0% found this document useful (0 votes)
13 views16 pages

ETI Project

The document is a teacher evaluation sheet for a micro-project titled 'Need of Cyber Security' completed by student Thorat Akshada Dattatray in the Computer Technology program. It outlines the course outcomes achieved, evaluation criteria, and a detailed methodology for the project, which focuses on the importance and applications of Artificial Intelligence in various sectors. Additionally, it discusses the significance of cybersecurity, common threats, and types of cybersecurity measures necessary to protect data and systems.

Uploaded by

akshada2515
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views16 pages

ETI Project

The document is a teacher evaluation sheet for a micro-project titled 'Need of Cyber Security' completed by student Thorat Akshada Dattatray in the Computer Technology program. It outlines the course outcomes achieved, evaluation criteria, and a detailed methodology for the project, which focuses on the importance and applications of Artificial Intelligence in various sectors. Additionally, it discusses the significance of cybersecurity, common threats, and types of cybersecurity measures necessary to protect data and systems.

Uploaded by

akshada2515
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Teacher Evaluation Sheet

Name of Student: Thorat Akshada Dattatray


Enrolment No: 23651020421
Name of Program: Computer Technology Semester: -VI
Course Title: Emerging Trends in Computer Engg. Code: -22618
Title of the Micro Project: Need of Cyber Security

Course Outcomes Achieved:-


a) CO-a Describe Artificial Intelligence, Machine learning and deep learning.

Evaluation as per Suggested Rubric for Assessment of Micro-Project:

Sr.
Poor Average Good Excellent
No. Characteristic to be assessed
(Marks 1-3) (Marks 4-5) (Marks 6 - 8) (Marks 9-10)
(A) Process and Product Assesssment (Convert above total marks out of 6 marks)
1 Relevance to the Course
Literature Survey /
2
Information Collection
Completion of the Target as
3 per project proposal
Analysis of data and
4
representation
5 Quality of Prototype / Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)
8 Presentation
9 Viva
Micro – Project Evaluation Sheet:
Process Assessment Product Assessment
Part Part
Project Individual Total
A – project B – Project
Methodology Presentation / Marks
Proposal Report / Working
Name of Student (2 marks) Viva(4 marks) 10
(2 marks Model(2 marks)
Thorat Akshada Dattatray

Comments / Suggestions about team work / leadership / inter – personal communication (if any)

Any Other Comment

Name and designation of the faculty Member: Ms.S.S.Shinde Signature :

1
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION

SNJBs SHRI H. H. J. B.J. POLYTECHNIC,


CHANDWAD-423101 (Nashik)

MICRO PROJECT
Academic year: 2024-25

TITLE OF PROJECT
Need of Cyber Security

Program:Computer Technology Program Code:CM

Course:Emerging Trends in Computer Engg Course code: 22618

2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Sr.No. Name of Student Roll No Enrollment No Seat No


1. Thorat Akshada Dattatray 55 23651020421 417335

CERTIFICATE
This is to certify 1) Thorat Akshada Dattatray

of 6th Semester of Diploma in Computer Technology of Institute, Shri Hiralal Hastimal


Jain Brothers Jalgoan Polytechnic, Chandwad (Code: 0079) has completed the Micro-
Project satisfactorily in Subject Emerging Trends in Computer Engg (22618) for the academic
year 2024-2025 as prescribed in the curriculum.

Place: CHANDWAD

Date: / /2025

Course Teacher Head of the Department Principal


(Ms.S.S.Shinde) (Mr. P. R. Sali) (Dr. V. A.
Wankhede)

Seal of
Institute

3
INDEX

SR_NO. CONTENT PAGE NO.


