GOVERNMENT POLYTECHNIC, NANDED MICRO PROJECT Academic year: 2020-21 TITLE OF THE PROJECT COMPUTING SECURITY Program: Information Tech. Course: NIS Program code: IF6I Course code: 22620 Name of Guide: - Mr. S. N. Dhole Sir MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION Certificate This is to certify that Mr. GHODE AJIT G. Roll No. 1551 of 6th Semester of Diploma in Information Technology of Institute, GOVERNMENT POLYTECHNIC NANDED has completed the Micro Project satisfactorily in Subject –NIS(22620) for the academic year 2020- 2021 as prescribed in the curriculum. Place: Nanded Date: ……………………… Subject Teacher Mr. S. N. DHOLE SIR Exam. Seat No: ………………........... Head of the Department Mr. S.N DHOLE SIR Principal DR. G.V. GARJE SIR WEEKLY PROGRESS REPORT TITLE OF THE MICRO PROJECT:WEEK ST 1 2ND 3RD 4TH 5TH 6TH 7TH 8TH 9TH 10TH 11TH 12TH 13TH 14TH 15TH 16TH COMPUTING SECURITY ACTIVITY PERFORMED Discussion and finalization of Topic Discussion and finalization of Topic Preparation and submission of Abstract Literature Review Collection of Data Collection of Data Collection of Data Collection of Data Discussion and Outline of Content Formulation of Content Editing and 1st Proof Reading of Content Editing and 2nd Proof Reading of Content Compilation of Report and Presentation Seminar Viva-voce Final submission of Micro project Sign of the student GHODE AJIT G.(1551)- SIGN OF GUIDE DATE Sign of the faculty Mr. S. N. DHOLE SIR ANEEXURE II Evaluation Sheet for the Micro Project Academic Year: 2020-21 Name of the Faculty: Mr.S. N. DHOLE SIR Course: NIS Course code: 22620 Semester: VI Title of the project: COMPUTING SECURITY Cos addressed by Micro Project: A: Study of Computer security B: Study of network security (a) Practical outcome: Study of computer security (b) Unit outcomes in Cognitive domain: 1) Study of Infomation security 2) Study of Network security (c) Outcomes in Affective domain: 1) Follow safety practices. 2) Practice good housekeeping. 3) Demonstrate working as a lead 1 team member. 4) Maintain tools and equipment. 5) Follow ethical practices. Roll No 1551 Student Name Ghode Ajit G. (Signature of Faculty) Mr. S. N. DHOLE SIR. Marks out of 4 for performance in group activity (D5 Col.8) Marks out of 2for performance in oral/ presentation (D5 Col.9) Total out of 06 SR.NO. CONTENT 1 Introduction 2 Computer security threats 1) Viruses 2) Worm 3) Phishing 4) Botnet 5) Rootkit 6) Keylogger 3 Computers Security importance 1. TO PROTECT PERSONAL INFORMATION 2. TO PROTECT ORGANIZATION PROPERTIES 3. TO PREVENTION FROM DATA THEFT 4. TO PREVENT FROM VIRUSES AND MALWARE 4 Types of computer security 1. APPLICATION SECURITY 2. INFORMATION SECURITY 3. NETWORK SECURITY 4. ENDPOINT SECURITY 5.INTERNET SECURITY PAGE NO. Conclusion 5 Introduction Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide . The field is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world. Computer security, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex. The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system’s data on a separate device, or medium, such as magnetic tape or disks, that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key. (See data encryption.) Computer security threats . Computer security threats are possible dangers that can possibly hamper the normal functioning of your computer. In the present age, cyber threats are constantly increasing as the world is going digital. The most harmful types of computer security are: 7) Viruses . Computer virus is a malicious program which is loaded into the user’s computer without user’s knowledge. It replicates itself and infects the files and programs on the user’s PC. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. 2)Computer Worm . Computer worm is a software program that can copy itself from one computer to another, without human interaction. The potential risk here is that it will use up your computer hard disk space because a worm can replicate in greate volume and with great speed. 3)Phishing . Disguising as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing in unfortunately very easy to execute. You are deluded into thinking it’s the legitimate mail and you may enter your personal information. 4)Botnet . Botnet is a group of computers connected to the internet, that have been compromised by a hacker using a computer virus. An individual computer is called ‘zombie computer’. The result of this threat is the victim’s computer, which is the bot will be used for malicious activities and for a larger scale attack like DDoS. 5)Rootkit Rootkit - is a computer program designed to provide continued privileged access to a computer while actively hiding its presence. Once a rootkit has been installed, the controller of the rootkit will be able to remotely execute files and change system configurations on the host machine. 6)Keylogger Also known as a keystroke logger, keyloggers can track the real-time activity of a user on his computer. It keeps a record of all the keystrokes made by user keyboard. Keylogger is also a very powerful threat to steal people’s login credential such as username and password. These are perhaps the most common security threats that you’ll come across. Apart from these, there are others like spyware, wabbits, scareware, bluesnarfing and many more. Fortunately, there are ways to protect yourself against these attacks. COMPUTER SECURITY IMPORTANT? Computers are very essential part of our daily lives and it plays important roles in our lives. So, the security of a computer is important because it protects your information and helps to prevent from viruses and malware. In this post, we will discuss on why is computer security important of our lives. Computer security is also known as cyber security or IT security which mainly used for protection of computer system such as hardware and software. WHY IS COMPUTER SECURITY IMPORTANT? The main purpose of the security is the preventing and detecting unauthorized access of computer system. It guarantees