MGT_61
MGT_61
EDUCATION,MUMBAI
GOVERNMENT POLYTECHNIC,BEED
[Institute Code:0032 ]
MICROPROJECT
Seal of
institute
Rol Enrollmen
l Name of Title of Microproject
t No. Student
No.
210032006
Kokare Pooja Motiram Study of measures to
1. 8
be taken for cyber
security
Seal of
institute
Teacher Evaluation Sheet
Name of Student: Kokare Pooja Motiram Enrollment
No._210032068 Programme: Computer Technology Semester: CM6I
Course Title & Code: MGT[22509] Roll no: _314
[A] Process and Product Assessment (Convert total marks out of 06)
1
Relevance to the course
2 Literature
Review/information
collection
3 Completion of the Target as
per project proposal
4
Analysis and data
representation
5
Quality of Prototype/Model
6
Report Preparation
Total Marks Out of
(6)
[B] Individual Presentation/Viva (Convert total marks out of 04)
1
Presentation
2
Viva
Total Marks Out of
(4)
MIcro-Project Evaluation Sheet
Process and Product Total
Assessment (6 marks) Individual Mark
(Note: The total marks taken from the above Presentation/Viv s 10
Rubrics
a (4 marks)
is to be converted in proportion of ‘6’ marks)
Dated Signature……………………………………………………………………
Annexure –I
Part – A Micro-Project Proposal
(Format for Micro-Project Proposal A about 2-3 pages)
Title of Micro-Project:
Study of measures to be taken for cyber security
1.0 Aims/Benefits of the Micro-Project (minimum 30-50 words)
The goal of cyber security is to ensure storage, control access, and prevent
unauthorized processing, transfer, or deletion of data.
5.0 Action Plan (Sequence and time required for major activity)
Planned Name of
Sr. Planned
Details of activity Finish Responsible Team
No. Start date
date Members
1 Collecting different formats 05/01/2024 15/01/2024
2 Finalization of formats in collaboration 20/01/2024 29/01/2024
3 Finalizing topic title 02/02/2024 15/02/2024
Listing stationary items required for project Kokare Pooja
4 29/02/2024 05/03/2024
along with budget Motiram
Discussion of budget in group and finalize the
5 14/03/2024 25/03/2024
amount
6 Information collection by each group member 30/03/2024 06/04/2024
7 Report writing/Printing 23/04/2024 30/04/2024
6.0 Resources (major resources such as raw material, some machining
facility,
software etc.)
S.
Q Remar
No Name of Resource/material Specifications
t ks
.
y
1
Computer,Mobile,Internet,Printer,Sc
PC 01
anne r
2
Text book,Youtube,google Techmax,www.youtube.com,www.goog
-
le.co.i n
Annexure – II
Part – B Micro-Project Report
(Outcomes after Execution) Format for Micro-Project Report (Minimum 6 pages)
Title of Micro-Project:
Study of measures to be taken for cyber security
1.0 Rationale
An engineer has to work in industry with human capital and machines.
This course is there for designed to provide the basic concept in
management safety aspects and industrial Acts.
3.0 Course Outcomes Achieved (Add to the earlier list if more COs are
addressed)
a) A of safety management in all activity apply principles
Cyber security is a discipline that covers how to defend devices and services from electronic attacks by
nefarious actors such as hackers, spammers, and cybercriminals. While some components of cyber
security are designed to strike first, most of today's professionals focus more on determining the best way to
defend all assets, from computers and smartphones to networks and databases, from attacks.
Cyber security has been used as a catch-all term in the media to describe the process of protection against
every form of cybercrime, from identity theft to international digital weapons. These labels are valid, but
they fail to capture the true nature of cyber security for those without a computer science degree or
experience in the digital industry.
Cisco Systems, the tech conglomerate specializing in networking, the cloud, and security, defines cyber
security as “…the practice of protecting systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.”
In today’s digital world, one cannot ignore cybersecurity. One single security breach can lead to exposing
the personal information of millions of people. These breaches have a strong financial impact on the
companies and also loss of the trust of customers. Hence, cyber security is very essential to protect
businesses and individuals from spammers and cyber criminals.
