CSR
CSR
A SEMINAR REPORT
ON
SUBMITTED BY
SUJAY SUBHASH ANKALGI
(SEAT NO. T1902107928)
(YEAR 2024-25)
i
Cyber_Security 2024-25
CERTIFICATE
is a bonafide work carried out under the supervision and guidance of Mr Y.R Chandwade and it is
approved for the partial fulfillment of the requirements of University of Pune, Pune for the award of the
Degree of Bachelor of Robotics and Automation Engineering.
Place: Pune
Date:
ii
Cyber_Security 2024-25
ACKNOWLEDGEMENT
I am deeply indebted to my seminar guide, Mr Y.R Chandwade, for his valuable suggestions,
scholarly guidance, constructive criticism and constant encouragement at every step of the seminar.
I also, would like to express our deepest gratitude to Mr V D Dholle, Head of Production
Engineering Department and Dr D S Bormane, Principal, AISSMS College of Engineering for all support
extended.
I wish to thank Mr Subhash Ankalgi (DGM BSNL) and Mr M. P. Bauskar (Professor) for for
constant guidance, co-operation, inspiration and practical approach, which provided me the much needed
impetus to work hard. I also thank all other persons who directly and indirectly contributed in successful
completion of seminar.
EMAIL ID:
ankalgi.sujay2004@gmail.com
iii
Cyber_Security 2024-25
List of Figures
Title Page No
iv
Cyber_Security 2024-25
List of Tables
Title Page No
v
Cyber_Security 2024-25
Title
APTS Advanced Persistent Threats
MFA Multi-Factor Authentication
CIA Triad Confidentiality, Integrity, And Availability
IDS Intrusion Detection Systems
SIEM Security Information And Event Management
GDPR General Data Protection Regulation
HIPAA Health Insurance Portability And Accountability Act
PCI DSS Payment Card Industry Data Security Standard
NSIT National Institute Of Standards And Technology
IoT Internet Of Things
CCPA California Consumer Privacy Act
ISO International Organization For Standardization
IPS Intrusion Prevention Systems
EDR Endpoint Detection And Response
NGFW Next-Generation Firewalls
DLP Data Loss Prevention
IAM Identity And Access Management
RBAC Role-Based Access Control
SOCs Security Operations Centers
EHR Electronic Health Records Systems
ICS Industrial Control Systems
vi
Cyber_Security 2024-25
ABSTRACT
Key approaches explored include the deployment of firewalls, encryption mechanisms, and
AI-based anomaly detection models, which are critical in identifying and mitigating
potential cyber threats.
In addition to preventive measures, the project evaluates real-time monitoring systems that
provide continuous surveillance of network activities, as well as incident response strategies
designed to quickly address breaches and minimize damage. To validate the effectiveness
of these security enhancements, a case study was conducted that simulated various
cyberattacks. The results showed a notable improvement in threat detection capabilities, as
well as significantly faster response times to incidents.
This report not only highlights the successful implementation of advanced cybersecurity
protocols but also identifies best practices for organizations to adopt in order to strengthen
their overall cybersecurity posture. The findings underscore the importance of integrating
proactive and reactive security measures, paving the way for more resilient digital
infrastructures in the face of escalating cyber risks.
vii
Cyber_Security 2024-25
CONTENTS
Acknowledgement iii
List of Figures iv
List of Tables v
viii
Cyber_Security 2024-25
1.INTRODUCTION
In today's increasingly digital world, cybersecurity has become a critical concern for
organizations and individuals alike. The rapid evolution of technology, coupled with
the growing sophistication of cyberattacks, has exposed significant vulnerabilities
in digital infrastructure. Cybercriminals are continually developing new methods to
breach systems, compromise sensitive data, and disrupt operations, making it
essential for organizations to adopt robust cybersecurity measures.
The case study results provide valuable insights into the strengths and limitations of
current cybersecurity practices, offering recommendations for organizations to
further strengthen their defenses .
1|Page
Cyber_Security 2024-25
2|Page
Cyber_Security 2024-25
2. LITERATURE REVIEW
Cybersecurity has become vital in the modern digital age, as organizations increasingly
rely on technology for business operations, data storage, and critical processes. The rise
in both the frequency and sophistication of cyberattacks has led to substantial research into
effective cybersecurity measures and frameworks. This literature examines vulnerabilities,
advanced threat detection methods, preventive techniques, and incident response
strategies to mitigate risks and strengthen security.
