Teacher Evaluation Sheet
Name of Student: Waghchaure Pranjal Sambhaji
Enrolment No: 23651020423
Name of Program: Computer Technology Semester:-VI
Course Title: Management Code:22509
Title of the Micro Project: Study of measures to be taken for ensuring cyber security
Course Outcomes Achieved:-
a) CO-b Use principles of planning and organising for accomplishment of task
b) CO-c Use of principles of directing and controlling for implementing the plans
c) CO-d Apply principles of safety management in all activities
a) Evaluation as per Suggested Rubric for Assessment of Micro-Project:
Sr.
Characteristic to be Poor Average Good Excellent
No.
assessed (Marks 1-3) (Marks 4-5) (Marks 6 - 8) (Marks 9-10)
(A) Process and Product Assesssment (Convert above total marks out of 6 marks)
1 Relevance to the Course
Literature Survey /
2
Information Collection
Completion of the Target as
3
per project proposal
Analysis of data and
4
representation
5 Quality of Prototype / Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)
8 Presentation
9 Viva
Micro – Project Evaluation Sheet:
Process Assessment Product Assessment
Part Project Part Individual Total
A – project Methodology B – Project Presentation / Marks 10
Name of Student Proposal (2 marks) Report / Working Viva (4 marks)
(2 marks) Model(2 marks)
Waghchaure Pranjal Sambhaji
Comments / Suggestions about team work / leadership / inter – personal communication (if any)
Any Other Comment
Name and designation of the faculty Member: Ms.M.B.Shinde Signature
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
SHRI HIRALAL HASTIMAL(JAIN
BROTHERS,JALGAON)POLYTECHNIC,
CHANDWAD-423101 (Nashik)
MICRO PROJECT
Academic year: 2024-25
TITLE OF PROJECT
Study Of Measures To Be Taken For Ensuring Cyber Security
Program:Computer Technology Program Code:CM
Course: MGT Course code: 22509
2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
Sr.No. Name of Student Roll No Enrollment No Seat No
1. 57 23651020423 417337
Waghchaure Pranjal Sambhaji
CERTIFICATE
This is to certify 1) Waghchaure Pranjal Sambhaji
of 5th Semester of Diploma in Computer Technology of Institute, Shri Hiralal Hastimal (Jain
Brothers,Jalgaon) Polytechnic,Chandwad (Code: 0079) has completed the Micro- Project
satisfactorily in Subject Management (22509) for the academic year 2024- 2025 as prescribed in the
curriculum.
Place: CHANDWAD
Date: / /2025
Subject Teacher Head of the Department Principal
(Ms.M.B.Shinde) (Mr. P. R. Sali) (Dr. V. A. Wankhede)
3
INDEX
SR_NO. CONTENT PAGE NO.
Part A
1.0 Brief Introduction 6
2.0 Aim of Micro Project 5
3.0 Action Plan 5
4.0 Resources Required 5
Part B
1.0 Brief Description 6
2.0 Aim of Micro Project 6
3.0 Course Outcome Integrated 6
4.0 Actual Procedure Followed 6
5.0 Actual Resource Used 6
6.0 Outputs of the Micro-projects -
7.0 Skill Developed 11
8.0 Applications of this Microproject 11
4
PART A-Plan
Title of the Micro Project: Study of measures to be taken for ensuring cyber security
1.0 Aim/Benefits of the Micro-Project-
This Micro-Project aim to study of measures to be taken for ensuring cyber security
2.0 Course Outcomes Addressed-
b) CO-a Use basic management principles to execute daily activities.
c) CO-b Use principles of planning and organising for accomplishment of tasks.
d) CO-c Use principles of directing and controlling for implementing the plans.
e) CO-d Apply principles of safety management in all activities:
f) CO-e Understand various provisions of industrial acts.
3.0 Proposed Methodology-
Step 1: Searched and Selected the topic for the Microproject.
Step 2: Discussed about the the microproject
Step 3: Distributed work accordingly
Step 4: Collected and gathered data required
Step 5: Prepared the final report.
Step 6: Made the report and made the required changes in the project.
