0% found this document useful (0 votes)
283 views

Nis Project

This document is a certificate from the Maharashtra State Board of Technical Education certifying that student Sneha Nandkishore Upadhyay of roll number 27 has satisfactorily completed a micro project on "Network Security and Cryptography" for the academic year 2024-2025. The certificate is signed by the subject teacher, head of the department, and principal of Dr. D. Y. Patil School of Engineering. The following pages contain an index and details of the micro project, including introductions to cryptography and network security, their importance, applications, and a conclusion.

Uploaded by

workwithsnehh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
283 views

Nis Project

This document is a certificate from the Maharashtra State Board of Technical Education certifying that student Sneha Nandkishore Upadhyay of roll number 27 has satisfactorily completed a micro project on "Network Security and Cryptography" for the academic year 2024-2025. The certificate is signed by the subject teacher, head of the department, and principal of Dr. D. Y. Patil School of Engineering. The following pages contain an index and details of the micro project, including introductions to cryptography and network security, their importance, applications, and a conclusion.

Uploaded by

workwithsnehh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

DR. D. Y. PATIL SCHOOL OF ENGINEERING

(SECOND SHIFT POLYTECHNIC)

MICRO PROJECT
Academic year: 2024 - 2025

TITLE OF THE PROJECT

Network Security and Cryptography

Program: ___________________ Program code: ______


Course: ___________________ Course code: ______
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Certificate

This is to certify that the following students -


Roll No. Name of the students Exam seat number

27 Sneha. Nandkishore. Upadhyay


of Diploma in Artificial Intelligence and Machine Learning of Institute, Dr. D. Y. Patil School
of Engineering (Third Shift Polytechnic) Institute Code – 1649, has completed the Micro

Project satisfactorily in Subject -


Network and information security for the academic year 2024- 2025 as prescribed in the
curriculum.
Place: ______________ Date: _______________

Subject Teacher Head of the Department Principal


INDEX

SR.NO. CONTENT PAGE NO.

INTRODUCTION
1

CRYPTOGRAPHY
2

NETWORK SECURITY
3

IMPORTANCES OF NETWORK SECURITY


4 CRYPTOGRAPHY

IMPORTANCES OF CRYPTOGRAPHY
5

6 IMPORTANCES OF NETWORK SECURITY

7 APPLICATIONS OF NETWORK SECURITY AND


CRYPTOGRAPHY

8 CONCLUSION
INTRODUCTION
Cryptography and Network Security:
Cryptography is a term used in data communication that refers to
protecting the private information shared between two parties.
Network Security refers to securing and protecting the network and
data to ensure the confidentiality of data.
Do you ever wonder how your sensitive information, such as
passwords or credit card numbers, is kept secure while transmitted
over the internet? The answer lies in the field of cryptography and
network security. Cryptography involves using mathematical
algorithms to convert plain text into an unreadable format, known as
ciphertext. Network security, on the other hand, focuses on protecting
the communication channels through which this information is
transmitted.
WHAT IS CRYPTOGRAPHY?

➢ Cryptography generally deals with the study and practice of


techniques for ensuring secure communication between two
parties in the presence of a third party called adversaries.
➢ The goal of cryptography is to ensure that the contents of a
message remain confidential, authentic, and tamper-proof.
➢ Cryptography is used in various applications, including secure
online communication, electronic commerce, digital signatures,
password protection, and data privacy. It is an essential
component of modern-day security systems and critical for
protecting sensitive information from unauthorized access and
theft.
• Below image to visualize the encryption process

Let us understand cryptography with the help of an example. As we


see in the above figure sender wants to send a "hello" message and
encryption is done on the sender to convert the sender's message into
an unreadable format (cipher text) using the encryption key.
The message of the sender also known as plain text is converted into
an unreadable form by using a key ‘k’, that unreadable resultant text is
called cipher text. And this whole process is known as encryption.
At the receiver side cipher text is received and that cipher text is again
converted into plain text using the decryption key.
WHAT IS NETWORK SECURITY
➢ Network security refers to the practice of protecting Computer
Networks from unauthorized access, misuse, modification, or
destruction. It involves using various technologies, processes, and
policies to safeguard network resources' confidentiality, integrity,
and availability.
➢ The main goal of network security is to prevent unauthorized
access to network resources, such as data, applications, and
devices. This is achieved by implementing various security
measures, including firewalls, intrusion detection and prevention
systems, access controls, encryption, and virtual private networks
(VPNs).
➢ Network security also involves monitoring and analyzing
network traffic to detect and respond to potential security threats.
This is often done through security information and event
management (SIEM) systems, which collect and analyze
security-related data from across the network.

