NIS Micro Project 1
NIS Micro Project 1
MICRO PROJECT
Academic year: 2020-21
COMPUTING SECURITY
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. GHODE AJIT G. Roll No. 1551 of 6th Semester of Diploma in
Information Technology of Institute, GOVERNMENT POLYTECHNIC NANDED has
completed the Micro Project satisfactorily in Subject –NIS(22620) for the academic
year 2020- 2021 as prescribed in the curriculum.
Place: Nanded
ANEEXURE II
Evaluation Sheet for the Micro Project
Academic Year: 2020-21 Name of the Faculty: Mr.S. N. DHOLE
SIR
(Signature of Faculty)
Mr. S. N. DHOLE SIR.
SR.NO.
CONTENT PAGE NO.
1 Introduction
3
Computers Security importance
1. TO PROTECT PERSONAL
INFORMATION
2. TO PROTECT ORGANIZATION
PROPERTIES
3. TO PREVENTION FROM DATA THEFT
4. TO PREVENT FROM VIRUSES AND
MALWARE
Conclusion
5
Introduction
Computer security, cybersecurity or information
technology security (IT security) is the protection of
computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic
data, as well as from the disruption or misdirection of the
services they provide
7) Viruses
.
Computer virus is a malicious program which is loaded
into the user’s computer without user’s knowledge. It
replicates itself and infects the files and programs on the
user’s PC. The ultimate goal of a virus is to ensure that the
victim’s computer will never be able to operate properly or
even at all.
2)Computer Worm
3)Phishing
4)Botnet
5)Rootkit
6)Keylogger
COMPUTER SECURITY
IMPORTANT?
1. TO PROTECT PERSONAL
INFORMATION
2. TO PROTECT ORGANIZATION
PROPERTIES
It is very important to ensure the organization’s
computer data because every organization has many sensitive
assets and information. So, without computer or IT security
you can’t guarantee the security of organization properties.
TYPES OF COMPUTER
SECURITY
In this post, we will focus on the different types of
computer security such as application security, network
security, internet security, data security, information security
and end user security.
1. APPLICATION SECURITY
Application security is the types of cyber security which
developing application by adding security features within
applications to prevent from cyber attacks. The attacks can be
SQL injection, denial of service (DoS) attacks, data breaches
or other cyber-attacks.
There are some application security tools and techniques
such as firewalls, antivirus software, encryption, and web
application firewall which can help to prevent from
cyber-attacks.
A web application firewall is designed to protect web
applications by filtering and monitoring HTTP harmful
traffic. Here are the most used Web Application Firewalls
are:
Fortinet FortiWeb
Citrix NetScaler App Firewall
F5 Advanced WAF
Radware AppWall
Symantec WAF
Barracuda WAF
Imperva WAF
Sophos XG Firewall
SonicWallNSa
2. INFORMATION SECURITY
Information security (IS) is the types of computer
security which refers to the process and methodology to
protect the confidentiality, integrity and availability of
computer system from unauthorized access, use, modification
and destruction.
3. NETWORK SECURITY
Network security is other types of IT security which
process of preventing and protecting against unauthorized
intrusion into computer networks.
It is a set of rules and configurations which designed to
protect the confidentiality, integrity and accessibility of
computer networks system and information using both
software and hardware technologies.
4. ENDPOINT SECURITY
Human error is a major weak point which is easily
exploited by cyber criminals. End users are becoming the
largest security risk in any organizations.
5. INTERNET SECURITY
Internet security is the important types of computer
security which has defined as a process to create set of rules
and actions to protect computers system that are connected to
the Internet.
CONCLUSION
Now that you have completed this webquest on
Computer Security you are now aware of the possible
security treats to computer systems. Not only that, but you
are now better ableto protect your computers as well as
recommendsecuritymeasures to others.
Have you ever heard the terms Computer Virus, worms,
Trojans, Cybercrime, hackers?
Putting your computer in a bank vault with security
officers with shot guns and Rin-tin-tin will not protect
yourcomputer’s data.
To protect your data you will have to incorporate the use
of special Data Security software along with the Physical
Security methods you have learned.
Have a look at Computer Security Threats as it relates to
data security.