NIS Project New

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Microproject

On

Computer Security
Submitted in the partial fulfillment of the requirement for the diploma
Of
Diploma in Computer Technology
Chetana Bedse
Shambhavi Bedse
Mehul Chavan
Vinay Nirangkari

Department of COMPUTER TECHNOLOGY


GOVERNMENT POLYTECHNIC, NANDURBAR
(MAHARASHTRA)
Maharashtra state board of technical education
(2023-2024)

1
Maharashtra State Board of Technical Education
Certificate
This is to certify that MR./MS. of 6th semester of Diploma in Computer
technology of Institute, Government Polytechnic Nandurbar (Code:425412 ) Has
completed the Micro Project satisfactory in subject: NIS for the academic year
(2023-2024) as prescribed in the curriculum

SR NO. Name of the Roll No. Enrollment Seat No.


Group Members No.

1. Chetana Bedse 3154 2114320075


2. Shambhavi Bedse 3143 2114320044
3. Mehul Chavan 3145 2114320050
4 Vinay Nirangkari 3144 2114320045

Place: NANDURBAR
Date:

Subject Teacher Head of the Department Principal

2
Abstract
Computer security, cybersecurity or information technology security (IT security)
is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide The field is becoming
increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and WiFi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of the major
challenges in the contemporary world. Computer security, the protection of
computer systems and information from harm, theft, and unauthorized use.
Computer hardware is typically protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex. The security
precautions related to computer information and access address four major
threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on. Another security measure is to store a system’s data on a
separate device, or medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is often encrypted so that
it can be deciphered only by holders of a singular encryption key.

3
INDEX

SR. NO. Content Page No.

1. Introduction 5.

2. Computer security threats 6.

3. What is computer security and 7-8.


why it is important?

4. Types of computer security 9-10.

5. Computer security practice 11.

6. Conclusion 12.
7. References 13.

4
Introduction
Computer security, cybersecurity or information technology security (IT security)
is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide The field is becoming
increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of the major
challenges in the contemporary world. Computer security, the protection of
computer systems and information from harm, theft, and unauthorized use.

Computer hardware is typically protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex. The security
precautions related to computer information and access address four major
threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on

5
Computer security threats

Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital. The most harmful types of
computer security are:

Viruses- Computer virus is a malicious program which is loaded into the user’s
computer without user’s knowledge. It replicates itself and infects the files and
programs on the user’s PC. The ultimate goal of a virus is to ensure that the
victim’s computer will never be able to operate properly or even at all.
Computer Worm-Computer worm is a software program that can copy itself
from one computer to another, without human interaction. The potential risk here
is that it will use up your computer hard disk space because a worm can replicate
in greate volume and with great speed.

Phishing-Disguising as a trustworthy person or business, phishers attempt to


steal sensitive financial or personal information through fraudulent email or
instant messages. Phishing in unfortunately very easy to execute. You are
deluded into thinking it’s the legitimate mail and you may enter your personal
information.

1) Botnet-Botnet is a group of computers connected to the internet, that


have been compromised by a hacker using a computer virus. An
individual computer is called ‘zombie computer’.
The result of this threat is the victim’s computer, which is the bot will be
used for malicious activities and for a larger scale attack like DDoS.

2) Rootkit – It is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence. Once
a rootkit has been installed, the controller of the rootkit will able to
remotely execute files and change system configurations on the host
machine.

6
What is computer security?

Computers are very essential part of our daily lives and it plays important
roles in our lives. So, the security of a computer is important because it
protects your information and helps to prevent from viruses and malware.
In this post, we will discuss on why is computer security important of our
lives.
Computer security is also known as cyber security or IT security which
mainly used for protection of computer system such as hardware and
software.

Why is computer security important?


The main purpose of the security is the preventing and detecting
unauthorized access of computer system. It guarantees to safe processing
and storage of business, healthcare and sensitive information. Cyber
security provides the Confidentiality, Integrity and Availability for all
components of a computer system.

Here are the same reasons why is computer security important?


To protect personal information- To prevent from cyber security
risk you have to protect your personal information. IT security is the first
prime issue to protect your personal and others information. By the way
you can keep your information secure using the following tips:
● Use antivirus Software
● Update operating system
● Use strong password
● Backup your data
● Lock your computer
● Avoid Phishing Emails
● protect your personal information

7
To protect organization properties-It is very important to
ensure the organization’s computer data because every organization
has many sensitive assets and information. So, without computer or
IT security you can’t guarantee the security of organization properties.

To prevention from data theft- Data theft is act of stealing


sensitive information such as bank account details, credit card
information, passwords, and documents which stored on computers,
servers, or other devices. The most common reasons of data
breaches are as follows:
● Weak and stolen credentials
● Malicious insiders
● Application vulnerabilities
● Human Error
So, prevent from data theft you have to ensure your device security
by using endpoint security, lock down your computer, identify
critical data and use authentication.

To prevent from viruses and malware- Computer security


is also important to protect from computer viruses and malware’s. A
computer virus or malware can corrupt or delete your sensitive data,
damage your hard disk and it spreads from one computer to another
using email program and others. So, you have to protect your
computer from viruses and malware using following these tips:
● Keep your software up to date
● Use free antivirus software
● Use a strong password
● Don’t click on links within emails

8
Types of computer security
In this post, we will focus on the different types of computer security such
as application security, network security, internet security, data security,
information security and end user security.

