Emotion Based Media Player: Emosic

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

EMOSIC

LogSafe
EMOTION BASED MEDIA PLAYER
FINAL YEAR PROJECT
TEAM MEMBERS
 Rishikesh Kumar (18104073)
 Sarthak Goel (18104079)
 Harshit (18104034)
Under the guidance of
Dr. Ashish Raman (ECE Department, NIT Jalandhar)
INTRODUCTION

LogSafe is basically an Email-based platform.


It prevent users email-id from data-breach.
It helps to identify which website is breaching user’s data.
It helps in keeping users email secure.
A data breach is an incident where
information is stolen or taken from a system
without the knowledge or authorization of the
system's owner.

PROBLEM
DEFINITION There are three different types of data breaches
physical, electronic, and skimming. They all
share the same amount of risk and consequences
but are unique in execution.
Literature Survey
Today’s information-age has led to cyberspace becoming an increasingly significant feature. There is a constant
growth of data breach in information security management systems. Malicious software or Malware, Social
Network Targeting, Phishing, infrastructure attacks and peer to peer information leakage or data breach are now
very day issues. The computer security Institute released a report on a survey, stating that almost 66% of all the
data security breach incidents in organizations tend to be conducted from within the organization by authorized
users.
According to Curtin and Ayers (2009) data breaching can be categorized into three chief categories: Logical,
Physical and procedural breaches.
In physical breaches, loss of physical control of data such as loss of computers, documents and media such as
tapes, compact disks and other disks.
Logical breaches occurs as a result of failure of the management system in the information security. It is where the
controls in place are exploited by insider threats.
 Procedural breaches occur as result of the corporation mishandling of data. They are featured by data loss via
mailings, improper record disposal or publicly accessible information on the corporate website.
DIFFERENT
PHASES OF THE
PROJECT
1. PLANNING 2. CHOOSING 3.STRUCTURE
TECHNOLOG
Y

4.TESTING 5. DEPLOY
METHODOLOGY
1.Authentication

2.Create Aliases

3.Aliases Use

4.Identify-Spammers
AUTHENTICATION
 This is the first step where users have to register first and then after registering they can access
their account using their mail and password.
CREATE ALIASES
TECHNOLOGY USED
 Node-js (Backend)
 React-js (Frontend-UI)
 Html/CSS (Basic use)
 Sendinblue (Email-verification/send)
RESULT
 By using our platform, user can prevent their email-id spam , data breaching spam and can
automatically block all the spammers.
 User can also know about which website is breaching users data, so that users can use it
accordingly.
CONCLUSION

You might also like