to safe processing and storage of business, healthcare and sensitive information. Cyber security provides the Confidentiality, Integrity and Availability for all components of a computer system. Here are the some reasons why is computer security important: 1. TO PROTECT PERSONAL INFORMATION To prevent from cyber security risk you have to protect your personal information. IT security is the first prime issue to protect your personal and others information. By the way you can keep your information secure using the following tips: ● Use antivirus Software ● Update operating system ● Use strong password ● Backup your data ● Lock your computer ● Avoid Phishing Emails ● protect your personal information 2. TO PROTECT ORGANIZATION PROPERTIES It is very important to ensure the organization’s computer data because every organization has many sensitive assets and information. So, without computer or IT security you can’t guarantee the security of organization properties. 3. TO PREVENTION FROM DATA THEFT Data theft is act of stealing sensitive information such as bank account details, credit card information, passwords, and documents which stored on computers, servers, or other devices. The most common reasons of data breaches are as follows: ● Weak and stolen credentials ● Malicious insiders ● Application vulnerabilities ● Human Error So, prevent from data theft you have to ensure your device security by using endpoint security, lock down your computer, Identify critical data and use authentication. 4. TO PREVENT FROM VIRUSES AND MALWARE Computer security is also important to protect from computer viruses and malware’s. A computer virus or malware can corrupt or delete your sensitive data, damage your hard disk and it spreads from one computer to another using email program and others. So, you have to protect your computer from viruses and malware using following these tips: ● Keep your software up to date ● Use free antivirus software ● Use a strong password ● Don’t click on links within emails ● Back up your computer ● Use a pop-up blocker TYPES OF COMPUTER SECURITY In this post, we will focus on the different types of computer security such as application security, network security, internet security, data security, information security and end user security. 1. APPLICATION SECURITY Application security is the types of cyber security which developing application by adding security features within applications to prevent from cyber attacks. The attacks can be SQL injection, denial of service (DoS) attacks, data breaches or other cyber-attacks. There are some application security tools and techniques such as firewalls, antivirus software, encryption, and web application firewall which can help to prevent from cyber-attacks. A web application firewall is designed to protect web applications by filtering and monitoring HTTP harmful traffic. Here are the most used Web Application Firewalls are: Fortinet FortiWeb Citrix NetScaler App Firewall F5 Advanced WAF Radware AppWall Symantec WAF Barracuda WAF Imperva WAF Sophos XG Firewall SonicWallNSa 2. INFORMATION SECURITY Information security (IS) is the types of computer security which refers to the process and methodology to protect the confidentiality, integrity and availability of computer system from unauthorized access, use, modification and destruction. Information security focuses on the CIA triad model, which ensure confidentiality, integrity, and availability of data, without affecting organization productivity. 3. NETWORK SECURITY Network security is other types of IT security which process of preventing and protecting against unauthorized intrusion into computer networks. It is a set of rules and configurations which designed to protect the confidentiality, integrity and accessibility of computer networks system and information using both software and hardware technologies. NETWORK SECURITY METHODS There are different components or methods to improve network security. Here, we have mentioned the most common network security components. Antivirus Software Application Security Behavioral Analytics Data Loss Prevention (DLP) Email Security Firewalls Mobile Device Security Network Segmentation Security Information and Event Management (SIEM) Virtual Private Network (VPN) Web Security Wireless Security Network Access Control (NAC) 4. ENDPOINT SECURITY Human error is a major weak point which is easily exploited by cyber criminals. End users are becoming the largest security risk in any organizations. However, end user has no fault of their own, and mostly due to a lack of awareness and ICT policy. They can unintentional open the virtual gates to cyber attackers. That’s why comprehensive security policies, procedures and protocols have to be understood in depth by users who accessing the sensitive information. It is better to providing security awareness training program to them and should cover the following topics: Cyber security and its importance Phishing and Social Engineering attack Password creation and usages Device Security Physical Security Learn More About Social Engineering Attack 5. INTERNET SECURITY Internet security is the important types of computer security which has defined as a process to create set of rules and actions to protect computers system that are connected to the Internet. CONCLUSION Now that you have completed this webquest on Computer Security you are now aware of the possible security treats to computer systems. Not only that, but you are now better ableto protect your computers as well as recommendsecuritymeasures to others. Have you ever heard the terms Computer Virus, worms, Trojans, Cybercrime, hackers? Putting your computer in a bank vault with security officers with shot guns and Rin-tin-tin will not protect yourcomputer’s data. To protect your data you will have to incorporate the use of special Data Security software along with the Physical Security methods you have learned. Have a look at Computer Security Threats as it relates to data security.