Need of Cuber Security
Emerging Trends In Computer
And
Information
Technology
Microproject
0
Need of Cuber Security
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
MICROPROJECT
Academic Year: 2023-2024
Topic:- Need of Cyber security
Program:- Computer Engineering.
Subject Name:- Emerging Trends In Computer
And Information Technology
Course code:- 22618
Course:- CO6I
Prof .Mrs. Prof. PROF.
[Name of Guide] [Name of HOD] [Principal]
1
Need of Cuber Security
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
CERTIFICATE
This is to certify that Mr.. Roll No: of TYCO of Diploma in Computer
Engineering of Institute: MIT Polytechnic Pune (Code: 0148) has
completed the Micro Project satisfactorily in Subject : Emerging
Trends In Computer And Information Technology For the academic
year 2023-2024 as prescribed in the curriculum.
Place :Pune Enrollment No:
Date: Exam. Seat No: --------
Subject Teacher Head of the Department Principal
( Prof .) (Prof. ) (Prof . )
Institute
Seal
2
Need of Cuber Security
Index
Sr.No Content Page No.
1. Abstract 7
2. Introduction 7
3. Actual method 7
4. Output of the project 8
5. Micro-Project Proposal A 15
6. Micro-Project Proposal B 17
7. Conclusion 18
8. Evaluation Sheet 19
3
Need of Cuber Security
1.0 ABSTSRACT
Advancements and applications of Computer Engineering and Information
Technology are ever changing. Emerging trends aims at creating awareness
about major trends that will define technological disruption in the upcoming
years in the field of Computer Engineering and Information Technology.
These are some emerging areas expected to generate revenue, increasing
demand as IT professionals and open avenues of entrepreneurship
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
4
Need of Cuber Security
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing also
The term cyber security is utilized to refer to the security offered through online
services to guard
your online information. Cyber Security and Information Security differ
only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, and Compliance including Third
Parties involved in
5
Need of Cuber Security
delivering an objective With an increasing quantity of people getting
connected to the Internet,
the security threats that generate massive harm are growing als
er Security and Information Security differ only in their response
and Reduction/Prevention. Cyber security encompasses all aspects of
security viz., Physical,
Technical, Environmental, Regulations, a
2.0 Introduction
The term cyber security is utilized to refer to the security offered through
online services to guard your online information. Cyber Security and
Information Security differ only in their response and
Reduction/Prevention. Cyber security encompasses all aspects of security
viz., Physical, Technical, Environmental, Regulations, and Compliance
including Third Parties involved in delivering an objective With an
increasing quantity of people getting connected to the Internet, the security
threats that generate massive harm are growing also.
3.0 Actual Methodology Followed:
• First we searched topic on for Emerging Trends in Computer and Information
Technology Microproject.
• And after searched and after discussion we select the topic.
• Then searched information about topic.
• After searching information we confirming the collected the information by
the guide.
• While doing the microproject we study on the information of the Digital
Forensic.
• We prepared report on the basis of collected information.
6
Need of Cuber Security
• Then Formatting a report and after discussion we corrected in wrong
information.
• And last we confirmed report by guide and make a final report and completed
the report.
4.0 Output of the project :
Why is cyber security important ? Our world today is headed by
technology and we can't do without it at all. From booking our flight tickets to
catching up with an old friend, technology plays a crucial role in it. However, the
same technology may expose you when it's vulnerable and could lead to the
loss of essential data. Cyber security, alongside physical commercial security,
has thus, slowly and steadily, become one of the most essential topics in the
business industry to be talked about Cyber security is essential since it aids in
securing data from threats such as data theft or misuse, also safeguards your
system from viruses. Cyber security becomes necessary as Businesses are being
carried out now on a Network of Networks. Computer networks have always
been the target of criminals, and it is likely that the danger of cyber
security breaking will only rise in the future as these networks grow, but there are
reasonable precautions that organizations can take to minimize losses from those
who desire to do harm
Cyber Security Objective
7
Need of Cuber Security
Confidentiality
the property that information is not created available or revealed to
unauthorized individuals, entities, or processes Confidentiality refers to
guarding information against being accessed by unauthorized parties. In other
words, only the people who are authorized to do so can achieve access to
sensitive data. A failure to maintain confidentiality means that someone who
shouldn't have access has managed to get it, through intentional behavior or by
accident. Such a failure of confidentiality is commonly known as a breach.
Integrity
the property of safeguarding the precision and completeness of assets
Integrity refers to assuring the authenticity of information—that
information is not altered, and that the origin of the information is
authentic. Imagine that you have a website and you sell products on
that site. Now imagine that an attacker can shop on your website and
maliciously alter the prices of your products so that they can buy anything for
whatever price they decide. That would be a failure of integrity because your
data, in this case, the price of a product has been changed and you didn't
authorize this alteration.
