FINAL NIS Mahima
FINAL NIS Mahima
FINAL NIS Mahima
Micro Project On
“ Computer Security ”
Submitted By
08.Mahima Mogal
Under Guidance of
Mrs. J. C. Joshi
Sinhgad Institutes
Sinhgad Technical Education Society’s
SOU. VENUTAI CHAVAN POLYTECHNIC, PUNE - 411041
ACADEMIC YEAR 2023 - 2024
Maharashtra State Board of technical
Education Certificate
This is to certify that Mrs .Mahima Mogal with Roll No. 08 Six
Semester of Diploma in Information Technology of Institute Sou.
Venutai Chavan Polytechnic (Code:0040) has successfully
completed the Micro-Project in Network and Information Security
(22620) for the academic year 2023-2024.
A. BRIEF INTRODUCTION:
This project is a comprehensive guide to computer security. It covers the various threats you might
encounter online, including malware, phishing attacks, and social engineering. It also provides
steps you can take to protect yourself, such as using strong passwords, keeping software updated,
and being cautious about what you click on online. Overall, the project teaches you how to stay
safe in the digital world.
D.RESOURCES REQUIRED:
Name of Resource
Sr. No. Specification
Required
1 Laptop Intel (R) Core i3- 8GB RAM
2 Operating system Windows 11
3 Software Word
ACTION PLAN:
GROUP MEMBERS:
Computer network security is an important aspect in today's world. Now days due to various threats
designing security in organization is an important consideration. It is essential to understand basic
security principles, various threats to security and techniques to address these threats. The student
will be able to recognize potential threats to confidentiality, integrity and availability and also able
to implement various computer security policies. This course will introduce basic cryptographic
techniques, fundamentals of computer/network security, Risks faced by computers and networks,
security mechanisms, operating system security, secure System design principles, and network
security principles. Also, it will create awareness about IT ACT and different Cyber laws.
a) Identify risks related to Computer security and Information hazard in various situations.
S. No Course Outcomes
A. Identify risks related to Computer security and Information hazard in various situations.
08 Mahima Mogal
Effective computer security encompasses a multifaceted approach, spanning various domains to create a
comprehensive defense posture. Access control mechanisms play a pivotal role in regulating entry to
systems and sensitive data, relying on robust authentication, authorization, and encryption protocols.
Meanwhile, network security measures such as firewalls, intrusion detection systems, and virtual private
networks serve as bulwarks against external threats seeking to infiltrate organizational infrastructure.
Similarly, endpoint security strategies aim to secure individual devices, including computers and
smartphones, against malware and unauthorized access. By deploying antivirus software, endpoint
detection and response solutions, and mobile device management platforms, organizations can bolster
their resilience at the device level. Additionally, prioritizing data protection through encryption,
masking, and data loss prevention solutions ensures that sensitive information remains shielded from
prying eyes. These security measures, coupled with ongoing awareness training, incident response
protocols, and compliance with regulations, collectively fortify organizations against the relentless
onslaught of cyber threats.
1)Viruses
Viruses are malicious programs designed to replicate and infect files and programs on a user's computer
without their knowledge or consent. These harmful entities operate by embedding themselves into
legitimate software and spreading to other files and systems. Their ultimate goal is to disrupt the victim's
computer's functionality or render it completely inoperable. Viruses can cause a range of damaging
effects, including data corruption, system instability, unauthorized access, propagation across networks,
and resource drain. To protect against viruses, users should employ robust antivirus software, keep their
operating systems and software up to date with the latest security patches, exercise caution when
downloading files or clicking on links from unknown sources, and regularly scan their systems for
malware infections. Additionally, practicing safe browsing habits and implementing proper security
measures can help minimize the risk of virus infections and mitigate their potential impact.
2)Worm
Worms are self-replicating malware that spread across computer networks, exploiting vulnerabilities in
operating systems, applications, or network protocols. Unlike viruses, worms do not require a host
program to attach themselves to; they can propagate independently, often at a rapid pace. Once a worm
infects a system, it can exploit security vulnerabilities to install backdoors, steal sensitive information, or
launch distributed denial-of-service (DDoS) attacks.
3) Phishing
Phishing is a cyber attack method that involves tricking individuals into divulging sensitive information
such as usernames, passwords, credit card numbers, or other personal data by masquerading as a
trustworthy entity in electronic communication. Phishing attacks typically occur through email, instant
messaging, social media, or fraudulent websites that mimic legitimate ones. These deceptive
communications often contain urgent messages or enticing offers designed to manipulate recipients into
clicking on malicious links or attachments, thereby compromising their security.
Phishing attacks can have severe consequences, including identity theft, financial fraud, and
unauthorized access to sensitive accounts or systems. Moreover, phishing campaigns can target both
individuals and organizations, posing a significant threat to data privacy and security.
5) Rootkit
A rootkit is a type of malicious software that is designed to conceal its presence or the presence of other
malware on a compromised system. Rootkits achieve this by gaining privileged access to the operating
system (often through exploiting vulnerabilities or using stolen credentials) and manipulating system
files, processes, and system calls to evade detection by antivirus software and security mechanisms.