Part A

1 Aim of Micro Project 5


Course Outcomes Addressed
2 5

3 Proposed Methodology 5

4 Action Plan 5

5 Resources Required 6

Part B

1 Brief Description 7

2 Aim of Micro Project 7

3 Course Outcome Integrated 7

4 Actual Procedure Followed 7-14

5 Actual Resource Used 14

6 Conclusion 14

7 Skill Developed 15

8 Applications of Microproject 16

4
PART A-Plan

Title of micro-project: Need of Cyber Security

1. Aim/Benefits of the Micro-Project-

To study and analyze the need, applications, and impact of Artificial


Intelligence (AI) in solving real-world problems across various sectors, and
to understand how AI enhances efficiency, accuracy, and decision-making
in day-to-day life.

2. Course Outcomes Addressed-

a) CO-a Describe Artificial Intelligence, Machine learning and deep learning.


b) CO-b Interpret IoT concepts.
c) CO-c Compare Models of Digital Forensic Investigation
d) CO-d Describe Evidence Handling Procedures.
e) CO-e Describe Ethical Hacking process.
f) CO-f Detect Network Operating System and applications vulnerabilities.

3. Proposed Methodology-

The methodology of this microproject involves a systematic approach to


understanding the need for Artificial Intelligence (AI) in real-world
applications. Initially, a literature review will be conducted by studying
research papers, articles, and case studies to gain a clear understanding of
AI concepts and its evolution. Following this, specific real-world problems
in various sectors such as healthcare, education, agriculture, transportation,
and business will be identified where AI plays a significant role. Relevant
data will be collected from online sources, expert opinions, and existing AI-
based solutions.

4. Action Plan-

Sr no. Details of activity Planned Start Planned Finish


Date Date
1. Finalization of topic 11-01-2025 18-01-2025
2. Preparation of Abstract 29-01-2025 9-02-2025
3. Collection of data 12-02-2025 20-2-2025
4. Preparation of concept 06-03-2025 16-03-2025
5. Seminar / Presentation 18-03-2025 29-03-2025
6. Submission of Micro Project 02-04-2025 06-04-2025

5
5. Resources Required:
Sr.No Name of Resource/Material Specification Quantity Remarks
1. Computer I5, RAM 2GB Available
(Desktop/Laptop)
1
2. Microsoft office word 2010 1 Available
3. Book Artificial Intelligence 1 Available
4. Websites https://chat.openai.com/ Available
5. Softwares Notepad 1 Available

6
PART B-Plan

Title of micro-project: Need of Cyber Security

1. Brief Description:

This microproject focuses on understanding the importance and growing


need of Artificial Intelligence (AI) in real-world applications. It highlights
how AI is being used in various sectors such as healthcare, education,
agriculture, transportation, and business to solve complex problems,
improve efficiency, and support decision-making. The project also explores
real-life examples and the benefits of using AI over traditional methods,
along with the challenges and future possibilities of AI in everyday life.

2. Aims/Benefits of Micro Project:

The aim of this project is to study the need and significance of Artificial
Intelligence (AI) in real-world scenarios and to understand how AI is
transforming various sectors by offering smart and efficient solutions. This
project helps in identifying the practical applications of AI in areas like
healthcare, education, agriculture, transportation, and business. The key
benefits of this project include gaining knowledge about real-time AI
technologies, understanding how AI improves accuracy and saves time, and
recognizing its role in solving complex problems.

3. Course Outcomes Achieved:

a) CO a Describe Artificial Intelligence, Machine learning and deep learning.

4. Actual Methodology/Procedure Followed:

To carry out this project, the first step involved conducting a detailed study
of the concept of Artificial Intelligence (AI) through books, online articles,
and research papers. After understanding the basic principles, real-world
sectors such as healthcare, education, agriculture, and transportation were
explored to identify how AI is being applied. Information was gathered
through online sources, case studies, and examples of existing AI systems.
The data collected was then analyzed to compare AI-based solutions with
traditional methods in terms of efficiency, accuracy, and problem-solving
capability. Based on this analysis, the findings were documented,
highlighting the benefits, challenges, and future potential of AI in daily life.
The entire process helped in understanding the real-time use and impact of
AI in practical situations.

