Management 22509

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

lOMoARcPSD|31976750

Management 22509

Computer Engineering (Sinhgad Technical Education Society)

Studocu is not sponsored or endorsed by any college or university


Downloaded by sagar patil (sagarpatil03012@gmail.com)
lOMoARcPSD|31976750

A Microproject Report
On

“Study of measures to be taken for ensuring cyber security”

Submitted By
Name- Ahire Nakshtra
Roll No- 03

Under Guidance Of
Mr .Y. L.Nimbalkar
Diploma Course in Computer Technology
(As per directives of I scheme, MSBTE)

Sinhgad Technical Education Society’s


SOU.VENUTAI CHAVAN POLYTECHNIC, PUNE – 411041.
ACADEMIC YEAR: 2022 – 2023

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

MAHARASHTRA STATE BOARD OF


TECHNICAL EDUCATION
Certificate
This is to certify that Ms. Ahire Nakshtra of VI Semester, Diploma in
Computer Technology of Institute STES’s Sou. Venutai Chavan
Polytechnic (Institute Code: 0040) has completed the Microproject
satisfactorily in subject for Management (22509) the academic year 2022-
2023 as prescribed in the curriculum.

Place: Pune. EnrollmentNo:2000400146

Date:…………………… Exam Seat No:

Mr. Y.L Nimbalkar. Mrs.A.V.Kurkute Dr. Mrs..M.S.Jadhav


Subject Teacher Head Of Department Principal

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

INDEX
SR NO CONTENTS PAGE
NO
1 Aim of the Micro-Project 1

2 Course Outcomes Addressed 1

3 Proposed methodology 1

4 Action Plan 2

5 Resources required 2

6 Rationale 3

7 Literature Review 3

8 Actual Methodology Followed 4

9 Actual Resources Used 4

10 Outputs of Microproject 5

11 Skills Developed 9

12 Area Of future Requirement 9

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

ANNEXURE I

MICRO-PROJECT PROPOSAL

Study of measures to be taken for ensuring cyber security

1.0 Aim of the Micro-Project


This Micro-Project aim to study of measures to be taken for ensuring cyber security.

2.0 Intended Course Outcomes


a. Use basic mamngement principles to execute daily activities
b. Use principles of planning and organising for accomplishment of task
c. Use of principles of directing and controlling for implementing the plans
d. Apply principles of safety management in all activities
e. Understand various provisions of industrial acts

3.0 Proposed methodology

Step 1: Searched and Selected the topic for the Microproject.

Step 2: Discussed about the the microproject

Step 3: Distributed work accordingly

Step 4: Collected and gathered the required data

Step 5: Prepared the final report.

Step 6: Made the report and made the required changes in the project.

Department of Computer Technology Academic Year 2022-2023 1

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

4.0 Action Plan

S. Planned start date Planned finish date Name of responsible


No. Details of Activity Team members

Evaluation of project Ahire Nakshtra


1 topic and resources
required.
Ahire Nakshtra
2 Design the project

Understand the project Ahire Nakshtra


3

Application of Ahire Nakshtra


4 Microproject

Preparation of final Ahire Nakshtra


5 report

5.0 Resources Required

Sr. no Name of Specification Quantity Remark


Resource/material

1 PC Intel i7 vPro, 1
8GB RAM,

2 Operating System Windows 10 -

6.0 Team members

ROLL NO NAME OF STUDENT

03 Ahire Nakshtra

Department of Computer Technology Academic Year 2022-2023 2

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

ANNEXURE II

MICRO-PROJECT
Study of measures to be taken for ensuring cyber security
1.0 Rationale:
In recent years, the Cyber Security is most important challenge which plays most
important role and must require in digital era where cybercrime become so frequent. Cyber
security is all about to stop cyber-crime. Cyber security is must and we have to know about all
safety measures required to stop cybercrime. This paper gives details information about cyber
security and its safety measure. Also we will discuss about the activities related to it and how
actually cybercrime happens and all steps taken by the various organization and
Government to have cyber ethics everywhere. Cyber security provides protection against the
cybercrime and teaches us what essential safety measures one need to follow from all
cybercrimes. Securing online information is priority where everyone is involved with
technology. Whenever anyone talked about cyber security, straight one thing comes in mind that
is cybercrime and what safety measures need to take to be safe from it.

