Professional Documents
Culture Documents
NIS Project New
NIS Project New
NIS Project New
On
Computer Security
Submitted in the partial fulfillment of the requirement for the diploma
Of
Diploma in Computer Technology
Chetana Bedse
Shambhavi Bedse
Mehul Chavan
Vinay Nirangkari
1
Maharashtra State Board of Technical Education
Certificate
This is to certify that MR./MS. of 6th semester of Diploma in Computer
technology of Institute, Government Polytechnic Nandurbar (Code:425412 ) Has
completed the Micro Project satisfactory in subject: NIS for the academic year
(2023-2024) as prescribed in the curriculum
Place: NANDURBAR
Date:
2
Abstract
Computer security, cybersecurity or information technology security (IT security)
is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide The field is becoming
increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and WiFi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of the major
challenges in the contemporary world. Computer security, the protection of
computer systems and information from harm, theft, and unauthorized use.
Computer hardware is typically protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex. The security
precautions related to computer information and access address four major
threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on. Another security measure is to store a system’s data on a
separate device, or medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is often encrypted so that
it can be deciphered only by holders of a singular encryption key.
3
INDEX
1. Introduction 5.
6. Conclusion 12.
7. References 13.
4
Introduction
Computer security, cybersecurity or information technology security (IT security)
is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide The field is becoming
increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of the major
challenges in the contemporary world. Computer security, the protection of
computer systems and information from harm, theft, and unauthorized use.
Computer hardware is typically protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex. The security
precautions related to computer information and access address four major
threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on
5
Computer security threats
Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital. The most harmful types of
computer security are:
Viruses- Computer virus is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and infects the files and
programs on the user’s PC. The ultimate goal of a virus is to ensure that the
victim’s computer will never be able to operate properly or even at all.
Computer Worm-Computer worm is a software program that can copy itself
from one computer to another, without human interaction. The potential risk here
is that it will use up your computer hard disk space because a worm can replicate
in greate volume and with great speed.
6
What is computer security?
Computers are very essential part of our daily lives and it plays important
roles in our lives. So, the security of a computer is important because it
protects your information and helps to prevent from viruses and malware.
In this post, we will discuss on why is computer security important of our
lives.
Computer security is also known as cyber security or IT security which
mainly used for protection of computer system such as hardware and
software.
7
To protect organization properties-It is very important to
ensure the organization’s computer data because every organization
has many sensitive assets and information. So, without computer or
IT security you can’t guarantee the security of organization properties.
8
Types of computer security
In this post, we will focus on the different types of computer security such
as application security, network security, internet security, data security,
information security and end user security.
9
4. Endpoint security- Human error is a major weak point which
is easily exploited by cyber criminals. End users are becoming the
largest security risk in any organizations. However, end user has
no fault of their own, and mostly due to a lack of awareness and
ICT policy. They can unintentional open the virtual gates to cyber
attackers. That’s why comprehensive security policies, procedures
and protocols have to be understood in depth by users who
accessing the sensitive information. It is better to providing
security awareness training program to them and should cover the
following topics:
Cyber security and its importance Phishing and Social
Engineering attack Password creation and usages Device Security
Physical Security Learn More About Social Engineering Attack.
10
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There
is much need for one to arm oneself with information and resources to safeguard
against these complex and growing computer security threats and stay safe online.
Some preventive steps you can take include:
Apart from these, there are many ways you can protect your computer system.
Aspects such as encryption and computer cleaners can assist in protecting your
computers and its files.
Unfortunately, the number of cyber threats are increasing at a rapid pace and more
sophisticated attacks are emerging. So, having a good foundation in cybersecurity
concepts will allow you to protect your computer against ever-evolving cyber
threats.
11
Conclusion
12
References
www.wikipedia.com
www.greeks.forgreeks.com
www.slideshare.net
www.copilot.com
13
GOVERNMENT POLYTECHNIC NANDURBAR
Marks
Roll No. Name of Student Marks of group Marks obtained Total Marks
work A by the individual (A+B)
(Out of 4) based in Viva B
(Out of 6)
14