0% found this document useful (0 votes)
93 views

MGT_61

The microproject titled 'Study of measures to be taken for cyber security' conducted by Kokare Pooja Motiram at Government Polytechnic, Beed, focuses on understanding and implementing cybersecurity measures to protect data and systems from unauthorized access and cyber threats. The project outlines various methodologies, common and essential cybersecurity measures, and highlights the importance of user education and awareness in preventing cybercrime. It emphasizes the growing threat of cybercrime and the need for proactive measures to safeguard individuals and organizations.

Uploaded by

kavalesiddhi96
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

MGT_61

The microproject titled 'Study of measures to be taken for cyber security' conducted by Kokare Pooja Motiram at Government Polytechnic, Beed, focuses on understanding and implementing cybersecurity measures to protect data and systems from unauthorized access and cyber threats. The project outlines various methodologies, common and essential cybersecurity measures, and highlights the importance of user education and awareness in preventing cybercrime. It emphasizes the growing threat of cybercrime and the need for proactive measures to safeguard individuals and organizations.

Uploaded by

kavalesiddhi96
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION,MUMBAI

GOVERNMENT POLYTECHNIC,BEED
[Institute Code:0032 ]

MICROPROJECT

Course & Code: MGT[22509]

Title of Micro project: Study of measures to be taken for cyber


security

Subject Teacher Head of Department Principal

Seal of
institute

MAHARASHTRA STATE BOARD OF TECHNICAL


EDUCATION,MUMBAI
CERTIFICATE OF MICROPROJECT

This is to certify that following students of CM6I (Division-A/B) of


Diploma in COMPUTER ENGINEERING of the institute
GOVERNMENT POLYTECHNIC,BEED, Institute code:0032, have
satisfactorily completed MICROPROJECT work in subject/Course:

for academic year 2021-22 as prescribed in the curriculum.

Rol Enrollmen
l Name of Title of Microproject
t No. Student
No.

210032006
Kokare Pooja Motiram Study of measures to
1. 8
be taken for cyber
security

Place:Beed Date:-- /-- -/2021

Subject Teacher Head of Department Principal

Seal of
institute
Teacher Evaluation Sheet
Name of Student: Kokare Pooja Motiram Enrollment
No._210032068 Programme: Computer Technology Semester: CM6I
Course Title & Code: MGT[22509] Roll no: _314

Title of the Micro-Project: [In short]


Study of measures to be taken for cyber security
Course Outcomes:
Achieved: A of safety management in all activity apply principles

Evaluation as per Suggested Rubric for Assessment of Micro Project


Sr.
Characteristic to be assessed Poor Average Good Excellent
No. ( Marks 1 - 3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )

[A] Process and Product Assessment (Convert total marks out of 06)
1
Relevance to the course
2 Literature
Review/information
collection
3 Completion of the Target as
per project proposal
4
Analysis and data
representation
5
Quality of Prototype/Model
6
Report Preparation
Total Marks Out of
(6)
[B] Individual Presentation/Viva (Convert total marks out of 04)

1
Presentation
2
Viva
Total Marks Out of
(4)
MIcro-Project Evaluation Sheet
Process and Product Total
Assessment (6 marks) Individual Mark
(Note: The total marks taken from the above Presentation/Viv s 10
Rubrics
a (4 marks)
is to be converted in proportion of ‘6’ marks)

Name and designation of the Teacher: A.Wawre (Lecturer in CM)

Dated Signature……………………………………………………………………
Annexure –I
Part – A Micro-Project Proposal
(Format for Micro-Project Proposal A about 2-3 pages)

Title of Micro-Project:
Study of measures to be taken for cyber security
1.0 Aims/Benefits of the Micro-Project (minimum 30-50 words)
The goal of cyber security is to ensure storage, control access, and prevent
unauthorized processing, transfer, or deletion of data.

2.0 Course Outcomes Addressed

A of safety management in all activity apply principles


3.0 Proposed Methodology
“Secure-by-Design” means that technology products are built in a way that
reasonably protects against malicious cyber actors successfully gaining access to
devices, data, and connected infrastructure.
 Use strong passwords. Strong passwords are vital to good online security. ...
 Control access to data and systems. ...
 Put up a firewall. ...
 Use security software. ...
 Update programs and systems regularly. ...
 Monitor for intrusion. ...
 Raise awareness.