7
What is Cyber Security
The world of Cyber Security revolves around the industry standard of
confidentiality, integrity, and availability, or CIA. Privacy means data can be
accessed only by authorized parties; integrity means information can be added,
altered, or removed only by authorized users; and availability means systems,
functions, and data must be available on- demand according to agreed-upon
parameters. The main element of Cyber Security is the use of authentication
mechanisms. For example, a user name identifies an account that a user wants to
access, while a password is a mechanism that proves the user is who he claims to be.
Cyber security is the application of technologies, processes, and controls to protect
systems, networks, programs, devices and data from cyber attacks. It aims to reduce
the risk of cyber attacks and protect against the unauthorised exploitation of systems,
networks, and technologies. Security is simply the freedom from risk or danger. The
definition is extended by defining risk as the potential loss resulting from the balance
of threats, vulnerabilities, countermeasures, and value. Understanding the security
design process involves determining the organization's security needs.

Cyber Security is a process that’s designed to protect networks and devices from
external threat. Businesses typically employ Cyber Security professionals to protect
their confidential information, maintain employee productivity, and enhance
customer confidence in products and services. Cyber crimes have quickly become
one of the fastest rising forms of modern crime. According to cyber experts,
approximately 1 million potential cyber attacks are attempted per day, and with the
evolution of mobile and cloud technologies, this number is likely to increase. To
help mitigate this growth, businesses and corporations have been expanding their
cybersecurity teams and efforts.

8
Why do we need Cyber Security

1. Protection of Data Privacy


In the digital age, vast amounts of personal, financial, and confidential
data are stored and shared online through various platforms. This includes
everything from banking details and medical records to private communications and
business secrets. Without strong cybersecurity measures, this sensitive data is
vulnerable to theft, unauthorized access, or alteration. Cybersecurity ensures the
confidentiality, integrity, and privacy of information by protecting it from
cybercriminals and unauthorized users. It plays a crucial role in building trust in
digital systems and protecting individuals’ and organizations’ data from potential
misuse.

2. Prevention of Cyber Attacks


Cyber attacks have become increasingly common and sophisticated,
targeting individuals, organizations, and even governments. These attacks include
malware, phishing, ransomware, and denial-of-service (DoS) attacks, which can
disrupt operations, steal information, or damage systems. Effective cybersecurity
measures are necessary to detect and prevent these threats before they can cause
harm. By implementing firewalls, antivirus software, encryption, and intrusion
detection systems, organizations can protect their networks and reduce the risk of
financial loss, data breaches, and reputational damage.

9
3. Defense of Critical Infrastructure
Critical infrastructure such as electricity grids, transportation
systems, healthcare facilities, and financial institutions relies heavily on connected
networks and industrial control systems. A cyber attack on any of these systems can
lead to widespread disruption, threaten public safety, and even impact national
security. For instance, an attack on a hospital’s network can delay emergency
treatments, while a breach in an energy grid could cause power outages.
Cybersecurity is essential to safeguard these vital systems from malicious actors,
ensuring uninterrupted and safe delivery of essential services.

4. Preservation of Trust and Confidence


Trust is a key factor in digital relationships, whether between
businesses and customers, governments and citizens, or individuals interacting
online. People must have confidence that their data is secure and that the systems
they use are reliable. Strong cybersecurity practices, such as secure websites,
encrypted communications, and secure login processes, help build this trust. They
demonstrate a commitment to protecting users’ data and ensure the integrity and
availability of digital services. Without trust, people and organizations may hesitate
to use online services, which can hinder digital growth and innovation.

5. Compliance with Regulations


Governments and regulatory bodies around the world have
implemented laws to protect personal data and ensure secure digital practices.
Regulations such as the General Data Protection Regulation (GDPR) in Europe and
the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. require
organizations to implement proper cybersecurity measures. Non-compliance with
these laws can lead to heavy fines, legal actions, and damage to an organization’s
reputation. Cybersecurity helps ensure that businesses comply with these regulations
and handle data responsibly and lawfully.

