Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

lOMoARcPSD|34723740

ETI Microproject

Communication Principles (Sinhgad Technical Education Society)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)
lOMoARcPSD|34723740

A MICROPROJECT REPORT
ON
“Need of Cyber security”

Submitted By
Pratham Bhosale (03)

Under Guidance of
Mrs. A. V. Kurkute

Diploma Course in Computer Technology


(As per directives of I Scheme, MSBTE)

Sinhgad Technical Education Society’s

SOU.VENUTAI CHAVAN POLYTECHNIC,

PUNE - 411041
ACADEMIC YEAR 2022-2023

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Maharashtra State
Board of technical Education

Certificate
This is to certify that Mr.Pratham Bhosale with Roll No. 03 of
Sixth Semester of Diploma in Computer Technology of Institute
Sou. Venutai Chavan Polytechnic (Code : 0040) has
successfully completed the Micro-Project in Emerging Trends
in Computer and Information Technology (22618) for the
Academic Year 2022-2023.

Place: SVCP, Enrollment No:2000400164


Pune Date: Exam Seat No:

Mrs. A. V. Kurkute Mrs. A. V. Kurkute Dr.(Mrs.) M. S. Jadhav


Subject Teacher HOD Principal

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

INDEX

SR NO CONTENTS PAGE NO

1 Rationale 1
2 Aim of the Micro-Project 1

3 Course Outcomes Addressed 1

4 Literature Review 3

5 Actual Methodology Followed 4

6 Output of microproject 4

7 Actual Resources Used 7

8 Skills Developed 8

9 Applications of Micro Project 8

10 Conclusion 8

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

Annexure -1
Micro-Project Proposal

Prepare a Report on Digital Forensics

1.0 Aim of Micro-Project


Advancements and applications of Computer Engineering and Information Technology are ever-changing.
Emerging trends aim at creating awareness about major trends that will define technological disruption in the
upcoming years in the field of Computer Engineering and Information Technology. These are some emerging
areas expected to generate revenue, increase demand for IT professionals, and open avenues for
entrepreneurship.

2.0 Intended Course Outcomes


Detect Network, Operating systems, and application vulnerabilities.

3.0 Proposed Methodology


Step I :- Searched and Selected the topic for micro project.
Step II:- Discussed about the microproject.
Step II :- Distributed the work accordingly.
Step III :- Collected and gathered the required data.
Step IV :- Process information in one document.
Step V :- Consulted with our subject teacher.

4.0 Resource Required


4.

Sr. No. Resources required Specifications


1 Computer system Processor i7 RAM-8GB

2 Operating System Windows 10

3 Web browser Google Chrome , Mozilla Firefox

Department of Computer Technology 2021-2022 1

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

5.0 Action Plan

Sr. no Details of activity Planned Planned Name of Responsible


start date finish date Team Members

1 Searching the topic for Pratham Bhosale


micro-project
2 Collecting the information Pratham Bhosale
of respective topic
3 Study on the information Pratham Bhosale
of this topic
4 Preparing the report Pratham Bhosale

6.0 Name and Roll no of team members

Sr. no Name Roll no

1 Pratham Bhosale 03

Department of Computer Technology 2021-2022 2

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

Annexure -II
Micro-Project Report
Prepare a Report on Need of Cyber Security

1.0 Rationale
Advancements and applications of Computer Engineering and Information Technology
are ever changing. Emerging trends aims at creating awareness about major trends that will
define technological disruption in the upcoming years in the field of Computer Engineering
and Information Technology. These are some emerging areas expected to generate
revenue, increasing demand as IT professionals and open avenues of entrepreneurship.

2.0 Aim of the Micro-Project


The project aim to prepare a report on Need of cyber security.

3.0 Intended Course Outcomes


Detect Network, Operating systems, and application vulnerabilities.

4.0 Literature Review


The term cyber security is utilized to refer to the security offered through online services to guard
your online information. Cyber Security and Information Security differ only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third Parties involved in
delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.

