Professional Documents
Culture Documents
Eti Microproject
Eti Microproject
ETI Microproject
A MICROPROJECT REPORT
ON
“Need of Cyber security”
Submitted By
Pratham Bhosale (03)
Under Guidance of
Mrs. A. V. Kurkute
PUNE - 411041
ACADEMIC YEAR 2022-2023
Maharashtra State
Board of technical Education
Certificate
This is to certify that Mr.Pratham Bhosale with Roll No. 03 of
Sixth Semester of Diploma in Computer Technology of Institute
Sou. Venutai Chavan Polytechnic (Code : 0040) has
successfully completed the Micro-Project in Emerging Trends
in Computer and Information Technology (22618) for the
Academic Year 2022-2023.
INDEX
SR NO CONTENTS PAGE NO
1 Rationale 1
2 Aim of the Micro-Project 1
4 Literature Review 3
6 Output of microproject 4
8 Skills Developed 8
10 Conclusion 8
Annexure -1
Micro-Project Proposal
1 Pratham Bhosale 03
Annexure -II
Micro-Project Report
Prepare a Report on Need of Cyber Security
1.0 Rationale
Advancements and applications of Computer Engineering and Information Technology
are ever changing. Emerging trends aims at creating awareness about major trends that will
define technological disruption in the upcoming years in the field of Computer Engineering
and Information Technology. These are some emerging areas expected to generate
revenue, increasing demand as IT professionals and open avenues of entrepreneurship.
Cyber security becomes necessary as Businesses are being carried out now on a Network of Networks.
Computer networks have always been the target of criminals, and it is likely that the danger of cyber
security breaking will only rise in the future as these networks grow, but there are reasonable precautions
that organizations can take to minimize losses from those who desire to do harm.
Confidentiality
the property that information is not created available or revealed to unauthorized individuals, entities, or
processes Confidentiality refers to guarding information against being accessed by unauthorized parties.
In other words, only the people who are authorized to do so can achieve access to sensitive data. A failure
to maintain confidentiality means that someone who shouldn't have access has managed to get it, through
intentional behavior or by accident. Such a failure of confidentiality is commonly known as a breach.
Integrity
the property of safeguarding the precision and completeness of assets Integrity refers to assuring the
authenticity of information—that information is not altered, and that the origin of the information is
authentic. Imagine that you have a website and you sell products on that site. Now imagine that an
attacker can shop on your website and maliciously alter the prices of your products so that they can buy
anything for whatever price they decide. That would be a failure of integrity because your data, in this
case, the price of a product has been changed and you didn't authorize this alteration.
Cyberattack
A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter
confidential personal or organizational data
Solution
• Install a security suite that protects the computer against threats such as viruses and worms.
2. Hackers
• In common a hacker is an individual who violates computers, usually by gaining access to
administrative controls.
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
Securing Password
• Use always a Strong password.
•Never use the exact password for two different sites.
Insider attacks
Attacks on an organization are carried out by individual who is inside that organization either by
themselves or with the connivance of an outsider. Difficult to oppose using technical processes as the
insider may have proper credentials to access the system.
External attacks
Attacks on an organization carried out by an external agent Need either accurate credentials or the
exploitation of some vulnerability to gain access to the systems.
Hack Hacktivism
Hack + Activism = Hacktivism is the usage of legal and/or illegal digital tools in pursuit of a political/
personal objective
• website defacements
• Redirects
Attempt to create a machine or network resource unavailable to its intended users typically target sites
or services hosted on high-profile web servers such as banks, credit card payment gateways, and even
root nameservers.
• Identity Theft
Stealing someone's identity in which someone pretends to be someone else by assuming that person's
identity
• E-mail Bombing
• Web-Site Mirroring
• Doxing
Process of Gathering and discharging Personally Identifiable information To gather information using
sources on the internet
Phishing - attempt to obtain sensitive information, like bank account information or an account
password, by posing as an honest entity in an electronic communication
You get an email that looks like it comes from your bank, credit card company, etc. Asking you to
"update their records" may be due to potential scams, or other reasons Provides a hyperlink to a web
page where you enter your personal information The link takes you to a thief's website that is
disguised to look like the company's.
10.0 Conclusion
Cybersecurity is crucial because it defends all categories of data from theft and damage. This contains
sensitive data, personally identifiable data (PII), protected health information (PHI), personal information,
intellectual property, data, and governmental and industry information systems.