4.0 Action Plan-
Planned Start Planned Finish
Sr no. Details of activity
Date Date
1. Finalization of topic 11/01/25 18/01/25
2. Preparation of Abstract 29/01/25 09/02/25
3. Collection of data 12/02/25 20/02/25
4. Preparation of concept 06/03/25 16/03/25
5. Seminar / Presentation 18/03/25 29/03/25
6. Submission of Micro Project 02/04/25 12/04/25
5.0 Resources Required:
Sr.No Name of Resource/Material Specification Quantity Remarks
1. Computer (Desktop/Laptop) i5, RAM 16GB 1 Available
2. Microsoft office word 2010 1 Available
3. Books - - -
4. Websites www.forbes.com 1 Available
5. Softwares - - -
5
PART B-Plan
Title of micro-project: Study of measures to be taken for ensuring cyber security
1.0 Brief Description:-
In recent years, the Cyber Security is most important challenge which plays most important role
and must require in digital era where cybercrime become so frequent. Cyber security is all about
to stop cyber-crime. Cyber security is must and we have to know about all safety measures
required to stop cybercrime. This paper gives details information about cyber security and its
safety measure. Also
we will discuss about the activities related to it and how actually cybercrime happens and all steps
taken by the various organization and Government to have cyber ethics everywhere. Cyber
security provides protection against the cybercrime and teaches us what essential safety measures
one need to follow from all cybercrimes. Securing online information is priority where everyone
is involved with technology. Whenever anyone talked about cyber security, straight one thing
comes in mind that is cybercrime and what safety measures need to take to be safe from it.
2.0 Aims/Benefits of Micro Project:-
This Micro-Project aim to study of measures to be taken for ensuring cyber security
3.0 Course Outcomes Achieved:
a) CO-b Use principles of planning and organising for accomplishment of task
b) CO-c Use of principles of directing and controlling for implementing the plans
c) CO-d Apply principles of safety management in all activities
4.0 Actual Methodology/Procedure Followed:-
Step 1: Searched and Selected the topic for the Microproject.
Step 2: Discussed about the the microproject
Step 3: Distributed work accordingly
Step 4: Collected and gathered data required
Step 5: Prepared the final report.
Step 6: Made the report and made the required changes in the project.
5.0 Actual Resources Used:
Sr.No Name of Resource/Material Specification Quantity Remarks
1. Computer (Desktop/Laptop) i5,RAM 16GB 1 Available
2. Microsoft office word 2010 1 Available
3. Books
4. Websites Available
5. Softwares 1
6
Study Of Cyber Security
• Introduction:
Cyber Security refers to the all safety measure taken to protect from all
deception practices done online to steal personal data and to protect networks, programs,
devices, damage and any unauthorized access. Any information which transferred through
network can be easily hacked these days and everyone access most of the things only whether it
is professional or personal. In organisation most of the work done through email, audio video
conferences, HRMS, etc., and in personal people do online banking as well. Even the online
chats are also not safe these days .Cyber-crime is increasing day by day therefore there are
various organisation and Government who come in front to deal with all kind of cyber-crimes. IT
industry must focus on safety measure as 60 percent of total transactions are done online so this
field must have high quality of security to give all safety to users while doing any
transactions. Even the cyber space these days are not safe. The latest technologies like E-
commerce, mobile computing, cloud computing, big data science, artificial intelligence need
high cyber security standards. Making the internet safer is the important and integral part of the
development IT Services and for Government also important to look into it to safeguards
IT Services. Though we have individual cyber cells to deal every individual case and the
response time is great. In 1903, first attack came into existence and after that frequent crimes
came up. People associated with cyber security but it is more than that. The modern hackers are
there who are breaking down cyber securities. Method has increased of hacking, new techniques
and new ways came up of cybercrime. These tools know a exploit kits which is designed to
exploit human and to blackmail them and get all information. Effective cyber security will
protect but not necessary to protect network where hackers will not attempt to attack and target
to track the system or whole server. But by cyber security, it will difficult for hackers to crack
the firewall and get into it.
Cyber security is important in the world of networks where people are always online doing
work and it can provide opportunity for users to protect their personal information on the
network or on device. Cyber security gives Right to know and Right to information. Computer is
safe through cyber security in terms of all damages from virus, bacteria, online bugs etc. Cyber
security also helps in monitoring the network and protects from various kinds of threats. Also it
protects from all cybercrimes where attackers didn’t get entrance on networks. It allows
protecting computers security a high level. Cyber security protects the confidential data,
protects the integrity and availability of computer system and resource data of systems.
Therefore, cyber security is must to get all confidential trade secrets and identifying lost data,
integrity is sure so that data which is used have some valuable and ethical data, and it helps from
restrain all kind of viruses and data stolen. People have lost their mental and financial stability
due to cybercrime. Many of them lost their huge amount of money, personal photos are viral
through crimes and not only photos but videos as well due to which people lost their trust from
digital world. Therefore, cyber security must be there and government should take legal action
against the cyber criminals
7
Trends Of Cyber Security:
1. Web Servers
Cyber criminals create their fake servers which look exactly like the original one with their
malicious code so that one can easily visit and input the personal information and they can easily
track all detail
Cyber security check twice while doing any transaction and see about the server in detail.
2. Cloud space and its services
These days everyone is preferring for cloud space to store data. This latest service becomes
the challenge for cyber security as it requires large number of access and applications to
prevent important information. Hackers know all techniques to get into it.