• Below image to show the network security model:


Importance of Cryptography
Cryptography is very important for protecting private information
from third-party access. Some of the importance of cryptography are
given below:

• For secure communication, data transmission, and transactions.


• To safeguard personal information
• To ensure data confidentiality
• For the protection of data from unauthorized access.
• To authenticate the source of data
• To establish trust between two communicating parties.
Cryptography provides above all features by converting the sender
message into an unreadable format while transmitting over the
network so that it cannot be accessed by any unauthorized user.
Importance of Network Security
• To protect sensitive information safe from cyber-attacks.
• This is important to secure sensitive data safe from cyber attacks
and to ensure that the network is usable and can be trusted
• Network security protects the data of the client by ensuring that
hackers cannot get into your network easily.
• Network security also improves the performance of the network
by ensuring that the system is not slowed down due to redundant
tools and data.
• To protect the network from a ransomware attack. Ransomware is
a common type of attack that blocks access to your data until you
pay the ransom.

Applications of Cryptography and Network Security

Cryptography Applications
• Authentication/Digital Signatures
• Time Stamping
• Electronic Money
• Encryption/Decryption in email
• WhatsApp Encryption
• Instagram Encryption
• Sim card Authentication
Network Security Applications
• Protection of network.
• Protection from intrusions.
• To protect from threats.
• Protection of data from breaches
CONCLUSION
• Cryptography and network security are two of the networking
terms used for the protection and security of data and networks.
• Cryptography is used to protect the private information shared
between two communicating parties from a third party.
• Confidentiality, Data Integrity, Authentication, and Non-
Repudiation are the main principles of cryptography.
• Network security is the actions taken or procedures followed to
protect the computer network.
• Cryptography ensures data confidentiality and provides data
protection from unauthorized access.
• Network security protects the sensitive data of clients and it
protects the network from ransomware.
Dr. D Y Patil Educational Enterprises Charitable Trust’s
Dr. D. Y. PATIL SCHOOL OF ENGINEERING,
(POLYTECHNIC)
Approved by AICTE NO. West / 1-3847411/2010/ New Dated 13 July
2010/DTE/Affiliated to MSBTE, Mumbai.
Dr. D Y Patil Knowledge City, Charholi Bk, Via Lohegaon, Pune –
412105

Annexure - I

MICRO-PROJECT PROPOSAL
Title of Micro-project: _________________________
______________________________________________

1.0 Aims/Benefits of the Micro-project –


_______________________________________________________________________
_______________________________________________________________________

2.0 Course Outcomes Addressed –


_______________________________________________________________________
_______________________________________________________________________

3.0 Proposed Methodology –


_______________________________________________________________________
_______________________________________________________________________

4.0 Action Plan –

Planned Name of
Sr. Planned Start Finish responsible Team
Details of Activity
No. Date
Date Members
1 Discussion and finalization
of topic

2 Preparation and submission


of abstract
3 Literature Review
4 Collection of data
5 Collection of data
6 Discussion and outline of
content

7 Formulation of content
8 Editing of content
9 Editing of content
10 Proof reading of content
11 Compilation of report
12 Compilation of report
13 Presentation
14 Seminar
15 Viva voce
16 Final submission of
microproject

5.0 Resources Required –

Sr. Name of
No. Resource/material Specifications Quantity Remarks

Names of Team Members with Roll nos.


1. Sneha Upadhyay (27)
________________________
(Name and Signature of Subject Teacher)
Dr. D Y Patil Educational Enterprises Charitable Trust’s
Dr. D. Y. PATIL SCHOOL OF ENGINEERING, (POLYTECHNIC)
Approved by AICTE NO. West / 1-3847411/2010/ New Dated 13
July 2010/DTE/Affiliated to MSBTE, Mumbai.
Dr. D Y Patil Knowledge City, Charholi Bk, Via Lohegaon, Pune – 412105

Annexure - II

MICRO-PROJECT REPORT
Title of Micro-project: _________________________
______________________________________________

6.0 Rationale –
_______________________________________________________________________
_______________________________________________________________________

7.0 Aim/Benefits of the Micro-project –


_______________________________________________________________________

_______________________________________________________________________

8.0 Course Outcomes Achieved –


_______________________________________________________________________

_______________________________________________________________________

9.0 Literature Review –

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
10.0 Actual Methodology Followed

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

11.0 Actual Resources Required –

Sr. Name of
No. Resource/material Specifications Quantity Remarks

12.0 Outputs of the Micro-Projects

13.0 Skill Developed/Learning outcome of this Micro-Project


_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

14.0 Applications of this Micro-Project


_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

________________________
(Name and Signature of Subject Teacher)

You might also like