Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

NIS Project

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Microproject

On

Computer Security
Submitted in the partial fulfillment of the requirement for the diploma
Of
Diploma in Computer Technology
Kunal Sharma
Karishma Verma
Manali Shinde
Ruchika Mehta
Under the guidance of
Miss. Apurva Kamble

Department of COMPUTER TECHNOLOGY


SHUVAJIRAO S. JONDHALE POLYTECHNIC, AMBERNATH
(MAHARASHTRA)
Maharashtra state board of technical education
(2023-2024)

1
Maharashtra State Board of Technical Education
Certificate
This is to certify that MR./MS. of 6th semester of Diploma in Computer
technology of Institute, Shivaji Rao S. Jondhale Polytechnic (Code:0147) Has
completed the Micro Project satisfactory in subject: NIS for the academic year
(2023-2024) as prescribed in the curriculum

SR NO. Name of the Roll No. Enrollment Seat No.


Group Members No.

1. Kunal Sharma 1418 2101470080


2. Karishma Verma 1421 2101470064
3. Manali Shinde 1420 2101470047
4 Ruchika Mehta 1410 2201470137

Place: AMBERNATH
Date:

Subject Teacher Head of the Department Principal


2
Abstract
Computer security, cybersecurity or information technology security (IT
security) is the protection of computer systems and networks from information
disclosure, theft of or damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services they provide The field
is becoming increasingly significant due to the increased reliance on computer
systems, the Internet and wireless network standards such as Bluetooth and Wi-
Fi, and due to the growth of "smart" devices, including smartphones, televisions,
and the various devices that constitute the "Internet of things". Owing to its
complexity, both in terms of politics and technology, cybersecurity is also one of
the major challenges in the contemporary world. Computer security, the
protection of computer systems and information from harm, theft, and
unauthorized use. Computer hardware is typically protected by the same means
used to protect other valuable or sensitive equipment, namely, serial numbers,
doors and locks, and alarms. The protection of information and system access, on
the other hand, is achieved through other tactics, some of them quite complex.
The security precautions related to computer information and access address four
major threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on. Another security measure is to store a system’s data on a
separate device, or medium, such as magnetic tape or disks, that is normally
inaccessible through the computer system. Finally, data is often encrypted so that
it can be deciphered only by holders of a singular encryption key.

3
INDEX
SR. NO. Content Page No.

1. Introduction 5.

2. Computer security threats 6.

3. What is computer security and 7-8.


why it is important?

4. Types of computer security 9-10.

5. Computer security practice 11.

6. Conclusion 12.
7. References 13.

4
Introduction

Computer security, cybersecurity or information technology security (IT security)


is the protection of computer systems and networks from information disclosure,
theft of or damage to their hardware, software, or electronic data, as well as from
the disruption or misdirection of the services they provide The field is becoming
increasingly significant due to the increased reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Owing to its complexity,
both in terms of politics and technology, cybersecurity is also one of the major
challenges in the contemporary world. Computer security, the protection of
computer systems and information from harm, theft, and unauthorized use.

Computer hardware is typically protected by the same means used to protect other
valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is
achieved through other tactics, some of them quite complex. The security
precautions related to computer information and access address four major
threats: (1) theft of data, such as that of military secrets from government
computers; (2) vandalism, including the destruction of data by a computer virus;
(3) fraud, such as employees at a bank channeling funds into their own accounts;
and (4) invasion of privacy, such as the illegal accessing of protected personal
financial or medical data from a large database. The most basic means of
protecting a computer system against theft, vandalism, invasion of privacy, and
other irresponsible behaviors is to electronically track and record the access to,
and activities of, the various users of a computer system. This is commonly done
by assigning an individual password to each person who has access to a system.
The computer system itself can then automatically track the use of these
passwords, recording such data as which files were accessed under particular
passwords and so on

5
Computer security threats

Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital. The most harmful types of
computer security are:

1) Viruses- Computer virus is a malicious program which is loaded


into the user’s computer without user’s knowledge. It replicates itself
and infects the files and programs on the user’s PC. The ultimate goal of
a virus is to ensure that the victim’s computer will never be able to
operate properly or even at all.
2) Computer Worm-Computer worm is a software program that can
copy itself from one computer to another, without human interaction.
The potential risk here is that it will use up your computer hard disk
space because a worm can replicate in greate volume and with great
speed.