2.0 Aim of the Microproject

This Micro-Project aim to study of measures to be taken for ensuring cyber security

3.0 Course Outcomes


a. Use basic mamngement principles to execute daily activities
b. Use principles of planning and organising for accomplishment of task
c. Use of principles of directing and controlling for implementing the plans
d. Apply principles of safety management in all activities
e. Understand various provisions of industrial acts

4.0 Literature Review


Cyber security is important as every organisation whether private or public both financial
and non-financial, corporate and military also access their data online and keep data, programs,
process, files on computers, clouds, and other devices. And these data must be important
and carries sensitive information may be personal information, intellectual property, financial
information, unauthorized data etc. which might be access by the cybercrimes and that is why
cyber security is very important and everyone must know all safety measures which need to be
taken while working on networks Its importance is risen these days. Fundamentally, our and
data stolen. They easily trust anyone online and share the details. Even many of them share all

Department of Computer Technology Academic Year 2022-2023 3

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

personal detail on the wall of their social media which is highly not recommended. Cloud
storage are also risky where people share their identity information like PAN, AADHAR, Social
security number, bank details, credit card number which is very unsafe

5.0 Actual Methodology Followed


Step 1: Searched and Selected the topic for the Microproject.

Step 2: Discussed about the the microproject

Step 3: Distributed work accordingly

Step 4: Collected and gathered the required data

Step 5: Prepared the final report.

Step 6: Made the report and made the required changes in the project.

6.0 Actual Resources Used


Sr. no Name of Specification Quantity Remark
Resource/material

1 PC Intel i7 vPro, 1
8GB RAM,

2 Operating System Windows 10 -

Department of Computer Technology Academic Year 2022-2023 4

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

7. Output :
• Introduction:
Cyber Security refers to the all safety measure taken to protect from all
deception practices done online to steal personal data and to protect networks, programs,
devices, damage and any unauthorized access. Any information which transferred through
network can be easily hacked these days and everyone access most of the things only whether it
is professional or personal. In organisation most of the work done through email, audio video
conferences, HRMS, etc., and in personal people do online banking as well. Even the online
chats are also not safe these days .Cyber-crime is increasing day by day therefore there are
various organisation and Government who come in front to deal with all kind of cyber-crimes. IT
industry must focus on safety measure as 60 percent of total transactions are done online so this
field must have high quality of security to give all safety to users while doing any
transactions. Even the cyber space these days are not safe. The latest technologies like E-
commerce, mobile computing, cloud computing, big data science, artificial intelligence need
high cyber security standards. Making the internet safer is the important and integral part of the
development IT Services and for Government also important to look into it to safeguards
IT Services. Though we have individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into existence and after that frequent crimes
came up. People associated with cyber security but it is more than that. The modern hackers are
there who are breaking down cyber securities. Method has increased of hacking, new techniques
and new ways came up of cybercrime. These tools know a exploit kits which is designed to
exploit human and to blackmail them and get all information. Effective cyber security will
protect but not necessary to protect network where hackers will not attempt to attack and target
to track the system or whole server. But by cyber security, it will difficult for hackers to crack
the firewall and get into it.

Cyber security is important in the world of networks where people are always online doing
work and it can provide opportunity for users to protect their personal information on the
network or on device. Cyber security gives Right to know and Right to information. Computer is
safe through cyber security in terms of all damages from virus, bacteria, online bugs etc. Cyber
security also helps in monitoring the network and protects from various kinds of threats. Also it
protects from all cybercrimes where attackers didn’t get entrance on networks. It allows
protecting computers security a high level. Cyber security protects the confidential data,
protects the integrity and availability of computer system and resource data of systems.
Therefore, cyber security is must to get all confidential trade secrets and identifying lost data,
integrity is sure so that data which is used have some valuable and ethical data, and it helps from
restrain all kind of viruses and data stolen. People have lost their mental and financial stability
due to cybercrime. Many of them lost their huge amount of money, personal photos are viral
through crimes and not only photos but videos as well due to which people lost their trust from
digital world. Therefore, cyber security must be there and government should take legal action
against the cyber criminals

Department of Computer Technology Academic Year 2022-2023 5

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

Trends Of Cyber Security:

1. Web Servers
Cyber criminals create their fake servers which look exactly like the original one with their
malicious code so that one can easily visit and input the personal information and they can easily
track all detail
Cyber security check twice while doing any transaction and see about the server in detail.

2. Cloud space and its services


These days everyone is preferring for cloud space to store data. This latest service becomes
the challenge for cyber security as it requires large number of access and applications to
prevent important information. Hackers know all techniques to get into it.

3. Mobile Networks
Mobile is the need of everyone. We can see in everyone’s hand and its user do almost
every activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat
etc. are very permeable as people are using different kind of devices like smartphones, IPad,
Tablet etc. all of which require high level of security with two factor authentication. Mobile
phones are very prone to cybercrime and user must download latest software and application
and make themselves protect from cybercrime.

