Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Annexure-II

Micro-Project Reports

A MICRO PROJECT ON AN " Case studies on security computing:-


achivment and trends. "
1.0 Rationale :-
The purpose of a test case is to determine if different features within a system are
performing as expected and to confirm that the system satisfies all related standards, guidelines
and customer requirements. The process of writing a test case can also help reveal errors or
defects within the system.
2.0 Aims/Benefits of Micro-Project :-
Aim:-
This Micro-Project aims at Case studies on security computing:- achivment and trends.
Benefits:-

 Guarantee that the software meets the end-user requirements.


 It helps determine whether the software works under a given set of conditions.
3.0 course outcomes achieved:-
 Apply Cryptographic Algorithms and Protocol to maintain computer security

4.0 Actual methodology followed :-

 Literature Review: Gathered existing research and case studies on security computing.
 Case Selection: Identified diverse case studies representing different aspects of security
computing.
 Analysis: Examined the achievements and trends depicted in each case study.

 Synthesis: Integrated findings to discern overarching patterns and emerging trends.


5.0 Actual Resources Used :-

Name of Specification
Sr.no Qty. Remarks
Resources/material s
Guidance in
1. Teacher Guidance 1 Used
project
“Software
2. Reference book 1 Used
testing '’
3. Internet information 1 Used
of figures

6.0 Outputs of Micro-Project :-


Case Studies:-
1. Blockchain in Healthcare:-
Explored the implementation of blockchain technology to secure medical
records, ensuring data integrity and patient privacy.
2.Zero Trust Architecture in Enterprises:-
Investigated how zero trust architecture enhances security by continuously
verifying user identity and device health, mitigating insider threats
3.AI-Powered Threat Detection:-
Analyzed the use of artificial intelligence and machine learning algorithms for
real-time threat detection, enabling proactive defense against evolving cyber threats.
4. Secure Multi-Party Computation:-
Examined the application of secure multi-party computation protocols in finance,
facilitating secure data sharing and collaborative analysis while preserving privacy.
5. IoT Security in Smart Cities:-
Investigated challenges and solutions in securing Internet of Things devices deployed in
smart city infrastructures, addressing vulnerabilities and ensuring resilience against cyber
attacks.
Findings:-
1. Increased adoption of advanced technologies such as blockchain, AI, and secure computation
to strengthen security measures.
2. Shift towards proactive and adaptive security approaches, emphasizing continuous
monitoring and rapid response to emerging threats.
3. Growing importance of collaboration and information sharing among stakeholders to address
complex security challenges effectively.
4. Emphasis on user-centric security strategies, prioritizing usability and user experience
without compromising security.

7.0 Skills developed/Learning outcomes of this Micro-Project:-


 During the course of developing this micro-project we learnt many practical applications
of Cryptography concepts in theory and practical.
 We learnt to Implement Modifier Caesar’s Cipher with shift of any key.
 We also learnt how to develop, compile and execute code for cryptographic techniques
in Java
8.0 Conclusion:-
Security computing continues to evolve rapidly, driven by advancements in
technology and the evolving threat landscape. By leveraging innovative approaches and
fostering collaboration, organizations can enhance their security posture and effectively mitigate
cyber risks in an increasingly interconnected world.

You might also like