Department of Computer Technology 2021-2022 3

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

5.0 Actual Methodology Followed-

• First we searched topic on for Emerging Trends in Computer and


Information Technology Microproject.
• And after searched and after discussion we select the topic.
• Then searched information about topic.
• After searching information we confirming the collected the information by the guide.
• While doing the microproject we study on the information of the Digital Forensic.
• We prepared report on the basis of collected information.
• Then Formatting a report and after discussion we corrected in wrong information.
• And last we confirmed report by guide and make a final report and completed
the report.

6.0 Output of microproject:-

Why is cyber security important ?


Our world today is headed by technology and we can't do without it at all. From booking our flight tickets
to catching up with an old friend, technology plays a crucial role in it. However, the same technology may
expose you when it's vulnerable and could lead to the loss of essential data. Cyber security, alongside
physical commercial security, has thus, slowly and steadily, become one of the most essential topics in the
business industry to be talked about Cyber security is essential since it aids in securing data from threats
such as data theft or misuse, also safeguards your system from viruses.

Cyber security becomes necessary as Businesses are being carried out now on a Network of Networks.
Computer networks have always been the target of criminals, and it is likely that the danger of cyber
security breaking will only rise in the future as these networks grow, but there are reasonable precautions
that organizations can take to minimize losses from those who desire to do harm.

Department of Computer Technology 2021-2022 4

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

Cyber Security Objectives

Confidentiality
the property that information is not created available or revealed to unauthorized individuals, entities, or
processes Confidentiality refers to guarding information against being accessed by unauthorized parties.
In other words, only the people who are authorized to do so can achieve access to sensitive data. A failure
to maintain confidentiality means that someone who shouldn't have access has managed to get it, through
intentional behavior or by accident. Such a failure of confidentiality is commonly known as a breach.

Integrity
the property of safeguarding the precision and completeness of assets Integrity refers to assuring the
authenticity of information—that information is not altered, and that the origin of the information is
authentic. Imagine that you have a website and you sell products on that site. Now imagine that an
attacker can shop on your website and maliciously alter the prices of your products so that they can buy
anything for whatever price they decide. That would be a failure of integrity because your data, in this
case, the price of a product has been changed and you didn't authorize this alteration.

Department of Computer Technology 2021-2022 5

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security


Information Technology (22618)

Cyberattack
A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter
confidential personal or organizational data

Major security problems


• Virus
• Hacker
• Malware
• Trojan horses
• Password cracking

1. Viruses and worms


• Virus - malware linked to a carrier such as an email message or a word processing document
• A Virus is a "program that is crowded onto your a computer without your understanding and runs
against your desires
• Worm - malware can autonomously circulate itself without a carrier, using information about connected
computers.

Solution
• Install a security suite that protects the computer against threats such as viruses and worms.

2. Hackers
• In common a hacker is an individual who violates computers, usually by gaining access to
administrative controls.

Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker

a. White Hat Hackers


• The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security
professional, who specializes in penetration testing and in other testing methodologies to ensure the
security of an organization's information systems.

b. Grey Hat Hackers


• The term "grey hat", "grey hat" or "gray hat" refers to a computer hacker or computer security
specialist who may sometimes break laws or typical ethical standards, but does not have the malicious
intent typical of a black hat hacker.

Department of Computer Technology 2021-2022 6

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security


Information Technology (22618)

c. Black Hat Hacker


• A black hat hacker (or black-hat hacker) is a hacker who "violates computer shield for little cause beyond
maliciousness or for personal gain".

How To prevent hacking


• It may be impossible to prevent computer hacking, however influential security controls including
strong passwords, and the use of firewalls can aid.

Securing Password
• Use always a Strong password.
•Never use the exact password for two different sites.

Insider attacks
Attacks on an organization are carried out by individual who is inside that organization either by
themselves or with the connivance of an outsider. Difficult to oppose using technical processes as the
insider may have proper credentials to access the system.

External attacks
Attacks on an organization carried out by an external agent Need either accurate credentials or the
exploitation of some vulnerability to gain access to the systems.