4. Encrypted Code
Encryption is the process of encoding messages where only users or coders can read that and
or networks. Every user must learn how to encode the messages and keep their data encrypted
safe. Encryption at every level is important and protect the data privacy and the integrity.
But use of encryption is the big challenge for cyber security
Encrypted code not only secure persona data on computers or mobile but it is also helpful and
secure data on all networks which is present online

Cyber ethics:
Cyber ethics is the code of internet. It is the practice which is use for good chance to
use proper and safer internet. There are few things which need to be consider for cyber ethics-
• Offensive Language: Do not use rude or any kind of violent language
• Cyber Bully: Never do any cyber bully as it’s a crime
• Plagiarism: Never plagiarised any content of any one as it us under stolen and hacking
• Involvement: Do not involve with anyone else computer or network as it comes under
cybercrime
• Copyright: Obey the Copyright rules, never download material from unknown sites
Cyber ethics are important and must be followed by everyone and if everyone takes the
responsibility then cybercrime will decline.

Department of Computer Technology Academic Year 2022-2023 6

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

• Challenges of Cyber Security


There are few challenges while doing effective cyber security in an
organization or for personal reasons:

1. Network Security - The networks are not secure enough as there are many
unwanted users who can attack and destruct the interventions.

2. Application Security- Application of both computer and mobile device need to be


updated and tested on regular basis to ensure any kind of attacks.

3. Data Security - Securing data on applications and network need second layer of
security which is very challenging. One must protect their data very highly by two
factor authentication so that no one can easily access it.

4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its
require large amount of space and online safe environment.

5. Mobile Security- It involves every type of security from login to space, from chat to
banking which again require conscious user’s involvement

Department of Computer Technology Academic Year 2022-2023 7

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

• Safety Measures Of Cyber Security:

Basic precautions must be taken by everyone who use internet and online transactions
and work:
1. Internet Security Suite- One can use various anti malware software that are available for
purchase either through online or offline that helps them to protect and secure their
information from various malware.

2. Strong Password- One should use strong and new password frequently. Password
must be changed frequently by using combination of letters, numbers and special
characters and try to erase history of browser once work done specially if using public or
common computers or laptop.

3. Regular Update Software – It is important for OS and internet security to update regular
software to avoid any kind of cybercrime as criminal use known exploits and flaw to gain
access of system

4. Manage Social Media Settings- It is always very important to keep personal and
private information to keeppersona; and private information locked down. Cyber criminals
keep an eye on social media information so it must be locked and frequently changes like
passwords share as much as less information on social media so that anyone won’t be able to
guess security questions answers

5. Intensify Home Network- Home network must have strong encrypted password and have
virtual private network. A VPN stands for Virtual Private Network; which allows you to
create a secure connection to another network over the internet.. It allows you to connect
to the public networks more securely. It’s a great idea to use VPN in both public and
personal network so that it protects everywhere.

6. Secure Personal Computer- This can be done by activating computer firewall, using anti-
virus, malware software and block spywar attacks by regularly installation and upadating
software

7. Secure Mobile Devices- Mobile devices must be updated and password protected in
two-factor authentication and applications must be downloaded from trusted sources.

8. Install latest Operating System- Current and updated operating system must be used in
Windows, Mac, Linux to prevent potential attacks on older software.

Department of Computer Technology Academic Year 2022-2023 8

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

8 .0 Skill Developed out of this Micro-Project


• Concept related to cyber security
• Trends in cyber security
• Different measures taken to ensuring cyber security
9.0 Area of Future Improvements
• More software should be make available to the users to overcome the threats
• More acts should be enhanced and come into force
• More Alertness and awareness should be done

10.0 Conclusion

We learnt about cybercrimes is one of the largest crime in today’s time.


Hackers and thief are like sitting online and watching all data online. Cases like tracking of
online banking and personal data is common and most increasing crime. There are data
available where we can see daily cybercrime like OTP call, online money transfer, personal
information data, etc. Even organization is facing these crimes like leaking information of their
work, project, plans, infrastructure details etc. There is no absolute solution of cybercrimes but
we can do our best by using networks and online work safely. Cyber security takes all
measures to protect online crime and use as safeguards for all networks, programs, software
and data. The protection and prevention of network is must and provide all intentional and
unintentional intrusion for both inside and outside system to protect and ensure
assurance, integrity of information and data online.

11.0 References

• www.wikipedia.com
• www.researchgate.net
• www.google.com

Department of Computer Technology Academic Year 2022-2023 9

Downloaded by sagar patil (sagarpatil03012@gmail.com)


lOMoARcPSD|31976750

Management (22509)

Department of Computer Technology Academic Year 2022-2023 10

Downloaded by sagar patil (sagarpatil03012@gmail.com)

You might also like