According to Forbes, 2022 will present us with a pack of diverse and terrifying cyber security challenges,
everything from supply chain disruption to increased smart device risks to a continued cyber security talent
drought.
According to Cybercrime Magazine, cybercrime will cost the world $10.5 trillion annually by 2025!
Furthermore, global cybercrime costs are predicted to rise by almost 15 percent yearly over the next four
years.
Concepts such as the pandemic, cryptocurrency, and the rise in remote working are coming together to
create a target-rich environment for criminals to take advantage of.
Big organizations with ample amounts of valuable data are not the lone targets in the cyber
world, and security breaches happen to small and medium enterprises as well as to normal
individuals. Cyber security is equally important to everybody, as anyone can be a target.
Enterprises nowadays developed protocols and segregate best cyber security practices
for cyber security measures essentially into two different categories:
1. Secure Configuration
Removal of or disabling of redundant functionality from systems and rapidly fixing known
weaknesses or vulnerabilities through patching.
2. Network Security
3. Malware Prevention
Malicious Software or malware is an umbrella term to cover any code or content that could
have
a malicious, adverse impact on systems. Any altercation of information carries with it a
degree of risk that malware might be substituted. This could seriously impact the
organization's systems and services. The risk may be reduced by developing and
implementing appropriate anti-malware tools.
All users should be provided with an appropriate level of system privileges and rights as per
their roles and responsibilities. The granting of privileged access should be carefully
measured and managed. A periodical user access review should be in the scope of the IT
Audit.
All digital assets should be hardened from all possible data loss and credential theft. An
IT Policy to control all access to removable media, limiting media types and their
usage. A periodical scan and access log review for all media before importing data
onto the systems.
6. Virtual Private Network (VPN) for Work from Home (WFH) Employees
The prime importance of a VPN is that it hides IP addresses which essentially restricts attackers
from performing a DDoS attack. VPN encrypts web traffic by creating a tunnel between the
computer and the network, which hides activities from the Internet Service Provider (ISP).
7. User Education, Awareness, and Training
Users have a vital role to play in their organization's security posture. It is an essential
measure to educate employees with respect to cyber threats and data leakage to ensure
employees can do their job as well as help to keep the organization secure.
Cyber Crime:
Cybercrime encompasses a wide range of criminal activities that are carried out
using digital devices and/or networks. These crimes involve the use of technology
to commit fraud, identity theft, data breaches, computer viruses, scams, and
expanded upon in other malicious acts.
Cybercriminals exploit
The World Economic Forum’s 2023 Global Risks Report ranks cybercrime as one of the
top 10 risks facing the world today and for the next 10 years. [6] If cybercrime were
viewed as a nation state, cybercrime would count as the third largest economy in the
world.[7] In numbers, cybercrime is predicted to cause over 9 trillion in damages
worldwide in 2024.
6.0 Actual Resources Used (Mention the actual resources used).
S. Name of
No. Resource/material Specifications Qty Remarks
1 Computer,Mobile,Internet,Pri PC 01
nter
2 Techmax,www.youtube.com,www.google -
Text book,Youtube,google .co.in
Through this microproject the following things are learnt and the skill developed by the group
1. The concept of project understood.
2. The structure and requirement of proposal and report understood.
3. The necessity of team work is understood.
4. What is the role of group leader and team member? It well understood.
5. The importance of time management and good communication skill is understood.
6. How to search information and use of different online tools came to know.
7. The writing in English skill is developed.
8. The new words are collected.
9. The computer access skill is developed.
10. Able to tackle and solve the problem arised due to miscommunication and misunderstanding.
11. The decision making ability is developed but needed good cooperation.
9.0 Conclusion
In conclusion, cybercrime is a serious threat to our society, and it is essential to take
steps to protect ourselves and our organizations. By understanding the different types
of cybercrime and their impact, we can take proactive measures to stay safe online
and prevent cyber attacks.