Malicious and accidental damage


Cybersecurity is most concerned with Cyberattacks and Cyber accidents - Accidental events
that can generate loss or damage to a person, business, or public body. Many of the same technologies
utilized to protect against external attacks also protect against cyber accidents. However, sometimes
protecting against cyber-attacks raises the probability of cyber accidents.

Department of Computer Technology 2021-2022 7

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

Latest Trends - Information Security Threats

Hack Hacktivism
Hack + Activism = Hacktivism is the usage of legal and/or illegal digital tools in pursuit of a political/
personal objective

Tools and Attacks are utilized for

• website defacements

Hacking and altering the website of a company's website

• Redirects

• Denial of Service Attacks

Attempt to create a machine or network resource unavailable to its intended users typically target sites
or services hosted on high-profile web servers such as banks, credit card payment gateways, and even
root nameservers.

• Identity Theft

Stealing someone's identity in which someone pretends to be someone else by assuming that person's
identity

• E-mail Bombing

• Web-Site Mirroring

• Doxing

Process of Gathering and discharging Personally Identifiable information To gather information using
sources on the internet

Key Techniques Used

Phishing - attempt to obtain sensitive information, like bank account information or an account
password, by posing as an honest entity in an electronic communication

You get an email that looks like it comes from your bank, credit card company, etc. Asking you to
"update their records" may be due to potential scams, or other reasons Provides a hyperlink to a web
page where you enter your personal information The link takes you to a thief's website that is
disguised to look like the company's.

Department of Computer Technology 2021-2022 8

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security


Information Technology (22618)

Most common security mistakes

Information Security Responsibilities


• Employ Information Security teams to support the line of business, enabling secure solutions for
new techniques and technology
• Work with Information Security teams RISO, RISI to the driveline of business-specific information
security metrics reporting
• Support Regional Information Security teams in mitigating security threats from Internal Audit
report discoveries
• Follow business continuity plans given by the bank, in case of any disaster/ emergency.
• Report Security Breaches and security incidents
• Stick to Bank's Information Security Policy and guidelines
• Maintain and update the Asset register of your office/dept
• Extend support to RISO during Risk Assessment and Business Impact Analysis of your office/dept.
• Execute and act in accordance with the organization's information security policies and procedures
•Protect assets from unauthorized access, disclosure, modification, destruction, or interference
• Execute defined security processes or activities
•Report security events, potential events, or other security risks by following approved processes
•Do not use systems or access information without authorization
• Adheres to controls put in place to protect assets.

Standards & Regulations

• ISO 27001 (Information Security Management System)

• ISO 22301 (Business Continuity Management System)

• PCI- DSS (Payment Card Industry - Data Security Standard)

• IT Act 2000 & ITAA 2008 (Information Technology Act, India)

• RBI Guidelines (Reserve Bank of India),

7.0 Actual Resource used :-

Sr. No. Resources required Specifications

1 Computer system Processor i7 RAM-8GB

2 Operating System Windows 10

3 Web browser Google Chrome , Mozilla Firefox

Department of Computer Technology 2021-2022 9

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)


lOMoARcPSD|34723740

Emerging Trends in Computer and Need of Cyber Security

Information Technology (22618)

8.0 Skills Developed -


a) After working on the allotted microproject topic, I
gained various skills like working in team, making
coordination between team members.
b) This project also made me increase my observational skills.
c) The information collected about the cyber security.

d) Such project work increases our knowledge other from the


regular course work.

9.0 Applications of this Micro-project –


Advancements and applications of Computer Engineering and Information Technology are ever-
changing. Emerging trends aim at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer Engineering and
Information Technology. These are some emerging areas expected to generate revenue, increase
demand for IT professionals, and open avenues for entrepreneurship.

10.0 Conclusion
Cybersecurity is crucial because it defends all categories of data from theft and damage. This contains
sensitive data, personally identifiable data (PII), protected health information (PHI), personal information,
intellectual property, data, and governmental and industry information systems.

Department of Computer Technology 2021-2022 10

Downloaded by Kunal Mhatre (mysteriousboy4911@gmail.com)

You might also like