The role of AI and machine learning in cybersecurity has become increasingly significant.
These technologies enable automated threat detection and response, improving the ability
to manage vast amounts of data and detect complex attacks. Machine learning models
continuously evolve, becoming more adept at identifying and responding to new threats,
making them invaluable tools in modern cybersecurity strategies.
Case studies demonstrate the practical application of these measures across various
industries. Financial institutions using AI-driven threat detection systems have seen
reductions in fraud, while healthcare organizations targeted by ransomware have
successfully adopted multi-layered defenses like encryption, real-time monitoring, and
incident response. These examples highlight the effectiveness of comprehensive
cybersecurity strategies.
4|Page
Cyber_Security 2024-25
3. METHODOLOGY
3.1 Fundamentals of Cybersecurity:-
Cybersecurity is a critical field focused on protecting computer systems, networks, and data
from cyber threats, including unauthorized access, theft, damage, and disruption.
Understanding the fundamentals of cybersecurity is essential for organizations and
individuals to safeguard their digital assets effectively. Here are some key concepts:
5|Page
Cyber_Security 2024-25
5. Risk Management
Cybersecurity involves assessing and managing risks to digital assets. This includes
identifying assets, evaluating potential threats, and implementing controls to mitigate risks.
A risk management framework often includes the following steps:
• Risk Assessment: Identifying and analyzing risks to determine their potential impact.
• Risk Mitigation: Implementing controls to reduce the likelihood and impact of identified
risks.
• Risk Monitoring: Continuously monitoring the risk environment and adjusting controls as
necessary.
6. Incident Response
An effective incident response plan is crucial for minimizing the impact of cyber incidents.
The typical stages include:
• Preparation: Establishing an incident response team and developing response plans.
• Detection and Analysis: Identifying and assessing incidents as they occur.
6|Page
Cyber_Security 2024-25
• Containment, Eradication, and Recovery: Taking steps to limit damage, remove the
threat, and restore systems to normal operation.
• Post-Incident Review: Analyzing the incident to improve future responses and strengthen
security measures.
8. Cybersecurity Frameworks
Several established frameworks provide guidelines and best practices for managing
cybersecurity risks. Notable frameworks include:
• NIST Cybersecurity Framework: A voluntary framework that provides a structured
approach to managing cybersecurity risk.
7|Page
Cyber_Security 2024-25
2. Emerging Threats
• Ransomware Evolution: Analyze the growing sophistication of ransomware attacks and
the emergence of double extortion tactics, where attackers threaten to release stolen data
if ransom is not paid.
• Supply Chain Attacks: Examine the increasing prevalence of attacks targeting third-
party vendors and suppliers, as seen in incidents like the SolarWinds breach.
• IoT Vulnerabilities: Discuss the security risks associated with the proliferation of Internet
of Things (IoT) devices and the challenges of securing these interconnected systems.
8|Page
Cyber_Security 2024-25
• Continuous Education and Training: Emphasize the importance of regular training and
awareness programs for employees to reduce human error and improve overall security
awareness.
9|Page
Cyber_Security 2024-25
10 | P a g e
Cyber_Security 2024-25
India experienced a high number of cyberattacks in the first six months of 2024 with key fields
like education, defence and research among the "victims." Various government branches and
the technology sector were also among the primary targets while healthcare, banking,
manufacturing, and consumer services were also hit.
The six-month period witnessed 388 data breaches, 107 data leaks, 39 ransomware activities,
and 59 cases of access sales or leaks. The Telegram app was a hotbed for data breaches and
scams. A hub of hackers, Telegram is used as the platform to coordinate attacks and share
information.
The findings were released by the 'India Breach Report' by FalconFeeds, a product of
cybersecurity firm Technisanct. Government and public sector entities were disproportionately
affected, with the Centre bearing the brunt of the attacks, it claimed.
According to the report, March and April witnessed an increase in cyber incidents. It peaked
in May before dropping significantly in July. Notably, a surge in incidents of cyberattacks
coincided with the Lok Sabha Elections 2024 which was held from April 19 to June 1.