3) Phishing-Disguising as a trustworthy person or business, phishers


attempt to steal sensitive financial or personal information through
fraudulent email or instant messages. Phishing in unfortunately very
easy to execute. You are deluded into thinking it’s the legitimate mail
and you may enter your personal information.

4) Botnet-Botnet is a group of computers connected to the internet, that


have been compromised by a hacker using a computer virus. An
individual computer is called ‘zombie computer’.
The result of this threat is the victim’s computer, which is the bot will be
used for malicious activities and for a larger scale attack like DDoS.

5) Rootkit – It is a computer program designed to provide continued


privileged access to a computer while actively hiding its presence. Once
a rootkit has been installed, the controller of the rootkit will be able to
remotely execute files and change system configurations on the host
machine.

6
What is computer security?
Computers are very essential part of our daily lives and it plays important
roles in our lives. So, the security of a computer is important because it
protects your information and helps to prevent from viruses and malware.
In this post, we will discuss on why is computer security important of our
lives.
Computer security is also known as cyber security or IT security which
mainly used for protection of computer system such as hardware and
software.

Why is computer security important?


The main purpose of the security is the preventing and detecting
unauthorized access of computer system. It guarantees to safe processing
and storage of business, healthcare and sensitive information. Cyber
security provides the Confidentiality, Integrity and Availability for all
components of a computer system.

Here are the same reasons why is computer security important?


To protect personal information- To prevent from cyber security
risk you have to protect your personal information. IT security is the first
prime issue to protect your personal and others information. By the way
you can keep your information secure using the following tips:
● Use antivirus Software
● Update operating system
● Use strong password
● Backup your data
● Lock your computer
● Avoid Phishing Emails
● protect your personal information

7
To protect organization properties-It is very important to
ensure the organization’s computer data because every organization
has many sensitive assets and information. So, without computer or
IT security you can’t guarantee the security of organization
properties.

To prevention from data theft- Data theft is act of stealing


sensitive information such as bank account details, credit card
information, passwords, and documents which stored on computers,
servers, or other
devices. The most common reasons of data breaches are as follows:
● Weak and stolen credentials
● Malicious insiders
● Application vulnerabilities
● Human Error
So, prevent from data theft you have to ensure your device security
by using endpoint security, lock down your computer, identify
critical data and use authentication.

To prevent from viruses and malware- Computer security


is also important to protect from computer viruses and malware’s. A
computer virus or malware can corrupt or delete your sensitive data,
damage your hard disk and it spreads from one computer to another
using email program and others. So, you have to protect your
computer from viruses and malware using following these tips:
● Keep your software up to date
● Use free antivirus software
● Use a strong password
● Don’t click on links within emails

8
Types of computer security
In this post, we will focus on the different types of computer security
such as application security, network security, internet security, data
security, information security and end user security.

1. Application security- Application security is the types of cyber


security which developing application by adding security features
within applications to prevent from cyber attacks. The attacks can be
SQL injection, denial of service (DoS) attacks, data breaches or
other cyber-attacks. There are some application security tools and
techniques such as firewalls, antivirus software, encryption, and web
application firewall which can help to prevent from cyber-attacks.

A web application firewall is designed to protect web applications by


filtering and monitoring HTTP harmful traffic. Here are the most used
Web Application Firewalls are: Fortinet FortiWeb, Citrix NetScaler App
Firewall,F5 Advanced WAF,Radware AppWall ,Symantec
WAF,BarracudaWAF, Imperva WAF,Sophos XG Firewall,SonicWallNSa

2. Information security- Information security (IS) is the types of


computer security which refers to the process and methodology to
protect the confidentiality, integrity and availability of computer
system from unauthorized access, use, modification and
destruction. Information security focuses on the CIA triad model,
which ensure confidentiality, integrity, and availability of data,
without affecting organization productivity.

3. Network security-Network security is other types of IT security


which process of preventing and protecting against unauthorized
intrusion into computer networks. It is a set of rules and
configurations which designed to protect the confidentiality,
integrity and accessibility of computer networks system and
information using both software and hardware technologies.
9
4. Endpoint security- Human error is a major weak point which is
easily exploited by cyber criminals. End users are becoming the
largest security risk in any organizations. However, end user has no
fault of their own, and mostly due to a lack of awareness and ICT
policy. They can unintentional open the virtual gates to cyber
attackers. That’s why comprehensive security policies, procedures
and protocols have to be understood in depth by users who accessing
the sensitive information. It is better to providing security awareness
training program to them and should cover the following topics:
Cyber security and its importance Phishing and Social Engineering
attack Password creation and usages Device Security Physical
Security Learn More About Social Engineering Attack.

