Professional Documents
Culture Documents
Management 22509
Management 22509
Management 22509
A Microproject Report
On
Submitted By
Name- Ahire Nakshtra
Roll No- 03
Under Guidance Of
Mr .Y. L.Nimbalkar
Diploma Course in Computer Technology
(As per directives of I scheme, MSBTE)
INDEX
SR NO CONTENTS PAGE
NO
1 Aim of the Micro-Project 1
3 Proposed methodology 1
4 Action Plan 2
5 Resources required 2
6 Rationale 3
7 Literature Review 3
10 Outputs of Microproject 5
11 Skills Developed 9
Management (22509)
ANNEXURE I
MICRO-PROJECT PROPOSAL
Step 6: Made the report and made the required changes in the project.
Management (22509)
1 PC Intel i7 vPro, 1
8GB RAM,
03 Ahire Nakshtra
Management (22509)
ANNEXURE II
MICRO-PROJECT
Study of measures to be taken for ensuring cyber security
1.0 Rationale:
In recent years, the Cyber Security is most important challenge which plays most
important role and must require in digital era where cybercrime become so frequent. Cyber
security is all about to stop cyber-crime. Cyber security is must and we have to know about all
safety measures required to stop cybercrime. This paper gives details information about cyber
security and its safety measure. Also we will discuss about the activities related to it and how
actually cybercrime happens and all steps taken by the various organization and
Government to have cyber ethics everywhere. Cyber security provides protection against the
cybercrime and teaches us what essential safety measures one need to follow from all
cybercrimes. Securing online information is priority where everyone is involved with
technology. Whenever anyone talked about cyber security, straight one thing comes in mind that
is cybercrime and what safety measures need to take to be safe from it.
This Micro-Project aim to study of measures to be taken for ensuring cyber security
Management (22509)
personal detail on the wall of their social media which is highly not recommended. Cloud
storage are also risky where people share their identity information like PAN, AADHAR, Social
security number, bank details, credit card number which is very unsafe
Step 6: Made the report and made the required changes in the project.
1 PC Intel i7 vPro, 1
8GB RAM,
Management (22509)
7. Output :
• Introduction:
Cyber Security refers to the all safety measure taken to protect from all
deception practices done online to steal personal data and to protect networks, programs,
devices, damage and any unauthorized access. Any information which transferred through
network can be easily hacked these days and everyone access most of the things only whether it
is professional or personal. In organisation most of the work done through email, audio video
conferences, HRMS, etc., and in personal people do online banking as well. Even the online
chats are also not safe these days .Cyber-crime is increasing day by day therefore there are
various organisation and Government who come in front to deal with all kind of cyber-crimes. IT
industry must focus on safety measure as 60 percent of total transactions are done online so this
field must have high quality of security to give all safety to users while doing any
transactions. Even the cyber space these days are not safe. The latest technologies like E-
commerce, mobile computing, cloud computing, big data science, artificial intelligence need
high cyber security standards. Making the internet safer is the important and integral part of the
development IT Services and for Government also important to look into it to safeguards
IT Services. Though we have individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into existence and after that frequent crimes
came up. People associated with cyber security but it is more than that. The modern hackers are
there who are breaking down cyber securities. Method has increased of hacking, new techniques
and new ways came up of cybercrime. These tools know a exploit kits which is designed to
exploit human and to blackmail them and get all information. Effective cyber security will
protect but not necessary to protect network where hackers will not attempt to attack and target
to track the system or whole server. But by cyber security, it will difficult for hackers to crack
the firewall and get into it.
Cyber security is important in the world of networks where people are always online doing
work and it can provide opportunity for users to protect their personal information on the
network or on device. Cyber security gives Right to know and Right to information. Computer is
safe through cyber security in terms of all damages from virus, bacteria, online bugs etc. Cyber
security also helps in monitoring the network and protects from various kinds of threats. Also it
protects from all cybercrimes where attackers didn’t get entrance on networks. It allows
protecting computers security a high level. Cyber security protects the confidential data,
protects the integrity and availability of computer system and resource data of systems.