Cyberattack
A malicious attempt, using digital technologies, to cause personal or property
loss or damage, and/or steal or alter confidential personal or organizational
data
Major security problems
• Virus
• Hacker
• Malware
• Trojan horses
• Password cracking
8
Need of Cuber Security
1. Viruses and worms
• Virus - malware linked to a carrier such as an email message or a word
processing document
• A Virus is a "program that is crowded onto your a computer without your
understanding and runs against your desires
• Worm - malware can autonomously circulate itself without a carrier,
using information about connected computers.
Solution
• Install a security suite that protects the computer against threats such as
viruses and worms.
2. Hackers
• In common a hacker is an individual who violates computers, usually
by gaining access to administrative controls.
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
a. White Hat Hackers
• The term "white hat" in Internet slang refers to an ethical computer
hacker, or a computer security professional, who specializes in
penetration testing and in other testing methodologies to ensure the
security of an organization's information systems.
b. Grey Hat Hackers
9
Need of Cuber Security
• The term "grey hat", "grey hat" or "gray hat" refers to a computer
hacker or computer security specialist who may sometimes break laws or
typical ethical standards, but does not have the malicious intent typical of a
black hat hacker
c. Black Hat Hacker
• A black hat hacker (or black-hat hacker) is a hacker who "violates
computer shield for little cause beyond maliciousness or for personal gain".
How To prevent hacking
• It may be impossible to prevent computer hacking, however influential
security controls including strong passwords, and the use of firewalls can aid.
Securing Password
• Use always a Strong password.
•Never use the exact password for two different sites.
Insider attacks Attacks
on an organization are carried out by individual who is inside that
organization either by themselves or with the connivance of an outsider.
Difficult to oppose using technical processes as the insider may have proper
credentials to access the system.
External attacks
10
Need of Cuber Security
Attacks on an organization carried out by an external agent Need either
accurate credentials or the exploitation of some vulnerability to gain access
to the systems.
Malicious and accidental damage
Cybersecurity is most concerned with Cyberattacks and Cyber accidents -
Accidental events that can generate loss or damage to a person, business, or
public body. Many of the same technologies utilized to protect against
external attacks also protect against cyber accidents. However, sometimes
protecting against cyber-attacks raises the probability of cyber accidents
Latest Trends - Information Security Threats
Hack Hacktivism
Hack + Activism = Hacktivism is the usage of legal and/or illegal digital tools
in pursuit of a political/
personal objective
Tools and Attacks are utilized for
• website defacements
Hacking and altering the website of a company's website
• Redirects
• Denial of Service Attacks
Attempt to create a machine or network resource unavailable to its intended
users typically target sites
or services hosted on high-profile web servers such as banks, credit card
payment gateways, and even
root nameservers.
• Identity Theft
Stealing someone's identity in which someone pretends to be someone else by
assuming that person's
identity
• E-mail Bombing
• Web-Site Mirroring
• Doxing
Process of Gathering and discharging Personally Identifiable information To
gather information using
sources on the internet
Key Techniques Used
11
Need of Cuber Security
Phishing - attempt to obtain sensitive information, like bank account
information or an account
password, by posing as an honest entity in an electronic communication
You get an email that looks like it comes from your bank, credit card company,
etc. Asking you to
"update their records" may be due to potential scams, or other reasons Provides
a hyperlink to a web
page where you enter your personal information The link takes you to a thief's
website that is
disguised to look like the company's
Latest Trends - Information Security Threats :
Hack Hacktivism
Hack + Activism = Hacktivism is the usage of legal and/or illegal digital tools
in pursuit of a political/ personal objective
Tools and Attacks are utilized for
• website defacements Hacking and altering the website of a company's
website
• Redirects
• Denial of Service Attacks
Attempt to create a machine or network resource unavailable to its intended
users typically target sites or services hosted on high-profile web servers such
as banks, credit card payment gateways, and even root nameservers.
• Identity Theft
Stealing someone's identity in which someone pretends to be someone else by
assuming that person's identity
• E-mail Bombing
• Web-Site Mirroring
• Doxing
12
Need of Cuber Security
Process of Gathering and discharging Personally Identifiable information To
gather information using sources on the internet
Key Techniques Used
Phishing – attempt to obtain sensitive information, like bank account
information or an account password, by posing as an honest entity in an
electronic communication You get an email that looks like it comes from your
bank, credit card company, etc. Asking you to "update their records" may be
due to potential scams, or other reasons Provides a hyperlink to a web page
where you enter your personal information The link takes you to a thief's
website that is disguised to look like the company's
Most common security mistakes :
Information Security Responsibilities
• Employ Information Security teams to support the line of business,
enabling secure solutions for new techniques and technology
• Work with Information Security teams RISO, RISI to the driveline of
business-specific information security metrics reporting
• Support Regional Information Security teams in mitigating security
threats from Internal Audit report discoveries
• Follow business continuity plans given by the bank, in case of any disaster/
emergency.
• Report Security Breaches and security incidents
• Stick to Bank's Information Security Policy and guidelines
• Maintain and update the Asset register of your office/dept
• Extend support to RISO during Risk Assessment and Business Impact
Analysis of your office/dept.