Rootkits can be used by attackers to maintain persistent access to compromised systems, steal sensitive
information, execute unauthorized commands, and undermine the integrity of the system. They are often
employed as part of advanced, targeted attacks aimed at high-value targets, such as government
agencies, financial institutions, or large enterprises.
Detecting and removing rootkits can be challenging due to their stealthy nature and ability to evade
traditional security measures. However, several techniques can help mitigate the risk of rootkit
infections, including regularly scanning systems with rootkit detection tools, monitoring system logs for
suspicious activity, implementing least privilege access controls to limit the impact of compromised
accounts, and maintaining strict patch management practices to address known vulnerabilities that
rootkits may exploit.
5) Keylogger
A keylogger, also known as keystroke logging or keyboard capturing, is a type of surveillance software
or hardware that records the keystrokes typed by a user on a keyboard. Keyloggers can capture a wide
range of information entered by users, including usernames, passwords, credit card numbers, emails,
instant messages, and other sensitive data.
Keyloggers can be deployed through various means, including software installed on a computer or
mobile device, hardware devices inserted between the keyboard and computer, or remotely through
malware infections. Once installed, keyloggers operate stealthily in the background, silently recording
all keystrokes entered by the user and transmitting the captured data to a remote attacker.
To defend against keyloggers, individuals and organizations should employ several preventive measures.
This includes regularly updating antivirus and antimalware software to detect and remove keylogger
infections, using endpoint security solutions that include keylogger detection capabilities, implementing
security awareness training to educate users about the risks of keyloggers and safe computing practices,
and using virtual keyboards or secure input methods for entering sensitive information, particularly on
public or shared devices. Additionally, employing encryption for sensitive data and practicing good
password hygiene, such as using strong, unique passwords for each account, can help mitigate the risk of
keylogger attacks.
COMPUTER SECURITY IMPORTANCE?
Computers are very essential part of our daily lives and it plays important roles in our lives. So, the
security of a computer is important because it protects your information and helps to prevent from
viruses and malware. In this post, we will discuss on why is computer security important of our lives.
Computer security is also known as cyber security or IT security which mainly used for protection of
computer system such as hardware and software.
The main purpose of the security is the preventing and detecting unauthorized access of computer
system. It guarantees to safe processing and storage of business, healthcare and sensitive information.
Cyber security provides the Confidentiality, Integrity and Availability for all components of a computer
system.
0
4. TO PREVENT FROM VIRUSES AND MALWARE
Computer security is also important to protect from computer viruses and malware’s. A computer virus
or
malware can corrupt or delete your sensitive data, damage your hard disk and it spreads from one
computer to another using email program and others. So, you have to protect your computer from
viruses and malware using following these tips:
o Keep your software up to date
o Use free antivirus software
o Use a strong password
o Don’t click on links within emails
o Back up your computer
o Use a pop-up blocker
Application security is the types of cyber security which developing application by adding security
features within applications to prevent from cyber attacks. The attacks can be SQL injection, denial of
service (DoS) attacks, data breaches or other cyber-attacks.
There are some application security tools and techniques such as firewalls, antivirus software,
encryption, and web application firewall which can help to prevent from cyber-attacks.
A web application firewall is designed to protect web applications by filtering and monitoring HTTP
harmful traffic. Here are the most used Web Application Firewalls are:
o Fortinet FortiWeb
o Citrix NetScaler App Firewall
o F5 Advanced WAF
o Radware AppWall
o Symantec WAF
o Barracuda WAF
o Imperva WAF
o Sophos XG Firewall
o SonicWallNSa
2. INFORMATION SECURITY
Information security (IS) is the types of computer security which refers to the process and methodology
toprotect the confidentiality, integrity and availability of computer system from unauthorized access,
use, modification and destruction. Information security focuses on the CIA triad model, which ensure
confidentiality, integrity, and availability of data, without affecting organization productivity.
3. NETWORK SECURITY
Network security is other types of IT security which process of preventing and protecting against
unauthorized intrusion into computer networks. It is a set of rules and configurations which designed to
protect the confidentiality, integrity and accessibility of computer networks system and information
using both software and hardware technologies.
4. ENDPOINT SECURITY
Human error is a major weak point which is easily exploited by cyber criminals. End users are becoming
the largest security risk in any organizations. However, end user has no fault of their own, and mostly
due to a lack of awareness and ICT policy. They can unintentional open the virtual gates to cyber
attackers. That’s why comprehensive security policies, procedures and protocols have to be understood
in depth by users who accessing the sensitive information. It is better to providing security awareness
training program to them and should cover the following topics:
Cyber security and its importance
o Phishing and Social Engineering attack
o Password creation and usages
o Device Security
o Physical Security
o Learn More About Social Engineering Attack
5. INTERNET SECURITY
Internet security is the important types of computer security which has defined as a process to create set
of rules and actions to protect computers system that are connected to the Internet.
Conclusion
The study explores how management principles are applied in small-scale industries to ensure
their success amidst challenges like limited resources and market volatility. By optimizing
resources, focusing on customer needs, strategic planning, and effective financial management,
these enterprises can compete