Project Synopsis

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

PROJECT SYNOPSIS

OF MAJOR PROJECT

BACHELOR OF TECHNOLOGY
CS-A

SUBMITTED BY: GUIDED BY :


ARPIT SACHAN MR.
ASHUTOSH SINGH DHAUNI MR.
SIDDHARTH SHARMA

College of Engineering Roorkee


Roorkee
OCTOBER, 2018
OBJECTIVE

The objectives of the project are-


 Reduced crime rates.
 Increased accuracy and reliability over security.

MODIFICATION AND IMPROVEMENT OVER THE EXISTING
IMPLEMENTATION

Present State:

 Software present
 Time consumed in accessing the records of the students.

 Students are informed by sending mail to them manually.
 Headache of placement cell is more to manage the information of students manually.
 More time taken to registration of students on registration forms.

After implementation of project:

 Easy to use GUI.


 Students can register online no rush for registration in Placement department.
 Respective eligible students can get informed by email automatically.
 List of eligible students can be made on single click.
 Report of students according to need of placement cell can be generated easily.
 Burden of Placement cell decreases.
SCOPE

This project has a large scope as it has the following features which help in making it easy to use,
understand and modify it:

 Automation of Cyber Security


 No Need to do Paper Work.
 To save the owner from threats
 To increase the protection of the owner.

This software can be readily used by programming personal avoiding human handled chance of
error. This project is used by
i. Cyber cell
SIGNIFICANCE OF PROJECT

The significance of the project is to provide the following benefits:


 The significance of project is security through obsecurity
 Used by cyber cells
 Helpful in catching ethical hackers
 Requires less time as compared to older hacking techniques
TOOLS AND TECHNOLOGY USED

Tool:
Necromancy : is a practice of magic involving communication with the deceased – either by
summoning their spirit as an apparition or raising them bodily – for the purpose of divination,
imparting the means to foretell future events or discover hidden knowledge, to bring someone
back from the dead, or to use the deceased as a weapon, as the term may sometimes be used in a
more general sense to refer to black magic or witchcraft.

Immunity debugger: Immunity Debugger is a powerful new way to write exploits, analyze
malware, and reverse engineer binary files. It builds on a solid user interface with function
graphing, the industry's first heap analysis tool built specifically for heap creation, and a large
and well supported Python API for easy extensibility.

Technology:
 PYTHON: Python is an interpreted high-level programming language for general
purpose programming. Created by Guido Van Rossum and first released in 1991, Python
ha a design philosophy that emphasizes code readability, notability using significant
whitespaces. It provides constructs that enable clear programming on both small and
large scales. Python features a dynamic type system and automatic memory management.
It supports multiple programming paradigms, including object-
oriented, imperative, functional and procedural, and has a large and
comprehensive standard library.
TIME FRAME REQUIRED FOR VARIOUS STAGES OF PROJECT
IMPLEMENTATION

Sr. PHASES TIME DURATION

No.

1. Software Requirement Specification 2 weeks

2. System Design 3 weeks

3. Coding 4 weeks

4. Implementation 5 weeks

5. Testing 2 week

REFERENCES
 www.hackster.io
 www.iotbreaks.com

You might also like