100% found this document useful (1 vote)
194 views

NIS Micro Project 1

The document discusses computing security and related topics. It provides an introduction to computer security, describes common security threats like viruses, worms, phishing, botnets and rootkits. It also discusses the importance of computer security and different types of computer security like application security, information security, network security, endpoint security and internet security.

Uploaded by

Tanmay Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
194 views

NIS Micro Project 1

The document discusses computing security and related topics. It provides an introduction to computer security, describes common security threats like viruses, worms, phishing, botnets and rootkits. It also discusses the importance of computer security and different types of computer security like application security, information security, network security, endpoint security and internet security.

Uploaded by

Tanmay Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

lOMoARcPSD|37125375

Microproject NIS - Information security project

Computer Science (Anna University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Tanmay Rajput ([email protected])
lOMoARcPSD|37125375

GOVERNMENT POLYTECHNIC, NANDED

MICRO PROJECT
Academic year: 2020-21

TITLE OF THE PROJECT

COMPUTING SECURITY

Program: Information Tech. Program code: IF6I


Course: NIS Course code: 22620

Name of Guide: - Mr. S. N. Dhole Sir

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. GHODE AJIT G. Roll No. 1551 of 6th Semester of Diploma in
Information Technology of Institute, GOVERNMENT POLYTECHNIC NANDED has
completed the Micro Project satisfactorily in Subject –NIS(22620) for the academic
year 2020- 2021 as prescribed in the curriculum.

Place: Nanded

Date: ……………………… Exam. Seat No: ………………...........

Subject Teacher Head of the Department Principal


Mr. S. N. DHOLE SIR Mr. S.N DHOLE SIR DR. G.V. GARJE SIR

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

WEEKLY PROGRESS REPORT

TITLE OF THE MICRO PROJECT:- COMPUTING SECURITY

WEEK ACTIVITY PERFORMED SIGN OF GUIDE DATE


1ST
Discussion and finalization of Topic
2ND Discussion and finalization of Topic
3RD Preparation and submission of Abstract
4TH Literature Review
5TH Collection of Data
6TH Collection of Data
7TH Collection of Data
8TH Collection of Data
9TH Discussion and Outline of Content
10TH Formulation of Content
11TH Editing and 1st Proof Reading of Content
12TH Editing and 2nd Proof Reading of Content
13TH Compilation of Report and Presentation
14TH Seminar
15TH Viva-voce
16TH Final submission of Micro project

Sign of the student Sign of the faculty

GHODE AJIT G.(1551)- Mr. S. N. DHOLE SIR

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

ANEEXURE II
Evaluation Sheet for the Micro Project
Academic Year: 2020-21 Name of the Faculty: Mr.S. N. DHOLE
SIR

Course: NIS Course code: 22620 Semester: VI

Title of the project: COMPUTING SECURITY

Cos addressed by Micro Project:


A: Study of Computer security
B: Study of network security

(a) Practical outcome:


Study of computer security
(b) Unit outcomes in Cognitive domain:
1) Study of Infomation security
2) Study of Network security

(c) Outcomes in Affective domain:


1) Follow safety practices.
2) Practice good housekeeping.
3) Demonstrate working as a lead 1 team member.
4) Maintain tools and equipment.
5) Follow ethical practices.

Marks out of 4 for Marks out of 2for


performance in performance in oral/
Roll Student Name group activity presentation Total out of 06
No (D5 Col.8) (D5 Col.9)
1551 Ghode Ajit G.

(Signature of Faculty)
Mr. S. N. DHOLE SIR.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

SR.NO.
CONTENT PAGE NO.

1 Introduction

2 Computer security threats


1) Viruses
2) Worm
3) Phishing
4) Botnet
5) Rootkit
6) Keylogger

3
Computers Security importance
1. TO PROTECT PERSONAL
INFORMATION
2. TO PROTECT ORGANIZATION
PROPERTIES
3. TO PREVENTION FROM DATA THEFT
4. TO PREVENT FROM VIRUSES AND
MALWARE

4 Types of computer security


1. APPLICATION SECURITY
2. INFORMATION SECURITY
3. NETWORK SECURITY
4. ENDPOINT SECURITY
5.INTERNET SECURITY

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

Conclusion
5

Introduction
Computer security, cybersecurity or information
technology security (IT security) is the protection of
computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic
data, as well as from the disruption or misdirection of the
services they provide