6. Adaptation to Evolving Threats


Cyber threats are not static—they evolve continuously, becoming
more complex and difficult to detect. Hackers use advanced techniques and tools to
exploit vulnerabilities in systems. As a result, organizations must constantly update
and strengthen their cybersecurity infrastructure. This includes implementing real-
time monitoring, gathering threat intelligence, and having strong incident response
plans in place. Staying proactive allows organizations to detect and respond to
threats quickly, minimizing damage and preventing future incidents.

10
7. Support for Economic Stability and Innovation
A secure digital environment encourages economic growth and
innovation. Businesses are more likely to invest in new technologies, digital
platforms, and online services if they are confident their data and systems are
protected. Cybersecurity safeguards intellectual property, trade secrets, and
proprietary information from competitors and cybercriminals. This protection allows
businesses to operate confidently, collaborate with partners, and offer innovative
solutions, contributing to a stable and thriving digital economy.

Common Cyber Threats

Cyber Terrorism

Cyber terrorism refers to the use of digital technologies by terrorist groups to further
their agendas. These groups may attack computer systems, networks, or
communication infrastructure to cause fear, disruption, or damage. Such attacks can
target government services, financial institutions, or public safety systems,
potentially leading to large-scale chaos and panic.

Cyber Warfare

Cyber warfare involves the use of digital attacks by one nation-state against another.
These attacks can be aimed at stealing sensitive information, disrupting critical
services, or causing economic or political damage. Cyber warfare is considered a
serious threat in the modern world, as it can weaken a country’s defense systems and
destabilize its internal security without physical warfare.

11
Types of Cyber Security

1. Network Security

Network security involves protecting computer networks from unauthorized


access, misuse, or theft. It includes both hardware and software technologies
designed to ensure the safety and integrity of data as it travels across or within a
network. Firewalls, intrusion detection systems (IDS), and virtual private networks
(VPNs) are commonly used tools in network security. The goal is to prevent hackers
or malicious programs from gaining access to internal networks and disrupting
services or stealing information.

2. Information Security

Information security focuses on protecting the confidentiality, integrity, and


availability of data, whether it is in storage, in transit, or in use. This type of
cybersecurity ensures that sensitive data such as personal details, financial
information, and intellectual property is protected from unauthorized access and
breaches. Information security practices include data encryption, access control, and
secure storage methods to keep information safe from both internal and external
threats.

3. Application Security

Application security deals with securing software applications from external


threats during development and after deployment. Applications can be vulnerable to
a variety of attacks like SQL injection, cross-site scripting (XSS), and buffer

12
overflows. Application security includes writing secure code, regularly updating
software, performing vulnerability scans, and conducting security testing.

4. Cloud Security

Cloud security refers to the set of practices and technologies used to protect
data, applications, and services that are hosted in the cloud. As more organizations
move to cloud computing platforms like AWS, Microsoft Azure, or Google Cloud,
securing cloud environments becomes critical. Cloud security includes data
encryption, identity management, access controls, and threat detection tools to
prevent unauthorized access and ensure data privacy in virtual environments.

5. Endpoint Security

Endpoint security focuses on securing end-user devices such as computers,


mobile phones, tablets, and laptops. These devices are often entry points for cyber
threats, especially when used to access company networks remotely. Endpoint
security includes antivirus software, endpoint detection and response (EDR), device
encryption, and mobile device management (MDM). By securing endpoints,
organizations can prevent malware infections, data breaches, and unauthorized
access.

6. Internet of Things (IoT) Security

IoT security is the protection of internet-connected devices like smart TVs,


wearables, home automation systems, and industrial machines. These devices often
have limited security features, making them vulnerable to attacks. IoT security
involves securing the devices themselves, their network connections, and the data
they generate. Measures include strong authentication, secure firmware updates, and
network segmentation to limit the spread of attacks.

7. Operational Security (OPSEC)

Operational security refers to the processes and decisions for handling and
protecting sensitive information and business operations. It focuses on policies and
procedures that protect data from being accessed or exposed during daily operations.
This includes controlling who has access to what information, monitoring usage, and
managing data backups. OPSEC ensures that both physical and digital information is
handled in a secure manner.