5. Internet security- Internet security is the important types of


computer security which has defined as a process to create set of
rules and actions to protect computers system that are connected to
the Internet.

Network security methods:-


There are different components or methods to improve network security. Here,
we have mentioned the most common network security components. Antivirus
Software Application Security Behavioural Analytics Data Loss Prevention
(DLP) Email Security Firewalls Mobile Device Security Network Segmentation
Security Information and Event Management (SIEM) Virtual Private Network
(VPN) Web Security Wireless Security Network Access Control (NAC).

10
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There
is much need for one to arm oneself with information and resources to safeguard
against these complex and growing computer security threats and stay safe online.
Some preventive steps you can take include:

Secure your computer physically by:


✓ Installing reliable, reputable security and anti-virus software
✓ Activating your firewall, because a firewall acts as a security guard
between the internet and your local area network
Stay up-to-date on the latest software and news surrounding your devices
and perform software updates as soon as they become available
Avoid clicking on email attachments unless you know the source
Change passwords regularly, using a unique combination of numbers,
letters and case types
Use the internet with caution and ignore pop-ups, drive-by downloads
while surfing
Taking the time to research the basic aspects of computer security
and educate yourself on evolving cyber-threats
Perform daily full system scans and create a periodic system backup
schedule to ensure your data is retrievable should something happen to
your computer.

Apart from these, there are many ways you can protect your computer
system. Aspects such as encryption and computer cleaners can assist in protecting
your computers and its files.

Unfortunately, the number of cyber threats are increasing at a rapid pace and more
sophisticated attacks are emerging. So, having a good foundation in cybersecurity
concepts will allow you to protect your computer against ever-evolving cyber
threats.

11
Conclusion

In conclusion, computer security is crucial in today’s digital age to protect


systems and data from various threats and attacks. It involves a combination of
practices and technologies to ensure the confidentiality, integrity, and availability
of information. It is also known as cyber security is that it is absolutely vital in our
modern digital age. We cannot afford to ignore the dangers of cyber attacks, data
breaches, and other online threats. Instead, we must take proactive steps to protect our
information and systems from these threats. Here are some key takeaways from the
importance of cyber security:
❖ Cyber security must be an ongoing effort: Threats to our information and
systems are constantly evolving, so we must remain vigilant and keep our
security measures up-to-date at all times.
❖ Prevention is key: The best way to defend against cyber attacks is to prevent
them from happening in the first place. This means implementing strong security
measures, such as firewalls, anti-virus software, and encryption.
❖ Education is crucial: Everyone who uses the internet and digital devices must
be aware of the risks and best practices for staying safe online. Education and
awareness campaigns are key to protecting against cyber threats.
❖ Collaboration is necessary: Cyber security is not just the responsibility
of individual users, but also of businesses, governments, and other
organizations. Collaboration and information-sharing can help us stay
ahead of cyber threats. In conclusion, cyber security is an essential part of
our digital lives and we must take it seriously. By implementing strong
security measures, staying informed and educated about online risks, and
working together to prevent and respond to cyber attacks, we can protect
ourselves and our digital assets.

12
References
❖www.wikipedia.com
❖www.greeks.forgreeks.com
❖www.slideshare.net
❖www.copilot.com

13
Shivaji Rao S. Jondhale Polytechnic, Ambernath(E)

Teacher Evaluation Sheet

Academic Year (2023-2024)


Project title: Computer Technology
Course title & code: NIS
Semester: 6th
Course outcome:
➢ Follow safety practices.
➢ Practice good housekeeping.
➢ Demonstrate working as a lead 1 team member.
➢ Maintain tools and equipment
➢ Follow ethical practices.

Marks

Roll No. Name of Student Marks of group Marks obtained Total Marks
work A by the individual (A+B)
(Out of 4) based in Viva B
(Out of 6)

1418 Kunal Sharma

1421 Karishma Verma

1420 Manali Shinde

1410 Ruchika Mehta

Name and Signature of Faculty:

14
15

You might also like