0% found this document useful (0 votes)
20 views6 pages

Cs Investigatory

The document is an investigatory project report on cybersecurity awareness, created by a student for their Computer Science practical. It covers various cyber threats, such as phishing, malware, and social engineering, and emphasizes the importance of interactive learning tools for effective training. The project includes a quiz module, user testing results, and suggestions for future enhancements to improve cybersecurity awareness.

Uploaded by

dskjoe316
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views6 pages

Cs Investigatory

The document is an investigatory project report on cybersecurity awareness, created by a student for their Computer Science practical. It covers various cyber threats, such as phishing, malware, and social engineering, and emphasizes the importance of interactive learning tools for effective training. The project includes a quiz module, user testing results, and suggestions for future enhancements to improve cybersecurity awareness.

Uploaded by

dskjoe316
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MAHARISHI INTERNATION

RESIDENCIAL SCHOOL

INVESTIGATORY PROJECT
REPORT

In partial fulfillment of AISSCE 2026


Computer Science practical.

Name: Aravindh.P
Class: XII-A4
Roll No: 01​




4. Index (Table of Contents)
Sl. No. Section Page
No.

1 Introduction 5

2 Objectives 6

3 Cyber Threats Overview 7-12

4 Phishing Awareness 13-15

5 Password Security 16-18

6 Malware & Ransomware 19-21

7 Social Engineering 22-24

8 Secure Browsing & VPNs 25-26

9 Two-Factor Authentication (2FA) 27-28

10 Methodology & Tools Used 29-30

11 Implementation (Screenshots) 31-40

12 Quiz & Assessment Module 41-43

13 Testing & Results 44-45

14 Conclusion & Future Scope 46

15 Bibliography 47

Appendix (Source Code, Survey


16 48-50
Forms)
Introduction
Why Cybersecurity Awareness?
●​ Cybercrime is increasing (mention statistics).

●​ Many attacks succeed due to human error.

●​ Lack of awareness makes users vulnerable.

Common Cyber Threats


●​ Phishing, malware, weak passwords, social engineering.

●​ Example: In 2023, 85% of breaches involved human interaction (Verizon DBIR Report).

Need for This Project


●​ Schools/offices need training tools.

●​ Interactive learning is more effective than text.

●​ Gamification (quizzes, certificates) improves retention.

(Include a graph showing cyberattack trends over the years.)

Cyber Threats – Detailed


Explanation
Phishing Attacks
●​ Definition: Fraudulent attempts to steal sensitive data.

●​ Types:

o​ Email phishing

o​ Spear phishing (targeted)

o​ Smishing (SMS phishing)

o​ Vishing (voice call scams)

●​ How to Spot:
o​ Suspicious sender address

o​ Urgent language ("Act now!")

o​ Fake login pages

(Insert screenshot of a real phishing email with annotations.)

Password Security
●​ Common Mistakes:
o​ Using "password123"

o​ Reusing passwords

o​ Not changing default passwords

●​ Best Practices:
o​ Use a password manager

o​ Enable Two-Factor Authentication (2FA)

o​ Create passphrases (e.g., "BlueCoffee$2024!")

(Include a password strength meter screenshot.)

Malware & Ransomware


●​ Types:

o​ Viruses, worms, trojans

o​ Spyware (keyloggers)

o​ Ransomware (locks files for money)

●​ Protection:
o​ Install antivirus

o​ Avoid pirated software

o​ Regular backups

(Show a ransomware attack flowchart.)

Social Engineering
●​ Examples:

o​ Fake tech support calls

o​ Baiting (free USB with malware)

o​ Pretexting (fake identity)

●​ Defense:
o​ Verify identities before sharing info.

o​ Don’t trust unsolicited requests.

(Include a case study of a famous social engineering attack.)

Implementation
Home Page Design
●​ Clean, user-friendly interface.

●​ Navigation menu (Modules, Quiz, Resources).

(Screenshot of the homepage with labels.)

Learning Modules
●​ Phishing Module: Interactive examples.

●​ Password Module: Strength checker.

●​ Malware Module: Infection simulation.

(Screenshots of each module.)

Quiz Section
●​ Multiple-choice questions.

●​ Instant feedback with explanations.

●​ Score tracking & certificate generation.

(Quiz screenshots + sample certificate.)

Quiz & Assessment


Sample Questions:
1.​ What is the best way to handle a suspicious email?​
a) Open attachments to check​
b) Forward it to IT support​
c) Delete it immediately

Answer: b) Forward it to IT support.


2.​ Which password is the strongest?​
a) hello123​
b) P@$$w0rd​
c) Winter#Snow2024!

Answer: c) Winter#Snow2024!
(Include a screenshot of the quiz result page.)


Testing & Results (2 Pages)​
User Testing
●​ Conducted with 20 students.

●​ Pre-test vs. post-test knowledge improvement.

Findings
●​ 80% improved phishing detection.

●​ 70% started using stronger passwords.

(Include a bar graph comparing pre-test and post-test scores.)

Conclusion & Future Scope


Conclusion
●​ CyberGuard effectively improves awareness.

●​ Interactive learning > passive reading.

Future Enhancements
●​ Add AI-based phishing simulation.

●​ Include dark web monitoring alerts.

●​ Expand to mobile app version.

Bibliography
●​ NIST Cybersecurity Framework

●​ OWASP Top 10 Vulnerabilities

●​ Verizon Data Breach Investigations Report (DBIR)

(Use APA/MLA citation style.)

Appendix
●​ Full HTML/CSS/JS Code
●​ User Survey Forms
●​ Additional Diagrams

You might also like