13
8. Identity and Access Management (IAM)

Identity and Access Management ensures that only authorized individuals


can access specific resources within a system. It includes technologies and policies
for managing digital identities, authentication (verifying users), and authorization
(granting access rights). IAM uses tools such as passwords, biometrics, multi-factor
authentication (MFA), and role-based access controls to prevent unauthorized access
to sensitive data and systems.

5. Actual Resources Used:


Sr.No Name of Specification Quantity Remarks
Resource/Material
1. Computer i5,RAM 8GB 1 available
(Desktop/Laptop)
2. Microsoft office word 2010 1 available
3. Books Artificial Intelligence 1 available
4. Websites https://chat.openai.com/ 1 available
5. Softwares Notepad, 1 available

6. Conclusion

In conclusion, cybersecurity is an essential aspect of protecting digital assets, data,


and systems from the ever-evolving landscape of cyber threats. As technology
continues to advance and the reliance on digital platforms grows, the need for robust
cybersecurity measures becomes increasingly critical. From protecting personal and
financial data to ensuring the safety of critical infrastructure, cybersecurity plays a
vital role in maintaining the integrity, confidentiality, and availability of information.
By understanding the different types of cybersecurity, including network security,
application security, and cloud security, organizations can implement strategies to
defend against various cyber threats such as malware, phishing, and ransomware.
Furthermore, with the growing complexity of cyber-attacks, it is crucial for
individuals and businesses to continuously update and strengthen their cybersecurity
protocols. Ultimately, the investment in strong cybersecurity practices not only
safeguards data but also fosters trust, supports economic stability, and ensures the safe
use of technology in our increasingly connected world.

14
7. Skill Developed:

 Research and Analytical Skills

Through extensive research on different cybersecurity threats and protective


measures, you develop the ability to analyze complex issues, gather relevant
data, and present it in a clear and structured manner.

 Problem-Solving Skills

Understanding cybersecurity threats and designing solutions requires critical


thinking and problem-solving. By studying various attack vectors and security
mechanisms, you learn to approach challenges from multiple angles and think
strategically about defense solutions.

 Technical Knowledge in Cybersecurity

This project provides hands-on exposure to core cybersecurity concepts like


network security, application security, encryption, malware protection, and
identity management. You gain practical understanding and familiarity with
tools and techniques used in the cybersecurity industry.

 Communication Skills

Writing the report, presenting findings, and explaining complex cybersecurity


concepts improve your communication skills. This includes articulating
technical information in a manner that can be understood by non-experts, as
well as clearly documenting your research process.

 Risk Management

Understanding the risks associated with cybersecurity threats and learning to


manage them through preventive measures like firewalls, encryption, and
access control builds your ability to assess, evaluate, and mitigate risks in any
technical environment.

15
8. Applications of Microproject:

1. Protection of Personal Data


- Safeguards personal information like financial and health data from cybercriminals
using encryption and secure authentication methods.

2. Securing Online Transactions


- Ensures safe e-commerce and online banking by applying SSL encryption and multi-
factor authentication to protect against fraud.

3. Critical Infrastructure Protection


- Secures vital sectors like healthcare, energy, and transportation from cyber-attacks to
maintain continuous operations.

4. Corporate Data Protection


- Protects sensitive business data through encryption, firewalls, and secure data
storage to prevent unauthorized access and breaches.

5. IoT Device Security


- Secures Internet of Things devices from cyber threats, preventing them from being
used as entry points into larger systems.

6. Government and National Security


- Protects government and national security systems from cyber espionage, hacking,
and data breaches.

7. Healthcare Industry Protection


- Safeguards patient data in healthcare systems from unauthorized access, ensuring
compliance with regulations like HIPAA.

8. Education Sector Cybersecurity


- Protects student and staff data in schools and universities, preventing unauthorized
access and data breaches.

16

You might also like