1. Application security- Application security is the types of cyber


security which developing application by adding security features
within applications to prevent from cyber attacks. The attacks can be
SQL injection, denial of service (DoS) attacks, data breaches or
other cyber-attacks. There are some application security tools and
techniques such as firewalls, antivirus software, encryption, and web
application firewall which can help to prevent from cyber-attacks.

A web application firewall is designed to protect web applications by filtering


and monitoring HTTP harmful traffic. Here are the most used
Web Application Firewalls are: Fortinet FortiWeb, Citrix NetScaler App
Firewall,F5 Advanced WAF,Radware AppWall ,Symantec
WAF,BarracudaWAF, Imperva WAF,Sophos XG Firewall,SonicWallNSa

2. Information security- Information security (IS) is the types of


computer security which refers to the process and methodology to
protect the confidentiality, integrity and availability of computer
system from unauthorized access, use, modification and
destruction. Information security focuses on the CIA triad model,
which ensure confidentiality, integrity, and availability of data,
without affecting organization productivity.

3. Network security-Network security is other types of IT


security which process of preventing and protecting against
unauthorized intrusion into computer networks. It is a set of rules
and configurations which designed to protect the confidentiality,
integrity and accessibility of computer networks system and
information using both software and hardware technologies.

9
4. Endpoint security- Human error is a major weak point which
is easily exploited by cyber criminals. End users are becoming the
largest security risk in any organizations. However, end user has
no fault of their own, and mostly due to a lack of awareness and
ICT policy. They can unintentional open the virtual gates to cyber
attackers. That’s why comprehensive security policies, procedures
and protocols have to be understood in depth by users who
accessing the sensitive information. It is better to providing
security awareness training program to them and should cover the
following topics:
Cyber security and its importance Phishing and Social
Engineering attack Password creation and usages Device Security
Physical Security Learn More About Social Engineering Attack.

5. Internet security- Internet security is the important types of


computer security which has defined as a process to create set of
rules and actions to protect computers system that are connected
to the Internet.

Network security methods:-


There are different components or methods to improve network security. Here,
we have mentioned the most common network security components. Antivirus
Software Application Security Behavioural Analytics Data Loss Prevention
(DLP) Email Security Firewalls Mobile Device Security Network Segmentation
Security Information and Event Management (SIEM) Virtual Private Network
(VPN) Web Security Wireless Security Network Access Control (NAC).

10
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There
is much need for one to arm oneself with information and resources to safeguard
against these complex and growing computer security threats and stay safe online.
Some preventive steps you can take include:

Secure your computer physically by:


Installing reliable, reputable security and anti-virus software
Activating your firewall, because a firewall acts as a security guard
between the internet and your local area network
Stay up-to-date on the latest software and news surrounding your devices
and perform software updates as soon as they become available
Avoid clicking on email attachments unless you know the source
Change passwords regularly, using a unique combination of numbers, letters
and case types
Use the internet with caution and ignore pop-ups, drive-by downloads while
surfing
Taking the time to research the basic aspects of computer security and
educate yourself on evolving cyber-threats
Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen to
your computer.

Apart from these, there are many ways you can protect your computer system.
Aspects such as encryption and computer cleaners can assist in protecting your
computers and its files.

Unfortunately, the number of cyber threats are increasing at a rapid pace and more
sophisticated attacks are emerging. So, having a good foundation in cybersecurity
concepts will allow you to protect your computer against ever-evolving cyber
threats.

11
Conclusion

In conclusion, computer security is crucial in today’s digital age to protect


systems and data from various threats and attacks. It involves a combination of
practices and technologies to ensure the confidentiality, integrity, and availability
of information. It is also known as cyber security is that it is absolutely vital in our
modern digital age. We cannot afford to ignore the dangers of cyber attacks, data
breaches, and other online threats. Instead, we must take proactive steps to protect our
information and systems from these threats. Here are some key takeaways from the
importance of cyber security:

 Cyber security must be an ongoing effort: Threats to our information and


systems are constantly evolving, so we must remain vigilant and keep our
security measures up-to-date at all times.
 Prevention is key: The best way to defend against cyber attacks is to prevent
them from happening in the first place. This means implementing strong security
measures, such as firewalls, anti-virus software, and encryption.
 Education is crucial: Everyone who uses the internet and digital devices must
be aware of the risks and best practices for staying safe online. Education and
awareness campaigns are key to protecting against cyber threats.
 Collaboration is necessary: Cyber security is not just the responsibility of
individual users, but also of businesses, governments, and other
organizations. Collaboration and information-sharing can help us stay
ahead of cyber threats. In conclusion, cyber security is an essential part of
our digital lives and we must take it seriously. By implementing strong
security measures, staying informed and educated about online risks, and
working together to prevent and respond to cyber attacks, we can protect
ourselves and our digital assets.

12
References
 www.wikipedia.com
 www.greeks.forgreeks.com
 www.slideshare.net
 www.copilot.com

13
GOVERNMENT POLYTECHNIC NANDURBAR

Teacher Evaluation Sheet

Academic Year (2023-2024)


Project title: Computer Technology
Course title & code: NIS
Semester: 6th
Course outcome:
 Follow safety practices.
 Practice good housekeeping.
 Demonstrate working as a lead 1 team member.  Maintain tools and
equipment
 Follow ethical practices.

Marks

Roll No. Name of Student Marks of group Marks obtained Total Marks
work A by the individual (A+B)
(Out of 4) based in Viva B
(Out of 6)

3154 Chetana Bedse

3143 Shambhavi Bedse

3145 Mehul Chavan

3144 Vinay Nirangkari

Name and Signature of Faculty:

14

You might also like