MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION – MUMBAI
A Micro Project Report On
“Need of Cyber security ”
Submitted by:
Mr. Vedant Jadhav(24)
Guided by
Prof. S.B.Patil.
Head in Department of Information Technology
Academic Year 2023-24
MET INSTITUTE OF TECHNOLOGY-POLYTECHNIC
BHUJBAL KNOWLEDGE CITY,
ADGAON, NASHIK
MET Institute of Technology-Polytechnic
Bhujbal Knowledge City,
Adgaon, Nashik-422 003
Tel. : ( 0253 ) 2303515, 2303267, 2303268 Telefax : ( 0253 ) 2303305,
2303203 Toll-free : 1800 22 0234
Email : principal
[email protected] CERTIFICATE
This is Certify that this report
“Need of Cyber security”
Submitted by:
Mr. Vedant Jadhav(24)
The students of Third year of Department Information Technology
In 2023-24
as a part of micro project work as prescribed by
The Maharashtra State Board of Technical Education, Mumbai
And that I have guided them for the said work from time to time
and I found them satisfactorily progressive.
And that, the said work has been assessed by me and I am satisfied that the same is up to
the standard envisaged for the level of the course.
Prof S.B.Patil Prof S.B.Patil Dr R.S.Narkhede
(Project Guide) Head of Department Principal
ACKNOWLEDGEMENTS
We take this opportunity to express our deepest sense of gratitude and sincere thanks to those who
have helped us in completing this task.
We express our sincere thanks to our guide Prof. S.B.Patil, Head in Department of Information
Technology, who has given us valuable suggestions, excellent guidance, continuous encouragement
and taken keen interest in the completion of this work. His kind assistance and constant inspiration
will always help us in our future also.
We thank Prof. S.B.Patil, Head of the Department of Information Technology,for the co-operation
and encouragement for collecting the information and preparation of data.
We are thankful to Principal Dr. R.S.Narkhede, for encouraging us to undertake this project and he
has taken keen interest in making the project and report absolutely flawless.
Credit goes to our friends, staff members of Department of Information Technology, and the Institute’s
Library for their help and timely assistance.
PART A – Plan
6th semester
1.0 Brief Introduction
The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.
2.0 Aims/Benefits of the Micro-Project
• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.
• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.
3.0 Course outcome addressed.
Detect Network, Operating systems, and application vulnerabilities.
4.0 Proposed methodology
In this project, we know about the need for cyber security.
5.0 Action Plan
Sr Details of activity Planned Start Planned Fin- Name of Responsible
No. Date ish Date Team Member
1 Selection of Micro project Vedant Jadhav
2 Research (Content and Images) Vedant Jadhav
3 Collection of data Vedant Jadhav
4 Compilation of the collected Data Vedant Jadhav
5 Formatting of the Document Vedant Jadhav
6 Analysed and Confirm the informa- Vedant Jadhav
tion by guide
7 Printing of the Final Project Vedant Jadhav
8 Submission of the Micro project Vedant Jadhav
6.0 Resources Required
Sr Name of Resource / Material Specifications Qty Remark
No.
1 Computer System Windows 11 01 -
2 Website https://www.allitebooks.in/the-internet-of- - -
things/
3 TextBook. Internet Of Things-A Hands-on Approach - -
PART B – Plan
6th semester
1.0 Brief Introduction
The term cyber security is utilized to refer to the security offered through online services to guard your online informa-
tion. Cyber Security and Information Security differ only in their response and Reduction/Prevention. Cyber security
encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations, and Compliance including
Third Parties involved in delivering an objective With an increasing quantity of people getting connected to the Internet,
the security threats that generate massive harm are growing also.
2.0Aims/Benefits of the Micro-Project
• Advancements and applications of Computer Engineering and Information Technology are ever-changing. Emerg-
ing trends aim at creating awareness about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.
• These are some emerging areas expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship.
Need of Cyber security
Why Cybersecurity Is Important?:-
Our world today is headed by technology and we can’t do without it at all. From booking our flight tickets to catching
up with an old friend, technology plays a crucial role in it. However, the same technology may expose you when it’s
vulnerable and could lead to the loss of essential data. Cyber security, alongside physical commercial security, has thus,
slowly and steadily, become one of the most essential topics in the business industry to be talked about Cyber security
is essential since it aids in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
Cyber security becomes necessary as Businesses are being carried out now on a Network of Networks. Computer
networks have always been the target of criminals, and it is likely that the danger of cyber security breaking will only rise
in the future as these networks grow, but there are reasonable precautions that organizations can take to minimize losses
from those who desire to do harm.
Cyber Security Objectives.
Fig. of Cyber Security Objectives.
Confidentiality.
the property that information is not created available or revealed to unauthorized individuals, entities, or processes Confi-
dentiality refers to guarding information against being accessed by unauthorized parties. In other words, only the people
who are authorized to do so can achieve access to sensitive data. A failure to maintain confidentiality means that someone
who shouldn’t have access has managed to get it, through intentional behavior or by accident. Such a failure of confiden-
tiality is commonly known as a breach.