• Execute and act in accordance with the organization's information security
policies and procedures
•Protect assets from unauthorized access, disclosure, modification, destruction,
or interference
13
Need of Cuber Security
• Execute defined security processes or activities
•Report security events, potential events, or other security risks by following
approved processes
•Do not use systems or access information without authorization
• Adheres to controls put in place to protect assets.
Standards & Regulations
• ISO 27001 (Information Security Management System)
• ISO 22301 (Business Continuity Management System)
• PCI- DSS (Payment Card Industry - Data Security Standard)
• IT Act 2000 & ITAA 2008 (Information Technology Act, India)
• RBI Guidelines (Reserve Bank of India)
Micro-Project Proposal-A
❖ Project Problem Statement/title:- Need of cyber Security
1.0 Brief Introduction: The term cyber security is utilized to refer to the
security offered through online services to guard your online information.
Cyber Security and Information Security differ only in their response and
Reduction/Prevention. Cyber security encompasses all aspects of security
viz., Physical, Technical, Environmental, Regulations, and Compliance
including Third Parties involved in delivering an objective With an
increasing quantity of people getting connected to the Internet, the security
threats that generate massive harm are growing also.
2.0 Aim of the Micro-Project : Advancements and applications of
Computer Engineering and Information Technology are ever-changing.
Emerging trends aim at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer
14
Need of Cuber Security
Engineering and Information Technology. These are some emerging areas
expected to generate revenue, increase demand for IT professionals, and
open avenues for entrepreneurship..
3.0 Action Plan:--
Sr Details of Planned Time Name of
No activity Start
Responsible
. Date
team member
1. Finalising the Topic 28/01/24 05 pm -06 By All Members
and Allotment of pm
Work.
2. Collecting 03/02/24 06 pm – Verified by All
Information on 08 pm
respective topic
3. Study on the 06/02/24 05 pm – By All Members
information of topic. 06 pm
4. Report Generation 26/02/24 05 pm – By All Members
06 pm
5. Final submission /03/24 07 pm – 08 Verified by All &Submitted
pm
4.0 Resources required :-
Sr.N Name of Specification Quantity Remark
o. Resources/mate
rial
1. Computer System Processor i7
12 GB RAM,
2. Operating system Windows 11
OS
3. Web Browser Google Chrome
15
Need of Cuber Security
Micro-Project Proposal-B
❖ Project Problem Statement/title:- Need of Cyber Security
16
Need of Cuber Security
1.0 Course outcome : Advancements and applications of Computer
Engineering and Information Technology are ever-changing. Emerging trends
aim at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer
Engineering and Information Technology. These are some emerging areas
expected to generate revenue, increase demand for IT professionals, and open
avenues for entrepreneurship
2.0 Brief Introduction : The term cyber security is utilized to refer to the
security offered through online services to guard your online information.
Cyber Security and Information Security differ only in their response and
Reduction/Prevention. Cyber security encompasses all aspects of security
viz., Physical, Technical, Environmental, Regulations, and Compliance
including Third Parties involved in delivering an objective With an
increasing quantity of people getting connected to the Internet, the security
threats that generate massive harm are growing also.
3.0 Aim of the Micro-Project : Advancements and applications of
Computer Engineering and Information Technology are ever-changing.
Emerging trends aim at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer
Engineering and Information Technology. These are some emerging areas
expected to generate revenue, increase demand for IT professionals, and
open avenues for entrepreneurship...
4.0 Resources required :-
Sr.No. Name of Specification Quantity Remark
Resources/mate
rial
1. Computer System Processor i7
12 GB RAM,
17
Need of Cuber Security
2. Operating system Windows 11
OS
3. Web Browser Google Chrome
5.0 Skill Developed/learning out of this Micro-Project:
a) After working on the allotted microproject topic, I gained various skills
like working in team, making coordination between team members.
b) This project also made me increase my observational skills.
c) The information collected about the cyber security.
d) Such project work increases our knowledge other from the regular course
work
6.0 CONCLUSION
Cybersecurity is crucial because it defends all categories of data from
theft and damage. This contains sensitive data, personally identifiable data
(PII), protected health information (PHI), personal information, intellectual
property, data, and governmental and industry information systems
Micro-project evaluation sheet
Ro Student Enroll Process Product Total
18
Need of Cuber Security
ll Name m ent Assessm Assessme Mar
no. number ent nt ks
(10)
Part Project Part Individual
A- Methodo B- Presentation
Project l ogy Project /Viva
Propas (2) report/ (4)
o al working
(2) model
(2)
Comments about team work/leadership/inter-personal
communication (if any):
________________________________________________________________
____________________________________________________
Any Other Comment:
________________________________________________________________
____________________________________________________
Name and designation of the faculty member:
Prof. (Micro-Project Guide)
Signature: ____________________
Logbook of the Student (Weekly Work Report)
Academic Year: 2023-2024
19
Need of Cuber Security
Name of Students :
Title of the Project : Need of Cyber security.
Course : CO6I Course-code: 22618 semester: 6I
(Name & Signature of faculty)
20