Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Cyber Security

Sr.No. Roll No. Name of Member


1. 01 Omkar Satpute
2. 02 Shaunak Patil
3. 03 Prajwal Gharat
4. 07 Zaid Sayyad
5. 08 Tanaya Nasle

Guide Name – Mr. Pramod Patil


Part A

Brief Description:
❖ The importance of a micro-project is that it helped me gather
information which increased my knowledge of the topic.
❖ I inherited a better aspect in this field which will help me in the
future.
❖ Thus, it was beneficial to learn the subject.

Aim of the micro-project:


❖ The micro-project aims to prepare a report on measures to be taken
for cyber security.
❖ The micro-project tends to determine the detailed study of cyber
security.

Resources Used:

Sr. No. Name of Resources Specifications Quantity Remarks


Required
1. Asus Rog Zephyrus G15 Processor - AMD Ryzen 9 1 For Research
Laptop 5900HS, 4.5 GHz, with 6 GB
Nvidia GeForce 3060 RTX
Graphics, OS - Windows 11,
RAM - 16 GB, ROM - 1 TB,
Microsoft 365.

2. Google Chrome https://en.wikipedia.org 1 For information


https://www.studocu.com
https://www.tutorialspoint.com

3. Microsoft Word Microsoft 365 1 For presentation


Actual Procedure Followed:
❖ Group formation - The team for the micro-project was
formed and the topic for the micro-project was selected.
The group leader is Shaunak Patil.
❖ Finalization of micro-project - After finalizing the project
we decided to allot work to each member.
❖ Planning - We decided to gather information for the topic.
We confirmed the submission date and got to work. We
completed part of a plan using the
software Microsoft PowerPoint.
❖ Module distribution & analysis part – We
completed analyzing the design of the project and
distributed work to each member.
❖ Design part - We decided to design the presentation using a
theme that correlated with the topic. We attached pictures
to show references to the topic.
❖ Implementation - We decided to put the decision into effect
for the project. After realizing the errors in the project, we
successfully executed it.
❖ Presentation - We presented all the detailed information on
the topic. All the resources were put to the best use. The
application of pictures was used in a particular field. The
use of the software was well done.
❖ Submission - After presenting and finalizing the project, we
successfully submitted our complete project.
Part B

To study the measures to be taken ensuring cyber


security.

Brief Description:
❖ The importance of a micro-project is that it helped me gather
information which increased my knowledge of the topic.
❖ I inherited a better aspect in this field which will help me in the
future.
❖ Thus, it was beneficial to learn the subject.

Aim of the micro-project:


❖ The micro-project aims to prepare a report on measures to be taken
for cyber security.
❖ The micro-project tends to determine the detailed study of cyber
security.
What is Cyber Security?
Computer security, cybersecurity, digital security, or information
technology security (IT security) is the protection of computer
systems and networks from attacks by malicious actors that may result
in unauthorized information disclosure, theft of, or damage
to hardware, software, or data, as well as from the disruption or
misdirection of the services they provide.

Cyber security refers to the practice of protecting computer systems,


networks, and data from digital attacks, unauthorized access, and
damage. It involves implementing measures and technologies to
prevent, detect, and respond to cyber threats.

Cyber security is the application of technologies, processes, and


controls to protect systems, networks, programs, devices and data from
cyber-attacks. It aims to reduce the risk of cyber-attacks and protect
against the unauthorized exploitation of systems, networks, and
technologies.
Importance of Cyber Security
In today's digital landscape, cyber security is of utmost importance due
to the following reasons:

• Protection of sensitive data: Cyber security measures safeguard


sensitive information such as personal data, financial records, and
intellectual property from unauthorized access and theft.
• Prevention of financial loss: Cyber-attacks can result in financial
loss due to theft, fraud, or disruption of business operations.
Implementing cyber security measures helps mitigate these risks.
• Protection of reputation: A successful cyber-attack can damage
an organization's reputation, leading to loss of customer trust and
business opportunities. Cyber security helps maintain a positive
brand image.

