICRO PROJECT REPORT

Study of Trojen Attack


Sr no Name of Student Seat no En.no
1914320092
1) Anuja Rajendra Pawar 228569
1914320091
2) Yogesh Vinod Patil 228568
1914320095
3) Umesh ravindra nehete 228569

4) Rushikesh jagdish patil 228566 1914320089

5) Surabhi hemankumar chavhan 228567 1914320090

Under the Guidance of

MR.Dinesh sir

In

Third Year Diploma Programme in Engineering & Technology of Maharashtra State Board of
Technical Education, Mumbai (Autonomous)

ISO 9001:2008 (ISO/IEC-27001:2013)

at

1432 GOVERNMENT POLYTECHNIC NANDURBAR.

Maharashtra State Board Of Techinical Education,Mumbai.


Certificate
1) Anuja Rajendra Pawar (3119)

2) Rushikesh Jagdish Patil (3116)

3)umesh ravindra nehete (3127)

4)Yogesh Vinod Patil (3118)

5) Surabhi Hemantkumar Chavhan (3142)

of 5th Semester of Computer Engineering 1432 GOVERNMENT POLYTECHNIC NANDURBAR, has


completed the (Micro Project) satisfactorily in Subject (22516)in the academic year 2021- 2022 as
prescribed in the MSBTE curriculum of I Scheme.

Place: NANDURBAR Enrollment No: 1)1914320092

2) 1914320089

3) 1914320091

4)1914320090

5)19142320095

Date: 26/10/2021

Project Guide Head of Department Principal


*INDEX*

Sr. No Title Page No.


1 IN
TRODUCTION
2 FEATURES
3 MATERIAL USED
4 REFRENCE
5 CANCLUSION

6 REPORT
Study on Trojan Attack
A Trojan Horse Virus is a type of malware that downloads onto a
computer disguised as a legitimate program. The delivery
method typically sees an attacker use social engineering to hide
malicious code within legitimate software to try and gain users'
system access with their software.

A simple way to answer the question "what is Trojan" is it is a


type of malware that typically gets hidden as an attachment in
an email or a free-to-download file, then transfers onto the
user’s device. Once downloaded, the malicious code will execute
the task the attacker designed it for, such as gain backdoor
access to corporate systems, spy on users’ online activity, or
steal sensitive data.

Indications of a Trojan being active on a device include unusual


activity such as computer settings being changed unexpectedly.

History of the Trojan Horse:-

The original story of the Trojan horse can be found in the Aeneid
by Virgil and the Odyssey by Homer. In the story, the enemies of
the city of Troy were able to get inside the city gates using a
horse they pretended was a gift. The soldiers hid inside the huge
wooden horse and once inside, they climbed out and let the
other soldiers in.
There are a few elements of the story that make the term
“Trojan horse” an appropriate name for these types of cyber
attacks:

The Trojan horse was a unique solution to the target’s defenses.


In the original story, the attackers had laid siege to the city for 10
years and hadn’t succeeded in defeating it. The Trojan horse
gave them the access they had been wanting for a decade. A
Trojan virus, similarly, can be a good way to get behind an
otherwise tight set of defenses.

The Trojan horse appeared to be a legitimate gift. In a similar


vein, a Trojan virus looks like legitimate software.

The soldiers in the Trojan horse controlled the city’s defense


system. With a Trojan virus, the malware takes control of your
computer, potentially leaving it vulnerable to other “invaders.”
Conclusion-
We know about what is trojen horse and how it was working.

Protection of trojen also studied.


Weekly Work / Progress Report -

Details of 16 Engagement Hours of the Student


zzRegarding Completion of the Project

Week Date Timing Work or activity Performed Sign of


No. the
Guide
From To Duratio
n in
min.
1 21/9/21 3.00 4.00 pm 15 min Discussion and Finalization of the Project
pm Title

2 28/9/21 4.00 4.30 pm 30 min Preparation and Submission of Abstracts


pm

3 5/10/21 3.00 4.00 pm 20 min Literature Review


pm

4 12/10/21 4.00 6.00 pm 3 hour Collection of Data


pm

6 26/10/21 3.00 3.30 pm 30 min Discussion and Outline of Content


pm

7 2/11/21 4.00 3. 30 pm 30 min Rough Writing of the Projects Contents


pm

8 9/11/21 3.00 4.00 pm 1 hour Editing and Proof Reading of the


pm Contents

9 16/11/21 3.00 4.00 pm 1hour Final Completion of the Project


pm
ANNEXURE-II
Marks out of 6 Marks out of
for 4 for
Total
performance performance
Seat no Student Name Out of
in group in Oral /
10
activity presentation
(D5- Col. 8) (D5- Col. 9)

228569 Anuja Rajendra Pawar

228567 Surabhi hemantkumar chavhan

228569
Umesh Ravindra nehete

228566
Rushikesh Jagadish Patil

228568
Yogesh Vinod Patil

Academic Year:-2020-21 Name of Faculty : Mr.M.M.Dinesh Sir

Sem :-5th Program Name : emerging trends in computer technology(ETI)

Course Name: Course Code: 22618

Name of Students:- 1)Anuja Rajendra Pawar 2)Rushikesh Jagdish Patil3) umesh ravindra
nehete 4)Yogesh Vinod Patil 5)surabhi hemantkumar chavhan

Title of the Project:- Study on Trojen Attack

Evaluation Sheet for the Micro Project (Teachers Copy)

You might also like