KEMBAR78
MAN Report Ts | PDF | Computer Security | Security
0% found this document useful (0 votes)
34 views9 pages

MAN Report Ts

The micro project titled 'Study of Measures to Be Taken for Ensuring Cyber Security' aims to analyze existing threats and propose strategies to enhance cybersecurity awareness and practices. It includes a comprehensive methodology involving literature review, data collection, and evaluation of current technologies, ultimately leading to actionable recommendations. The project is conducted by students Shravani Dahale and Tushar Sarode from the Marathwada Institute of Technology, Polytechnic, as part of their Diploma in Electronics and Computer Engineering.

Uploaded by

tinu77gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views9 pages

MAN Report Ts

The micro project titled 'Study of Measures to Be Taken for Ensuring Cyber Security' aims to analyze existing threats and propose strategies to enhance cybersecurity awareness and practices. It includes a comprehensive methodology involving literature review, data collection, and evaluation of current technologies, ultimately leading to actionable recommendations. The project is conducted by students Shravani Dahale and Tushar Sarode from the Marathwada Institute of Technology, Polytechnic, as part of their Diploma in Electronics and Computer Engineering.

Uploaded by

tinu77gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Maharashtra State Board of Technical Education

Mumbai. (M.S.)

MICRO PROJECT ON :- “study of measures to be taken for


ensuring cyber security”

Submitted by -
SHRAVANI DAHALE(ROLL.NO.4)
TUSHAR SARODE (ROLL NO.19)

G.S. Mandal’s
Marathwada Institute of Technology, Polytechnic,
Chh. SambhajiNagar.
Department of Electronic and Computer Engineering
Academic Year: - 2024-25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

CERTIFICATE

This is to certify that: -


Roll
No. Name of the student Signature

4 Shravani Dahale

19 Tushar Sarode

have successfully completed “study of measures to be taken for ensuring cyber


security” , as in the enclosed ‘Portfolio’ during his / her tenure of Completing the
Diploma in Electronics and Computer Engineering (TE6I) in Academic Year 2024-25
from M.I.T. Polytechnic, Chh.Sambhaji Nagar.

Date:

Prof. Shaikh Asif Prof. M.G.Granthi


Guide H.O.D

Prof S.G.Deshmukh
Principal
Marathwada Institute of Technology, Polytechnic,
Chhatrapati Sambhaji Nagar.
INDEX

Annexure-IV :-

1.0 Aim/Benefits of Micro Project

2.0 Course Outcomes Addressed

3.0 Proposed Methodology

4.0 Action Plan

5.0 Resources required

Annexure-II A:-
“Format for Micro-Project Report”

1.0 Rationale

2.0 Aim/Benefits of Micro Project:

3.0 Course Outcomes Achieved

4.0 Literature Review

5.0 Actual Methodology Followed

6.0 Actual Resources Used

7.0 Outputs of the micro projects


Annexure-IV

Micro Project (Teacher Evaluation Sheet)

Name of Program: Diploma in Electronics and Computer Engineering


Semester: 6th
Course Title:TE6I / Code: 22032
Title of Micro Project: study of measures to be taken for ensuring cyber security

Process and Individual Total


Roll Name of Student Enrollment Presentation Marks
No. No. Product / Viva (10)
Assessment (04)
(06)

04 Shravani Dahale 2200660345


19 Tushar Sarode 2200660385

Comments / Suggestions about work:

____________________________________________________________

___________________________________________________________

Signature of Teacher: __________________________

Prof.Shaikh Asif
Annexure-I Micro-Project Proposal

Title of Micro-Project: study of measures to be taken for ensuring cyber


security

1.0 Aim/Benefits of Micro Project Aim:-


• A micro project on "Study of Measures to Be Taken for Ensuring Cyber Security"
aims to provide a comprehensive understanding of the cybersecurity landscape. The
primary objective is to analyze existing threats and vulnerabilities in digital systems
and propose effective strategies to address them. By focusing on this topic, the
project intends to educate individuals and organizations on best practices to
safeguard sensitive information and digital assets, ensuring a secure online
environment

Benefit :-
• The benefits of undertaking such a project are numerous. Firstly, it enhances
awareness by shedding light on the growing importance of cybersecurity in the
digital era. Participants also gain valuable skills by learning to identify and
counteract cyber threats, which can be applied to real-world scenarios. Additionally,
the project encourages the practical application of theoretical concepts, bridging the
gap between knowledge and practice. On a broader scale, implementing the
recommended measures contributes to improving the overall security of digital
systems. For students and professionals alike, this project serves as a stepping stone,
offering insights into a promising field and opening up opportunities for a career in
cybersecurity.

3.0 Proposed Methodology

• To conduct a study on measures for ensuring cybersecurity, the methodology


should start with a thorough literature review to understand current practices
and challenges. This would be followed by analyzing common threats such as
phishing, malware, and data breaches to assess their impact on individuals and
organizations. Surveys or interviews with IT professionals and cybersecurity
experts can provide valuable insights and real-world experiences. Assessing the
effectiveness of existing tools and technologies like firewalls, encryption
methods, and intrusion detection systems will help identify potential
improvements. Policies at organizational, national, and international levels
should also be reviewed to pinpoint gaps. Based on these findings, solutions
can be proposed, focusing on technical upgrades, user education, policy
enhancements, and best practices. Finally, a plan for implementation and
evaluation ensures the recommended measures are practical and effective.
This comprehensive approach addresses both technical and human aspects of
cybersecurity.