Therefore, cyber security is must to get all confidential trade secrets and identifying lost data,
integrity is sure so that data which is used have some valuable and ethical data, and it helps from
restrain all kind of viruses and data stolen. People have lost their mental and financial stability
due to cybercrime. Many of them lost their huge amount of money, personal photos are viral
through crimes and not only photos but videos as well due to which people lost their trust from
digital world. Therefore, cyber security must be there and government should take legal action
against the cyber criminals
Management (22509)
1. Web Servers
Cyber criminals create their fake servers which look exactly like the original one with their
malicious code so that one can easily visit and input the personal information and they can easily
track all detail
Cyber security check twice while doing any transaction and see about the server in detail.
3. Mobile Networks
Mobile is the need of everyone. We can see in everyone’s hand and its user do almost
every activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat
etc. are very permeable as people are using different kind of devices like smartphones, IPad,
Tablet etc. all of which require high level of security with two factor authentication. Mobile
phones are very prone to cybercrime and user must download latest software and application
and make themselves protect from cybercrime.
4. Encrypted Code
Encryption is the process of encoding messages where only users or coders can read that and
or networks. Every user must learn how to encode the messages and keep their data encrypted
safe. Encryption at every level is important and protect the data privacy and the integrity.
But use of encryption is the big challenge for cyber security
Encrypted code not only secure persona data on computers or mobile but it is also helpful and
secure data on all networks which is present online
Cyber ethics:
Cyber ethics is the code of internet. It is the practice which is use for good chance to
use proper and safer internet. There are few things which need to be consider for cyber ethics-
• Offensive Language: Do not use rude or any kind of violent language
• Cyber Bully: Never do any cyber bully as it’s a crime
• Plagiarism: Never plagiarised any content of any one as it us under stolen and hacking
• Involvement: Do not involve with anyone else computer or network as it comes under
cybercrime
• Copyright: Obey the Copyright rules, never download material from unknown sites
Cyber ethics are important and must be followed by everyone and if everyone takes the
responsibility then cybercrime will decline.
Management (22509)
1. Network Security - The networks are not secure enough as there are many
unwanted users who can attack and destruct the interventions.
3. Data Security - Securing data on applications and network need second layer of
security which is very challenging. One must protect their data very highly by two
factor authentication so that no one can easily access it.
4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its
require large amount of space and online safe environment.
5. Mobile Security- It involves every type of security from login to space, from chat to
banking which again require conscious user’s involvement
Management (22509)
Basic precautions must be taken by everyone who use internet and online transactions
and work:
1. Internet Security Suite- One can use various anti malware software that are available for
purchase either through online or offline that helps them to protect and secure their
information from various malware.
2. Strong Password- One should use strong and new password frequently. Password
must be changed frequently by using combination of letters, numbers and special
characters and try to erase history of browser once work done specially if using public or
common computers or laptop.
3. Regular Update Software – It is important for OS and internet security to update regular
software to avoid any kind of cybercrime as criminal use known exploits and flaw to gain
access of system
4. Manage Social Media Settings- It is always very important to keep personal and
private information to keeppersona; and private information locked down. Cyber criminals
keep an eye on social media information so it must be locked and frequently changes like
passwords share as much as less information on social media so that anyone won’t be able to
guess security questions answers
5. Intensify Home Network- Home network must have strong encrypted password and have
virtual private network. A VPN stands for Virtual Private Network; which allows you to
create a secure connection to another network over the internet.. It allows you to connect
to the public networks more securely. It’s a great idea to use VPN in both public and
personal network so that it protects everywhere.
6. Secure Personal Computer- This can be done by activating computer firewall, using anti-
virus, malware software and block spywar attacks by regularly installation and upadating
software
7. Secure Mobile Devices- Mobile devices must be updated and password protected in
two-factor authentication and applications must be downloaded from trusted sources.
8. Install latest Operating System- Current and updated operating system must be used in
Windows, Mac, Linux to prevent potential attacks on older software.
Management (22509)
10.0 Conclusion
11.0 References
• www.wikipedia.com
• www.researchgate.net
• www.google.com
Management (22509)