5.0 Action Plan (Sequence and time required for major activity)

Planned Name of
Sr. Planned
Details of activity Finish Responsible Team
No. Start date
date Members
1 Collecting different formats 05/01/2024 15/01/2024
2 Finalization of formats in collaboration 20/01/2024 29/01/2024
3 Finalizing topic title 02/02/2024 15/02/2024
Listing stationary items required for project Kokare Pooja
4 29/02/2024 05/03/2024
along with budget Motiram
Discussion of budget in group and finalize the
5 14/03/2024 25/03/2024
amount
6 Information collection by each group member 30/03/2024 06/04/2024
7 Report writing/Printing 23/04/2024 30/04/2024
6.0 Resources (major resources such as raw material, some machining
facility,
software etc.)

S.
Q Remar
No Name of Resource/material Specifications
t ks
.
y
1
Computer,Mobile,Internet,Printer,Sc
PC 01
anne r

2
Text book,Youtube,google Techmax,www.youtube.com,www.goog
-
le.co.i n

Names of Team Members with Roll Nos.

Roll No. Name of student


314 Kokare Pooja Motiram

Annexure – II
Part – B Micro-Project Report
(Outcomes after Execution) Format for Micro-Project Report (Minimum 6 pages)

Title of Micro-Project:
Study of measures to be taken for cyber security
1.0 Rationale
An engineer has to work in industry with human capital and machines.
This course is there for designed to provide the basic concept in
management safety aspects and industrial Acts.

2.0 Aims/Benefits of the Micro-Project

goal of cyber security is to ensure storage, control access, and prevent


unauthorized processing, transfer, or deletion of data.

3.0 Course Outcomes Achieved (Add to the earlier list if more COs are
addressed)
a) A of safety management in all activity apply principles

5.0 Actual Methodology Followed.

What is Cyber Security?

Cyber security is a discipline that covers how to defend devices and services from electronic attacks by
nefarious actors such as hackers, spammers, and cybercriminals. While some components of cyber
security are designed to strike first, most of today's professionals focus more on determining the best way to
defend all assets, from computers and smartphones to networks and databases, from attacks.

Cyber security has been used as a catch-all term in the media to describe the process of protection against
every form of cybercrime, from identity theft to international digital weapons. These labels are valid, but
they fail to capture the true nature of cyber security for those without a computer science degree or
experience in the digital industry.

Cisco Systems, the tech conglomerate specializing in networking, the cloud, and security, defines cyber
security as “…the practice of protecting systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.”

Why is Cybersecurity Important?

In today’s digital world, one cannot ignore cybersecurity. One single security breach can lead to exposing
the personal information of millions of people. These breaches have a strong financial impact on the
companies and also loss of the trust of customers. Hence, cyber security is very essential to protect
businesses and individuals from spammers and cyber criminals.

The Scale of the Cyber Security Threat

According to Forbes, 2022 will present us with a pack of diverse and terrifying cyber security challenges,
everything from supply chain disruption to increased smart device risks to a continued cyber security talent
drought.

According to Cybercrime Magazine, cybercrime will cost the world $10.5 trillion annually by 2025!
Furthermore, global cybercrime costs are predicted to rise by almost 15 percent yearly over the next four
years.

Concepts such as the pandemic, cryptocurrency, and the rise in remote working are coming together to
create a target-rich environment for criminals to take advantage of.

Why is Cyber Security important?

Cyber Security is imperative as digital assets are susceptible. With so much


dependency on online transactions starting from ordering groceries and other items to
accessing bank accounts and using credit cards for various activities, 75% of people
nowadays are vulnerable to cyber-attacks.

Big organizations with ample amounts of valuable data are not the lone targets in the cyber
world, and security breaches happen to small and medium enterprises as well as to normal
individuals. Cyber security is equally important to everybody, as anyone can be a target.

Enterprises nowadays developed protocols and segregate best cyber security practices
for cyber security measures essentially into two different categories:

 Common Cyber Security Measures


 Essential Cyber Security Measures
Common Cyber Security Measures

Cybercrime is constructed around the well-organized exploitation of weaknesses, and the


cyber security teams are always a hindrance because they must protect all possible
entrances while an attacker only needs to discover and exploit one weakness or
vulnerability. As described earlier, some of
the common best cyber security practices for cyber security and cyber-attack
prevention measures are as follows:

1. Secure Configuration

Removal of or disabling of redundant functionality from systems and rapidly fixing known
weaknesses or vulnerabilities through patching.

