MAHARISHI INTERNATION
RESIDENCIAL SCHOOL
INVESTIGATORY PROJECT
REPORT
In partial fulfillment of AISSCE 2026
Computer Science practical.
Name: Aravindh.P
Class: XII-A4
Roll No: 01
4. Index (Table of Contents)
Sl. No. Section Page
No.
1 Introduction 5
2 Objectives 6
3 Cyber Threats Overview 7-12
4 Phishing Awareness 13-15
5 Password Security 16-18
6 Malware & Ransomware 19-21
7 Social Engineering 22-24
8 Secure Browsing & VPNs 25-26
9 Two-Factor Authentication (2FA) 27-28
10 Methodology & Tools Used 29-30
11 Implementation (Screenshots) 31-40
12 Quiz & Assessment Module 41-43
13 Testing & Results 44-45
14 Conclusion & Future Scope 46
15 Bibliography 47
Appendix (Source Code, Survey
16 48-50
Forms)
Introduction
Why Cybersecurity Awareness?
● Cybercrime is increasing (mention statistics).
● Many attacks succeed due to human error.
● Lack of awareness makes users vulnerable.
Common Cyber Threats
● Phishing, malware, weak passwords, social engineering.
● Example: In 2023, 85% of breaches involved human interaction (Verizon DBIR Report).
Need for This Project
● Schools/offices need training tools.
● Interactive learning is more effective than text.
● Gamification (quizzes, certificates) improves retention.
(Include a graph showing cyberattack trends over the years.)
Cyber Threats – Detailed
Explanation
Phishing Attacks
● Definition: Fraudulent attempts to steal sensitive data.
● Types:
o Email phishing
o Spear phishing (targeted)
o Smishing (SMS phishing)
o Vishing (voice call scams)
● How to Spot:
o Suspicious sender address
o Urgent language ("Act now!")
o Fake login pages
(Insert screenshot of a real phishing email with annotations.)
Password Security
● Common Mistakes:
o Using "password123"
o Reusing passwords
o Not changing default passwords
● Best Practices:
o Use a password manager
o Enable Two-Factor Authentication (2FA)
o Create passphrases (e.g., "BlueCoffee$2024!")
(Include a password strength meter screenshot.)
Malware & Ransomware
● Types:
o Viruses, worms, trojans
o Spyware (keyloggers)
o Ransomware (locks files for money)
● Protection:
o Install antivirus
o Avoid pirated software
o Regular backups
(Show a ransomware attack flowchart.)
Social Engineering
● Examples:
o Fake tech support calls
o Baiting (free USB with malware)
o Pretexting (fake identity)
● Defense:
o Verify identities before sharing info.
o Don’t trust unsolicited requests.
(Include a case study of a famous social engineering attack.)
Implementation
Home Page Design
● Clean, user-friendly interface.
● Navigation menu (Modules, Quiz, Resources).
(Screenshot of the homepage with labels.)
Learning Modules
● Phishing Module: Interactive examples.
● Password Module: Strength checker.
● Malware Module: Infection simulation.
(Screenshots of each module.)
Quiz Section
● Multiple-choice questions.
● Instant feedback with explanations.
● Score tracking & certificate generation.
(Quiz screenshots + sample certificate.)
Quiz & Assessment
Sample Questions:
1. What is the best way to handle a suspicious email?
a) Open attachments to check
b) Forward it to IT support
c) Delete it immediately
Answer: b) Forward it to IT support.
2. Which password is the strongest?
a) hello123
b) P@$$w0rd
c) Winter#Snow2024!
Answer: c) Winter#Snow2024!
(Include a screenshot of the quiz result page.)
Testing & Results (2 Pages)
User Testing
● Conducted with 20 students.
● Pre-test vs. post-test knowledge improvement.
Findings
● 80% improved phishing detection.
● 70% started using stronger passwords.
(Include a bar graph comparing pre-test and post-test scores.)
Conclusion & Future Scope
Conclusion
● CyberGuard effectively improves awareness.
● Interactive learning > passive reading.
Future Enhancements
● Add AI-based phishing simulation.
● Include dark web monitoring alerts.
● Expand to mobile app version.
Bibliography
● NIST Cybersecurity Framework
● OWASP Top 10 Vulnerabilities
● Verizon Data Breach Investigations Report (DBIR)
(Use APA/MLA citation style.)
Appendix
● Full HTML/CSS/JS Code
● User Survey Forms
● Additional Diagrams