. The field is becoming increasingly significant due to the


increased reliance on computer systems, the Internet and
wireless network standards such as Bluetooth and Wi-Fi, and
due to the growth of "smart" devices, including smartphones,
televisions, and the various devices that constitute the
"Internet of things". Owing to its complexity, both in terms of

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

politics and technology, cybersecurity is also one of the major


challenges in the contemporary world.
Computer security, the protection of computer systems
and information from harm, theft, and unauthorized use.
Computer hardware is typically protected by the same means
used to protect other valuable or sensitive equipment, namely,
serial numbers, doors and locks, and alarms. The protection
of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex.
The security precautions related to computer
information and access address four major threats: (1) theft of
data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data
by a computer virus; (3) fraud, such as employees at a bank
channeling funds into their own accounts; and (4) invasion of
privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most
basic means of protecting a computer system against theft,
vandalism, invasion of privacy, and other irresponsible
behaviours is to electronically track and record the access to,
and activities of, the various users of a computer system. This
is commonly done by assigning an individual password to
each person who has access to a system. The computer
system itself can then automatically track the use of these
passwords, recording such data as which files were accessed
under particular passwords and so on. Another security

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

measure is to store a system’s data on a separate device, or


medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is
often encrypted so that it can be deciphered only by holders
of a singular encryption key. (See data encryption.)

Computer security threats


. Computer security threats are possible dangers that can
possibly hamper the normal functioning of your computer. In
the present age, cyber threats are constantly increasing as the
world is going digital. The most harmful types of computer
security are:

7) Viruses

.
Computer virus is a malicious program which is loaded
into the user’s computer without user’s knowledge. It
replicates itself and infects the files and programs on the
user’s PC. The ultimate goal of a virus is to ensure that the
victim’s computer will never be able to operate properly or
even at all.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

2)Computer Worm

. Computer worm is a software program that can copy


itself from one computer to another, without human
interaction. The potential risk here is that it will use up your
computer hard disk space because a worm can replicate in
greate volume and with great speed.

3)Phishing

. Disguising as a trustworthy person or business, phishers


attempt to steal sensitive financial or personal information
through fraudulent email or instant messages. Phishing in
unfortunately very easy to execute. You are deluded into
thinking it’s the legitimate mail and you may enter your
personal information.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

4)Botnet

. Botnet is a group of computers connected to the internet,


that have been compromised by a hacker using a computer
virus. An individual computer is called ‘zombie computer’.
The result of this threat is the victim’s computer, which is the
bot will be used for malicious activities and for a larger scale
attack like DDoS.

5)Rootkit

Rootkit - is a computer program designed to provide


continued privileged access to a computer while actively
hiding its presence. Once a rootkit has been installed, the

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

controller of the rootkit will be able to remotely execute files


and change system configurations on the host machine.

6)Keylogger

Also known as a keystroke logger, keyloggers can track


the real-time activity of a user on his computer. It keeps a
record of all the keystrokes made by user keyboard.
Keylogger is also a very powerful threat to steal people’s
login credential such as username and password.
These are perhaps the most common security threats that
you’ll come across. Apart from these, there are others like
spyware, wabbits, scareware, bluesnarfing and many more.
Fortunately, there are ways to protect yourself against these
attacks.

COMPUTER SECURITY
IMPORTANT?

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

Computers are very essential part of our daily lives and


it plays important roles in our lives. So, the security of a
computer is important because it protects your information
and helps to prevent from viruses and malware. In this post,
we will discuss on why is computer security important of our
lives.
Computer security is also known as cyber security or IT
security which mainly used for protection of computer
system such as hardware and software.

WHY IS COMPUTER SECURITY


IMPORTANT?
The main purpose of the security is the preventing and
detecting unauthorized access of computer system. It
guarantees to safe processing and storage of business,
healthcare and sensitive information. Cyber security provides
the Confidentiality, Integrity and Availability for all
components of a computer system.

Here are the some reasons why is computer security


important:

1. TO PROTECT PERSONAL
INFORMATION

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

To prevent from cyber security risk you have to protect


your personal information. IT security is the first prime issue
to protect your personal and others information. By the way
you can keep your information secure using the following
tips:
● Use antivirus Software
● Update operating system
● Use strong password
● Backup your data
● Lock your computer
● Avoid Phishing Emails
● protect your personal information

2. TO PROTECT ORGANIZATION
PROPERTIES
It is very important to ensure the organization’s
computer data because every organization has many sensitive
assets and information. So, without computer or IT security
you can’t guarantee the security of organization properties.