11 | P a g e
Cyber_Security 2024-25
Data breaches being the most common form of cyber attack in India means leading
organisations lack robust data protection measures. Sensitive information belonging to these
institutions remains "highly vulnerable" to exposure, FalconFeeds warns in the report.
The report identified as many as "71 victims" of cyber attacks in the public and government
sectors between January and June. Even military, defence, law enforcement sectors were hit
along with several departments headed by state governments, it said. The states of Bihar,
Kerala, Haryana, New Delhi, Karnataka and Andhra Pradesh were among the most hit in the
list released by the cybersecurity firm.
12 | P a g e
Cyber_Security 2024-25
Since January 1, 2024, India has been witnessing a staggering 7,000 complaints of cyber fraud
per day. The growth over the past few years is concerning:
2019 26,049
2020 2,55,777
2021 4,52,414
2022 9,56,790
2023 15,56,215
2024(Jan-Apr) 7,40,957
Table 4.1 : India’s Alarming Cyber Fraud Surge
13 | P a g e
Cyber_Security 2024-25
The Indian Cybercrime Coordination Centre (I4C) wing of the Ministry of Home Affairs
(MHA) reports on cybercrime in India:
• Loan apps
• Gaming apps
• Dating apps
• Algorithm manipulation
14 | P a g e
Cyber_Security 2024-25
1. Enhanced Threat Detection with AI and ML: AI-powered solutions can identify
patterns and detect threats more accurately and quickly, helping prevent breaches in real-
time.
3. Improved Cloud Security: Advances in cloud security tools help address vulnerabilities
in multi-cloud and hybrid environments, supporting secure, scalable cloud adoption.
4. Focused IoT Security: The push toward securing IoT devices mitigates risks associated
with interconnected systems, making it safer to deploy IoT in smart cities, healthcare, and
other critical sectors.
6. Stronger Compliance and Data Privacy: New regulations and compliance frameworks
ensure better data protection, safeguarding user privacy and fostering public trust.
15 | P a g e
Cyber_Security 2024-25
4. Ethical and Privacy Concerns: AI in cybersecurity may infringe on privacy, and misuse
of data in threat detection raises ethical issues regarding user information.
2. Zero-Trust Architecture : Network security across industries, ensuring every user and
device is verified and continuously monitored. Healthcare systems implement zero-
trust models to protect sensitive patient data and limit access within electronic health
records (EHR) systems.
16 | P a g e
Cyber_Security 2024-25
17 | P a g e
Cyber_Security 2024-25
5. CASE STUDY:-
The 2024 Lebanon pager explosions were part of a covert cyber-physical sabotage
operation targeting Hezbollah, reportedly carried out by Israel’s Unit 8200, an elite cyber-
intelligence division.
The operation involved embedding explosives into pagers used by Hezbollah operatives.
These pagers, an older communication technology, were selected by Hezbollah to evade
modern surveillance and electronic warfare techniques, as they generate less metadata
compared to smartphones.
18 | P a g e
Cyber_Security 2024-25
6.2 Fake product listings on real shopping sites lead to stolen payment information
More than 1,000 legitimate shopping sites have been compromised to promote fake
product listings in a credit card phishing scheme dubbed “Phish ‘n’ Ships,”
HUMAN’s Satori Threat Intelligence and Research team revealed Thursday.
Researchers believe that the scheme, which has been ongoing since 2019, has affected
hundreds of thousands of online shoppers and raked in tens of millions of dollars in
stolen funds.
The threat actors behind Phish ‘n’ Ships have built 121 fake online stores that receive
traffic through both search engines and listings on compromised sites, and have
abused four different third-party payment processors in the scam campaign.
19 | P a g e
Cyber_Security 2024-25
7. CONCLUSION
In today's increasingly digital world, cybersecurity has become a paramount concern for
individuals and organizations alike. As cyber threats continue to evolve in complexity and
frequency, the need for robust cybersecurity measures has never been more critical. This
report highlights the fundamental principles of cybersecurity, the current trends and
emerging threats, and the essential tools and technologies that can be employed to
safeguard digital assets.
20 | P a g e
Cyber_Security 2024-25
8. REFERENCES
Reference to a book:
Introduction to Cyber Security: Author Dr. Jeetendra Pande, Assistant Professor School of
CS & IT, Uttarakhand Open University, Haldwani
21 | P a g e