ETI Microproject1
ETI Microproject1
ETI Microproject1
EDUCTAION
MICRO PROJECT
Seal of
Institute
Emerging Trends in Computer
and Information Technology
Mrs.Mamta Mayekar
Brief Description:
8. Conclusion 10
Introduction
In 2009, compared to physical theft fraudulent money transfers has exceeded in bank
branchesof United States. Crimes have gone up by 60% every year, in 2012, 3500 cases and
2070 in 2011 reported in India. As per report from National Crime records Bureau (NCRS),
Maharashtra reports 561 cases, Andhra 454 cases, Karnataka 437 cases in the year 2012
crimes which are done by age group of 18 to 30 [18]. Haryana registered 3 cases in 2011 but
116in the year 2012 which is a drastic raise. Compared to other crimes, this cybercrime
doesn’t require much investment and can be done in various locations. These crimes
originate from various sources and exhibits socio-educational/economic and technological
including addiction which also includes counterfeiting, economic crimes, money
laundering,child pornography, sexual exploitation, drug trafficking, human trafficking,
terrorism, fraudetc.
In our interconnected world, where digital technology pervades every aspect of our lives,
cybersecurity stands as a paramount concern. With the rapid expansion of the digital
landscape comes an equally rapid proliferation of cyber threats, ranging from malicious
software and phishing attacks to sophisticated cyber espionage campaigns. These threats
pose significant risks to individuals, businesses, and governments alike, jeopardizing
sensitive data, financial assets, and even national security. In this project, we delve into
the pressing need for cybersecurity, exploring its vital role in protecting our digital
infrastructure, safeguarding against cyber attacks, and ensuring the resilience of our
increasingly digitized society. Through an examination of emerging threats, technological
solutions, policy implications, and future trends, we aim to shed light on the critical
importance of proactive cybersecurity measures in mitigating risk and fostering a secure
digital environment for all.
The increase in cybercrimes in recent years can be given to several valid reasons here are
some:
1. Expanding Digital Footprint: As society becomes more reliant on digital technologies for
communication, commerce, and entertainment, the potential attack surface for
cybercriminals expands. The proliferation of internet-connected devices, known as the
Internet of Things (IoT), provides cybercriminals with more entry points to exploit
vulnerabilities.
4. Anonymity and Global Reach: The anonymity provided by the internet allows
cybercriminals to operate from anywhere in the world, making it difficult for law
enforcement agencies to track and apprehend them. Additionally, the borderless nature of the
internet enables cybercriminals to target victims globally, amplifying the impact of their
attacks.
5. Evolving Cyber Threat Landscape: The rapid evolution of technology introduces new cyber
threats and vulnerabilities, outpacing the ability of individuals and organizations to keep pace
with cybersecurity defenses. Emerging technologies such as artificial intelligence,
cryptocurrency, and quantum computing present both opportunities and challenges for
cybersecurity.
6. Lack of Awareness and Training: Many individuals and organizations lack awareness of
cybersecurity best practices and fail to implement adequate security measures. Additionally,
a shortage of skilled cybersecurity professionals exacerbates the problem, leaving gaps in
cybersecurity defenses and making it easier for cybercriminals to exploit vulnerabilities.
7. State-Sponsored Cyber Attacks: Nation-states and state-sponsored threat actors engage in
cyber espionage, cyber warfare, and sabotage for political, economic, or military purposes.
These sophisticated and highly orchestrated attacks target critical infrastructure,
government agencies, and private sector organizations, posing significant cybersecurity
challenges.
More online transactions and digital data. Transaction and customer information, resultsof
product launches, and other market information are easily available. Creating valuable
intellectual property online is an attractive target.
Comparatively Corporations and companies are expected to be more transparent
than before.
Majority of people want to access to corporate networks through their
mobile devices for day to day activities. Though smarter technology devices increases
connectivity and but present latest types of security threats.
The dictionary meaning says that Cyber Security is state of being protected against the
criminal or unauthorized use of electronic data, or the measures taken to achieve this. It is
the collection of tools, policies, security concepts, security safeguards, guidelines, risk
managementapproaches, actions, training, best practices, assurance and technologies that
can be used to protect the cyber environment and organization and user’s assets.
Organization and user’s assets include connected computing devices, personnel,
infrastructure, applications, services, telecommunications systems, and the totality of
transmitted and/or stored information in the cyber environment.