3. Mobile Networks
Mobile is the need of everyone. We can see in everyone’s hand and its user do almost
every activity on mobile. From social media to banking, from pictures to videos, WhatsApp chat
etc. are very permeable as people are using different kind of devices like smartphones, IPad,
Tablet etc. all of which require high level of security with two factor authentication. Mobile
phones are very prone to cybercrime and user must download latest software and application and
make themselves protect from cybercrime.
4. Encrypted Code
Encryption is the process of encoding messages where only users or coders can read that and
or networks. Every user must learn how to encode the messages and keep their data encrypted
safe. Encryption at every level is important and protect the data privacy and the integrity. But
use of encryption is the big challenge for cyber security
Encrypted code not only secure persona data on computers or mobile but it is also helpful and
secure data on all networks which is present online
Cyber ethics:
Cyber ethics is the code of internet. It is the practice which is use for good chance to
use proper and safer internet. There are few things which need to be consider for cyber ethics-
• Offensive Language: Do not use rude or any kind of violent language
• Cyber Bully: Never do any cyber bully as it’s a crime
• Plagiarism: Never plagiarised any content of any one as it us under stolen and hacking
• Involvement: Do not involve with anyone else computer or network as it comes under
cybercrime
• Copyright: Obey the Copyright rules, never download material from unknown sites Cyber
ethics are important and must be followed by everyone and if everyone takes the
responsibility then cybercrime will decline.
8
• Challenges of Cyber Security
There are few challenges while doing effective cyber security in
an organization or for personal reasons:
1. Network Security - The networks are not secure enough as there are many
unwanted users who can attack and destruct the interventions.
2. Application Security- Application of both computer and mobile device need to be
updated and tested on regular basis to ensure any kind of attacks.
3. Data Security - Securing data on applications and network need second layer of
security which is very challenging. One must protect their data very highly by two
factor authentication so that no one can easily access it.
4. Cloud Security- Protecting data 100 percent on cloud is very challenging as its
require large amount of space and online safe environment.
5. Mobile Security- It involves every type of security from login to space, from chat to
banking which again require conscious user’s involvement
9
• Measures Of Cyber Security:
Basic precautions must be taken by everyone who use internet and online transactions
and work:
Internet Security Suite- One can use various anti malware software that are available for purchase
either through online or offline that helps them to protect and secure their information from various
malware.
Strong Password- One should use strong and new password frequently. Password must be
changed frequently by using combination of letters, numbers and special characters and try to
erase history of browser once work done specially if using public or common computers or laptop.
Regular Update Software – It is important for OS and internet security to update regular software
to avoid any kind of cybercrime as criminal use known exploits and flaw to gain access of system
Manage Social Media Settings- It is always very important to keep personal and private
information to keeppersona; and private information locked down. Cyber criminals keep an eye on
social media information so it must be locked and frequently changes like passwords share as much
as less information on social media so that anyone won’t be able to guess security questions
answers
Intensify Home Network- Home network must have strong encrypted password and have virtual
private network. A VPN stands for Virtual Private Network; which allows you to create a secure
connection to another network over the internet.. It allows you to connect to the public
networks more securely. It’s a great idea to use VPN in both public and personal network so that it
protects everywhere.
Secure Personal Computer- This can be done by activating computer firewall, using anti- virus,
malware software and block spywar attacks by regularly installation and upadating software
Secure Mobile Devices- Mobile devices must be updated and password protected in two-
factor authentication and applications must be downloaded from trusted sources.
Install latest Operating System- Current and updated operating system must be used in Windows,
Mac, Linux to prevent potential attacks on older software.
10
6.0 Conclusion
We learnt about cybercrimes is one of the largest crime in today’s time. Hackers and thief
are like sitting online and watching all data online. Cases like tracking of online banking and
personal data is common and most increasing crime. There are data available where we can see
daily cybercrime like OTP call, online money transfer, personal information data, etc. Even
organization is facing these crimes like leaking information of their work, project, plans,
infrastructure details etc. There is no absolute solution of cybercrimes but we can do our best by
using networks and online work safely. Cyber security takes all measures to protect
online crime and use as safeguards for all networks, programs, software and data. The
protection and prevention of network is must and provide all intentional and unintentional
intrusion for both inside and outside system to protect and ensure assurance, integrity of
information and data online.
7.0 Skill developed
• Concept related to cyber security
• Trends in cyber security
• Different measures taken to ensuring cyber security
8.0 Applications of this Microproject
• Helps businesses protect sensitive data from cyber attacks.
• Ensures secure online transactions for banking and e-commerce.
• Supports employee training to prevent phishing and other threats.
• Assists in forming cybersecurity policies and procedures.
• Aids in identifying and managing cyber risks.
• Helps organizations comply with data protection laws and regulations.
• Supports planning for quick response to cyber incidents.
• Encourages regular updates to security systems and software.
• Promotes secure use of cloud-based services.
11