Integrity
the property of safeguarding the precision and completeness of assets Integrity refers to assuring the authenticity of
information—that information is not altered, and that the origin of the information is authentic. Imagine that you have
a website and you sell products on that site. Now imagine that an attacker can shop on your website and maliciously
alter the prices of your products so that they can buy anything for whatever price they decide. That would be a failure of
integrity because your data, in this case, the price of a product has been changed and you didn’t authorize this alteration.
Availability
The property of being obtainable and usable upon request by an authorized entity Availability means that data is accessible
by authorized users. Information and other necessary assets are accessible to customers and the business when required.
Note, that information is unavailable not only when it is lost or destroyed, but also when access to the information is
rejected or delayed.
Cyberattack
A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confi-
dential personal or organizational data
Major security problems
• Virus
• Hacker
• Malware
• Trojan horses
• Password cracking
1. Viruses and worms
• Virus - malware linked to a carrier such as an email message or a word processing document
• A Virus is a ”program that is crowded onto your a computer without your understanding and runs against
your desires
• Worm - malware can autonomously circulate itself without a carrier, using information about connected
computers.
2. Hackers
• In common a hacker is an individual who violates computers, usually by gaining access to administrative
controls.
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
a. White Hat Hackers
The term ”white hat” in Internet slang refers to an ethical computer hacker, or a computer security professional, who
specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information
systems.
b. Grey Hat Hackers
The term ”grey hat”, ”grey hat” or ”gray hat” refers to a computer hacker or computer security specialist who may
sometimes break laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
c. Black Hat Hackers
black hat hacker (or black-hat hacker) is a hacker who ”violates computer shield for little cause beyond maliciousness or
for personal gain”.
How To prevent hacking
It may be impossible to prevent computer hacking, however influential security controls including strong passwords, and
the use of firewalls can aid.
1. Malware
word ”malware” comes from the term ”MALicious softWARE.” Software that has some negative intent and which is
installed on a user’s computer without that user’s permission. Key loggers - Software installed on a computer that catches
keystrokes and sends these to a remote system. Accustomed to trying and getting personal data to achieve access to
sites such as banks. Ransomware- software that operates on a user’s computer and orders that the user pays some other
organization. If they don’t, the information on their computer will be ruined. Malware can usually circulate itself from
one computer to another either as a virus or as a worm.
To Stop Malware
• Download an anti-malware program that also helps stop infections.
• Do not download from anonymous sources
• Activate Network Threat Protection,
2. Trojan Horses
Trojan horses are email viruses that can reproduce themselves, steal information, or harm the computer system. These
viruses are the heaviest threats to computers
How to Avoid Trojans
• Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
• Do not click unknown links.
3. Password Cracking
Password attacks are attacks by hackers that are capable to determine passwords or find passwords to different secure
electronic areas and social network sites.
Securing Password
• Use always a Strong password.
• Never use the exact password for two different sites.
Insider attacks
Attacks on an organization are carried out by individual who is inside that organization either by themselves or with the
connivance of an outsider. Difficult to oppose using technical processes as the insider may have proper credentials to
access the system.
External attacks
on an organization carried out by an external agent Need either accurate credentials or the exploitation of some vulnera-
bility to gain access to the systems.
Malicious and accidental damage
Cybersecurity is most concerned with Cyberattacks and Cyber accidents - Accidental events that can generate loss or
damage to a person, business, or public body. Many of the same technologies utilized to protect against external attacks
also protect against cyber accidents. However, sometimes protecting against cyber-attacks raises the probability of cyber
accidents.
4.0 Outputs of the Micro-Project
In this micro project, we know about the need for cyber security.
5.0 Skill Developed / Learning outcomes of this Micro-Project
• Develop group discussion skills.
• Communication skills improved.
• MS WORD skills developed.
• basic cyber security prevention skills.
Teacher Evaluation Sheet
Name of Student : Vedant Deepak Jadhav. Enrollment No : 2107760303
Name of Program : Information Technology Semester : VI
Course Title : ETI Code : 22618
Title of the Micro-Project : Need of Cyber security.
Course Outcomes Achieved:-
• Describe Ethical Hacking Process.
Evaluation as per Suggested Rubric for Assessment of Micro Project
Sr Characteristic to be assessed Poor (Marks Average Good (Marks Excellent
No. 1-3) (Marks 4-5) 6-8) (Marks 9-10)
1 Relevance to the course
2 Literature Survey / Information Col-
lection
3 Project Proposal
4 Completion of the Target as per
project proposal
5 Analysis of Data and representation
6 Quality of Prototype/Model
7 Report Preparation
8 Presentation
9 Defence
Micro-Project Evaluation Sheet
Note:-
Every Course teacher is expected to assign marks for group evaluation in first 3 Columns and individual evaluation in 4th
columns for each group of students as per rubrics.
Comments/Suggestion about team work/leadership/inter-personal communication (if any):-
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Any other Comments:-
.......................................................................................................................................................................................
.......................................................................................................................................................................................
Name and designation of Faculty Member
Prof.S.B.Patil.
Signature:-