4.0 Action Plan

Sr. Details of Activity Planned Start Planned Finish Name of


No Date Date Responsible Team
Members

1 Testing and writing program 03/03/25 01/04/25 Shravani Dahale

2 About material and work 03/3/25 01/04/25 Tushar Sarode

- Names of Team Members with Roll No.: -

Name of the Student Roll no.

Shravani Dahale 4

Tushar Sarode 19
Annexure-II
Micro-Project Report

Title of Micro-Project : - study of measures to be taken for ensuring cyber security

1.0 Rationale
The rationale for studying measures to ensure cybersecurity lies in the growing reliance on
digital systems and the increasing frequency of cyber threats. In today's interconnected world,
sensitive data, financial transactions, and critical infrastructure are all vulnerable to
cyberattacks. Understanding and implementing effective cybersecurity measures is essential
to protect against threats such as data breaches, malware, and unauthorized access. This study
aims to identify vulnerabilities, propose solutions, and enhance awareness about best
practices, ultimately contributing to a safer digital environment. By addressing both technical
and human aspects, this study ensures that individuals and organizations are better equipped
to safeguard their digital assets and maintain trust in technology

2.0 Aim/Benefits of Micro Project:


The aim of a micro project on "Study of Measures to Be Taken for Ensuring Cyber Security"
is to explore, understand, and address the growing risks in the digital world. By identifying
vulnerabilities and analyzing preventive strategies, the project seeks to equip individuals and
organizations with the knowledge and tools required to safeguard their sensitive data and
systems. It aims to bridge the gap between theoretical knowledge and practical
implementation, fostering better awareness and security practices.

3.0 Course Outcomes Achieved


The course outcomes achieved through the study of measures to ensure cybersecurity include
the following:
1. Understanding Cybersecurity Principles: Gaining a comprehensive understanding
of the fundamental principles and practices of cybersecurity.
2. Threat Identification: Developing the ability to identify and analyze various cyber
threats, vulnerabilities, and risks.
3. Application of Security Measures: Learning to implement effective security
measures, including technical tools and policies, to protect systems and data.
4. Problem-Solving Skills: Enhancing analytical and problem-solving skills by
addressing real-world cybersecurity challenges.
5. Awareness of Legal and Ethical Aspects: Understanding the legal, ethical, and
regulatory aspects of cybersecurity to ensure compliance and responsible practices.
6. Teamwork and Communication: Improving collaboration and communication skills
through group activities and presentations related to cybersecurity.
7. Preparedness for Advanced Learning: Building a strong foundation for further
studies or careers in the field of cybersecurity.
4.0 Literature Review : -
A literature review for the study of measures to ensure cybersecurity involves
examining existing research, frameworks, and case studies to understand the
current landscape of cybersecurity threats and solutions. It highlights the
evolution of cybersecurity practices, from traditional information security to
more advanced strategies addressing modern challenges like ransomware,
phishing, and malware. Studies often emphasize the importance of integrating
technical tools, such as firewalls and encryption, with human-centric approaches
like user education and awareness programs.
Key findings from the literature include the growing reliance on automation and
artificial intelligence to detect and mitigate cyber threats. Additionally, the role
of governance and policy-making is frequently discussed, as effective
cybersecurity strategies require collaboration between organizations,
governments, and individuals. The review also underscores the need for
continuous adaptation, as cyber threats evolve rapidly in response to
technological advancements.

5.0 Actual Methodology Followed


The actual methodology followed for studying measures to ensure cybersecurity typically
involves a structured and systematic approach. It begins with a risk assessment to identify
vulnerabilities and potential threats to systems and data. This is followed by a literature
review to understand existing research, frameworks, and best practices in cybersecurity. Data
collection is then conducted through surveys, interviews, or case studies to gather real-world
insights and experiences.

Next, the evaluation phase involves analyzing the effectiveness of current technologies,
policies, and practices to identify gaps and areas for improvement. Based on these findings,
recommendations are developed, focusing on technical solutions, user education, and policy
enhancements. An implementation plan is then created, outlining the steps, resources, and
timelines required to apply the proposed measures. Finally, the methodology includes an
evaluation and feedback loop to test the effectiveness of the implemented measures and
refine the approach as needed
6.0 Actual Resources Used

Sr. Name of Resource/Material Specification Qty. Remarks


No

1 Computer system 16 GB RAM, 1


Windows 11 OS

2 Internet Wikipedia 1

3 Textbook/Manual Python 1

The study of measures to ensure cybersecurity involves utilizing a diverse range of resources.
Research papers, journals, and white papers provide in-depth insights into cybersecurity trends,
challenges, and emerging solutions. Practical tools such as firewalls, antivirus software, encryption
technologies, and intrusion detection systems help in understanding technical aspects. Real-world case
studies are invaluable for analyzing vulnerabilities and effective countermeasures. Surveys and
interviews with IT professionals, cybersecurity experts, and users bring practical experiences and
challenges into focus. Policy documents, including organizational, national, and international
frameworks, serve as a basis for understanding regulations and governance. Online platforms such as
courses, webinars, and tutorials offer accessible knowledge and training on the latest cybersecurity
practices. Additionally, books and manuals provide theoretical and methodological guidance for
deeper learning. Together, these resources form a comprehensive foundation for studying and
improving cybersecurity measures

7.0 Outputs of the micro projects

The primary output of the micro-project is a functional chatbot capable of understanding and
responding to basic user queries. This chatbot demonstrates the successful application of Python and
AI tools. Additionally, the project documentation highlights the development process, challenges
faced, and potential areas for improvement. The chatbot, combined with the knowledge and experience
gained, serves as a foundation for future advancements in conversational AI applications.

You might also like