3. TO PREVENTION FROM DATA THEFT


Data theft is act of stealing sensitive information such as
bank account details, credit card information, passwords, and
documents which stored on computers, servers, or other

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

devices. The most common reasons of data breaches are as


follows:
● Weak and stolen credentials
● Malicious insiders
● Application vulnerabilities
● Human Error
So, prevent from data theft you have to ensure your
device security by using endpoint security, lock down your
computer, Identify critical data and use authentication.

4. TO PREVENT FROM VIRUSES AND


MALWARE
Computer security is also important to protect from
computer viruses and malware’s. A computer virus or
malware can corrupt or delete your sensitive data, damage
your hard disk and it spreads from one computer to another
using email program and others. So, you have to protect your
computer from viruses and malware using following these
tips:
● Keep your software up to date
● Use free antivirus software
● Use a strong password
● Don’t click on links within emails
● Back up your computer
● Use a pop-up blocker

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

TYPES OF COMPUTER
SECURITY
In this post, we will focus on the different types of
computer security such as application security, network
security, internet security, data security, information security
and end user security.

1. APPLICATION SECURITY
Application security is the types of cyber security which
developing application by adding security features within
applications to prevent from cyber attacks. The attacks can be
SQL injection, denial of service (DoS) attacks, data breaches
or other cyber-attacks.
There are some application security tools and techniques
such as firewalls, antivirus software, encryption, and web
application firewall which can help to prevent from
cyber-attacks.
A web application firewall is designed to protect web
applications by filtering and monitoring HTTP harmful
traffic. Here are the most used Web Application Firewalls
are:

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

Fortinet FortiWeb
Citrix NetScaler App Firewall
F5 Advanced WAF
Radware AppWall
Symantec WAF
Barracuda WAF
Imperva WAF
Sophos XG Firewall
SonicWallNSa

2. INFORMATION SECURITY
Information security (IS) is the types of computer
security which refers to the process and methodology to
protect the confidentiality, integrity and availability of
computer system from unauthorized access, use, modification
and destruction.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

Information security focuses on the CIA triad model,


which ensure confidentiality, integrity, and availability of
data, without affecting organization productivity.

3. NETWORK SECURITY
Network security is other types of IT security which
process of preventing and protecting against unauthorized
intrusion into computer networks.
It is a set of rules and configurations which designed to
protect the confidentiality, integrity and accessibility of
computer networks system and information using both
software and hardware technologies.

NETWORK SECURITY METHODS

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

There are different components or methods to improve


network security. Here, we have mentioned the most common
network security components.
Antivirus Software
Application Security
Behavioral Analytics
Data Loss Prevention (DLP)
Email Security
Firewalls
Mobile Device Security
Network Segmentation
Security Information and Event Management (SIEM)
Virtual Private Network (VPN)
Web Security
Wireless Security
Network Access Control (NAC)

4. ENDPOINT SECURITY
Human error is a major weak point which is easily
exploited by cyber criminals. End users are becoming the
largest security risk in any organizations.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

However, end user has no fault of their own, and mostly


due to a lack of awareness and ICT policy. They can
unintentional open the virtual gates to cyber attackers.
That’s why comprehensive security policies, procedures
and protocols have to be understood in depth by users who
accessing the sensitive information.
It is better to providing security awareness training
program to them and should cover the following topics:
Cyber security and its importance
Phishing and Social Engineering attack
Password creation and usages
Device Security
Physical Security
Learn More About Social Engineering Attack

5. INTERNET SECURITY
Internet security is the important types of computer
security which has defined as a process to create set of rules
and actions to protect computers system that are connected to
the Internet.

Downloaded by Tanmay Rajput ([email protected])


lOMoARcPSD|37125375

CONCLUSION
Now that you have completed this webquest on
Computer Security you are now aware of the possible
security treats to computer systems. Not only that, but you
are now better ableto protect your computers as well as
recommendsecuritymeasures to others.
Have you ever heard the terms Computer Virus, worms,
Trojans, Cybercrime, hackers?
Putting your computer in a bank vault with security
officers with shot guns and Rin-tin-tin will not protect
yourcomputer’s data.
To protect your data you will have to incorporate the use
of special Data Security software along with the Physical
Security methods you have learned.
Have a look at Computer Security Threats as it relates to
data security.

Downloaded by Tanmay Rajput ([email protected])

You might also like