Importance of Cyber Security


In today's digital landscape, cyber security is of utmost importance due
to the following reasons:

• Protection of sensitive data: Cyber security measures safeguard


sensitive information such as personal data, financial records, and
intellectual property from unauthorized access and theft.
• Prevention of financial loss: Cyber-attacks can result in financial
loss due to theft, fraud, or disruption of business operations.
Implementing cyber security measures helps mitigate these risks.
• Protection of reputation: A successful cyber-attack can damage
an organization's reputation, leading to loss of customer trust and
business opportunities. Cyber security helps maintain a positive
brand image.
Identifying Vulnerabilities
Importance of Security Audits
Regular security audits and assessments are essential for identifying
vulnerabilities in systems and networks. By conducting these audits,
organizations can proactively identify weaknesses and take appropriate
measures to mitigate potential risks.

Process of Identifying Vulnerabilities


The process of identifying vulnerabilities involves comprehensive
scanning and testing of systems and networks. This includes analysing
the configuration settings, conducting penetration testing, and
reviewing access controls and user permissions. Organizations can
identify vulnerabilities and prioritize remediation efforts by
systematically assessing the security posture.
Implementing Strong Passwords
Why Use Strong Passwords?
Using strong passwords is crucial for protecting your personal and
sensitive information from unauthorized access. Weak passwords can
be easily guessed or cracked, putting your accounts and data at risk.

Guidelines for Creating Strong Passwords


Follow these guidelines to create strong passwords:

• Use a combination of uppercase and lowercase letters.


• Include numbers and special characters.
• Avoid using personal information or common words.
• Make your password at least 8 characters long.

Managing Secure Passwords


In addition to creating strong passwords, it's important to manage them
securely:

• Avoid reusing passwords for multiple accounts.


• Use a password manager to securely store and generate passwords.
• Enable two-factor authentication for an extra layer of security.
Using Multi-Factor Authentication
Benefits of Multi-Factor Authentication (MFA)

• Enhanced security by adding an additional layer of protection


beyond passwords.
• Reduces the risk of unauthorized access to sensitive information
and accounts.
• Provides a more reliable and trustworthy authentication method.

Implementing Multi-Factor Authentication (MFA)


1. To implement multi-factor authentication, follow these general
guidelines:
2. Identify the systems and applications that require additional
security measures.
3. Choose appropriate authentication factors, such as passwords,
biometrics, or security tokens.
4. Implement the necessary infrastructure and software to support
multi-factor authentication.
5. Educate users on the importance of multi-factor authentication
and provide clear instructions on how to set it up.
Updating Software and Systems Regularly
Importance of Regular Updates
Regularly updating software and systems is crucial to protect against
known vulnerabilities and security weaknesses.

Enhanced Security
Updating software and systems ensures that the latest security patches
and fixes are applied, reducing the risk of cyber-attacks and
unauthorized access.

Protection Against Exploits


By regularly updating, organizations can protect themselves against
known exploits and vulnerabilities that cybercriminals may exploit.

Improved Performance
Updating software and systems can also lead to improved performance,
stability, and compatibility with other applications and devices.
Monitoring and Detecting Threats
Importance of Real-time Monitoring and Threat Detection
In today's digital landscape, monitoring and detecting threats in real-
time is of utmost importance for organizations. Cyber threats are
constantly evolving and becoming more sophisticated, making it
essential for businesses to stay vigilant and proactive in their security
measures. By monitoring and detecting threats in real-time,
organizations can:

• Minimize Damage: Real-time threat detection allows


organizations to identify and respond to threats before they can
cause significant damage to their systems, networks, and data.
• Prevent Data Breaches: Timely detection of threats enables
organizations to prevent data breaches, protecting sensitive
information and maintaining the trust of their customers and
stakeholders.
• Ensure Business Continuity: By monitoring and detecting threats
in real-time, organizations can quickly respond and mitigate any
potential disruptions to their operations, ensuring business
continuity.
Creating a Cyber Incident Response Plan
Incident Identification

The first step in creating a cyber incident response plan is to identify


potential security incidents. This involves monitoring systems and
networks for any signs of unauthorized access, data breaches, or other
suspicious activities.

Containment

Once an incident is identified, the next step is to contain the impact and
prevent further damage. This may involve isolating affected systems,
blocking access to compromised accounts, or taking other immediate
actions to limit the scope of the incident.

Eradication

After containing the incident, the next step is to eradicate the root cause
of the problem. This may involve removing malware, patching
vulnerabilities, or implementing other measures to ensure that the
incident does not recur.

Recovery

The final step in creating a cyber incident response plan is to recover


from the incident and restore normal operations. This may involve
restoring backups, conducting forensic analysis, and implementing
additional security measures to prevent similar incidents in the future.

THANK YOU

You might also like