Cyber security ensures the maintenance of the security properties of the organization and
user’sassets against security risks in the networked environments. It is the body of
technologies, processes and practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.
Just like physical security is aimed at protecting physical property and people from criminal
activity or accidental damage, cybersecurity protects computer systems, back-end systems
and end-user applications, the users of those systems, and the data they store.
Cyber security is aimed at preventing cybercriminals, malicious insiders, or others, from
accessing, harming, disrupting or modifying IT systems and applications.
This is part of an extensive series of guides about data security.
As human society goes digital, all aspects of our lives are facilitated by networks, computer
and other electronic devices, and software applications. Critical infrastructure including ,
financial institutions, governments, and manufacturing, all use computers or smart devices
as a core part of their operations.
Challenges in Cyber Security
Cyber security has been considered as one of the most urgent national security problems.
A report says, in a speech during his presidential campaign, President Obama promised
to “makecyber security the top priority that it should be in the 21st century and appoint a
National Cyber Advisor who will report directly” to the President.
Cyber security must address not only deliberate attacks, such as from disgruntled
employees, industrial espionage, and terrorists, but inadvertent compromises of the
information infrastructure due to user errors, equipment failures, and natural disasters.
Vulnerabilities might allow an attacker to penetrate a network, gain access to control
software, and alter load conditions to destabilize a network in unpredictable ways.
Cybercriminals continually develop advanced attack techniques, such as ransomware,
zero-day exploits, and social engineering, which evade traditional security measures
and pose significant challenges for detection and mitigation.
The human factor remains one of the weakest links in cybersecurity. Employees often
lack awareness of cybersecurity risks and best practices, making them vulnerable to
phishing attacks, social engineering, and other cyber threats. Providing comprehensive
cybersecurity awareness training and fostering a culture of security awareness are
essential for mitigating human-related risks.
Need for Cyber Security in India:
9.4% houses in India have computer (any of Laptop or Desktop). Chandigarh (U/T),
Goa and
NCT of Delhi are top three stats/union territories with highest computer usage.
According to 2011 Census, Only 3.1 percent of total houses have Internet access
in
India.
The census covered 24,66,92,667(246.7 million) houses in India and found only
76,47,473 (3.1%) of this houses use Internet. The Internet includes both broadband and
low-speed connections.
According to Internet World Stats on June 30 2012, there were 2.4 billion internet
users (2,405,510,175) worldwide. China was the largest countries in terms of internet
users with over538 million users [19]. The following graph (figure 1) shows top 20
internet countries worldwideat mid-year 2012:
China:
Aim of Micro Project:
1. To have fun.
3. Then we tried to get example related to the topic i.e. Trojan Attack
4. Then all the information was analyzed and accordingly the project was formatted.
Conclusion:
It helps us to gain knowledge about the trojan virus and its importance and also learn that
how to prevent this type of virus from computer systems.
Gained knowledge about how to prevent from this virus from different
the landscape of cybersecurity presents an ever-evolving challenge in our digitally
interconnected world. As we have explored throughout this project, the rise in cyber
crimes is driven by a combination of factors, including technological advancements,
financial incentives, global connectivity, and the evolving tactics of cybercriminals. How
amidst these challenges lies an opportunity for collaboration, innovation, and resilience.
MICRO PROJECT EVALUATION SHEET
NAME OF STUDENT: SAURABH VERMA
ENROLLMENT NO: 2201440214. SEMESTER: VI.
COURSE TITLE: Emerging trends in computer and information technology.
COURSE CODE: 22618
TITLE OF MICRO PROJECT: Need of Cyber Security.
Course Outcome Addressed:
a. Identify risks related to computer security and information hazard in various situations.
b. Apply User identification and authentication method.
c. Apply cryptographics algorithms and protocols to maintain computer security.
d. Maintain secured networks and describe Information Security Compliance standards
2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal
5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Viva
(A) (B)
Process and Product Assessment IndividualPresentation/Viva (4 marks) Total
(6 marks) (Marks 10)
2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal
4 Analysis of Data and
representation
5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Viva
(A) (B)
Process and Product IndividualPresentation/Viva (4 marks) Total
Assessment (6 marks) (Marks 10)
2 Literature
Review/information
Collection
3 Completion of the Target
as per project proposal
5 Quality of
Prototype/Model
6 Report Preparation
(B) Individual Pres entation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Viva
(A) (B)
Process and Product IndividualPresentation/Viva (4 marks) Total
Assessment (6 marks) (Marks 10)