2. Network Security

Decrease the chances of existing systems and technologies being attacked by


developing and implementing simple policies and appropriate architectural and
technical responses.

3. Malware Prevention

Malicious Software or malware is an umbrella term to cover any code or content that could
have
a malicious, adverse impact on systems. Any altercation of information carries with it a
degree of risk that malware might be substituted. This could seriously impact the
organization's systems and services. The risk may be reduced by developing and
implementing appropriate anti-malware tools.

4. Managing Identity and Access Management

All users should be provided with an appropriate level of system privileges and rights as per
their roles and responsibilities. The granting of privileged access should be carefully
measured and managed. A periodical user access review should be in the scope of the IT
Audit.

5. Removable Media Control

All digital assets should be hardened from all possible data loss and credential theft. An
IT Policy to control all access to removable media, limiting media types and their
usage. A periodical scan and access log review for all media before importing data
onto the systems.
6. Virtual Private Network (VPN) for Work from Home (WFH) Employees

The prime importance of a VPN is that it hides IP addresses which essentially restricts attackers
from performing a DDoS attack. VPN encrypts web traffic by creating a tunnel between the
computer and the network, which hides activities from the Internet Service Provider (ISP).
7. User Education, Awareness, and Training

Users have a vital role to play in their organization's security posture. It is an essential
measure to educate employees with respect to cyber threats and data leakage to ensure
employees can do their job as well as help to keep the organization secure.

Cyber Crime:

Cybercrime encompasses a wide range of criminal activities that are carried out
using digital devices and/or networks. These crimes involve the use of technology
to commit fraud, identity theft, data breaches, computer viruses, scams, and
expanded upon in other malicious acts.
Cybercriminals exploit

vulnerabilities in computer systems and networks to gain unauthorized access, steal


sensitive information, disrupt services, and cause financial or reputational harm to
individuals, organizations, and governments. [1]
In 2000, the tenth United Nations Congress on the Prevention of Crime and the
Treatment of Offenders placed cyber crimes into five categories: unauthorized
access, damage to computer data or programs, sabotage to hinder the functioning of
a computer system or network, unauthorized interception of data within a system or
network, and computer espionage.[2]
Internationally, both state and non-state actors engage in cybercrimes,
including espionage, financial theft, and other cross-border crimes. Cybercrimes
crossing international borders and involving the actions of at least one nation-state
are sometimes referred to as cyberwarfare. Warren Buffett has said that cybercrime is
the "number one problem with mankind"[3] and that it "poses real risks to humanity". [4]
The World Economic Forum's 2020 Global Risks Report confirmed that organized
cybercrime groups are joining forces to commit criminal activities online, while
estimating the likelihood of their detection and prosecution to be less than 1 percent
in the US.[5] There are also
many privacy concerns surrounding cybercrime when confidential information is
intercepted or disclosed, legally or otherwise.

The World Economic Forum’s 2023 Global Risks Report ranks cybercrime as one of the
top 10 risks facing the world today and for the next 10 years. [6] If cybercrime were
viewed as a nation state, cybercrime would count as the third largest economy in the
world.[7] In numbers, cybercrime is predicted to cause over 9 trillion in damages
worldwide in 2024.
6.0 Actual Resources Used (Mention the actual resources used).
S. Name of
No. Resource/material Specifications Qty Remarks

1 Computer,Mobile,Internet,Pri PC 01
nter

2 Techmax,www.youtube.com,www.google -
Text book,Youtube,google .co.in

7.0 Outputs of the Micro-Projects

8.0 Skill Developed / Learning outcome of this Micro-Project

Through this microproject the following things are learnt and the skill developed by the group
1. The concept of project understood.
2. The structure and requirement of proposal and report understood.
3. The necessity of team work is understood.
4. What is the role of group leader and team member? It well understood.
5. The importance of time management and good communication skill is understood.
6. How to search information and use of different online tools came to know.
7. The writing in English skill is developed.
8. The new words are collected.
9. The computer access skill is developed.
10. Able to tackle and solve the problem arised due to miscommunication and misunderstanding.
11. The decision making ability is developed but needed good cooperation.
9.0 Conclusion
In conclusion, cybercrime is a serious threat to our society, and it is essential to take
steps to protect ourselves and our organizations. By understanding the different types
of cybercrime and their impact, we can take proactive measures to stay safe online
and prevent cyber attacks.

You might also like