0% found this document useful (0 votes)
15 views6 pages

Synopsis

This document outlines a cyber security awareness project conducted by 17 students and guided by Prof. Sucheta Yambal Madam. The project focused on educating about key cyber security topics like passwords, banking safely online, common scams, identity theft, and computer/network security. It covered these topics in 16 sections of the report and provided brief descriptions of each topic, emphasizing the importance of security practices to prevent cybercrime.

Uploaded by

Piyush Gajbhiye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Synopsis

This document outlines a cyber security awareness project conducted by 17 students and guided by Prof. Sucheta Yambal Madam. The project focused on educating about key cyber security topics like passwords, banking safely online, common scams, identity theft, and computer/network security. It covered these topics in 16 sections of the report and provided brief descriptions of each topic, emphasizing the importance of security practices to prevent cybercrime.

Uploaded by

Piyush Gajbhiye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Dr.

Babasaheb Ambedkar Marathwada University,


Aurangabad-
In Particial fulfillment of
The requirements of The Post Degree Master of Computer Application(MCA)
November 2021-22
University Department of Mangement Science

SYNOPSIS
Master of Computer Application
This is to certify that the mini project report on
Cyber Security Awareness
 
As per the Requirement of the Dr. Babasaheb Ambedkar Marathwada University, Aurangabad in
the project fulfillment of Post Degree of M.C.A IInd Semester, for the Academic year 2021-2022.
Guided by
Prof. Sucheta Yambal Madam
Participant
1. Adbane Pradip Saluba
2. Ahmed Salem Ahmed Nasser
3. Aishwarya Balaji Waghmare
4. Ajay Arjun Mahajan
5. Aman Tukaram Tambe
6. Ambhore Sumit Ramchandra
7. Bansode Sachin Babasaheb
8. Chapkanade Gajanan Rakhamaji
9. D. Darshana
10.                      Dandge Rajwant Ramesh
11.                      Deshmukh Ganesh Sahebrao
12.                      Farhad Yasin
13.                      Gaikwad Snehal Ganesh
14.                      Gajbhiye Piyush Omganesh
15.                      Gayatri Tirthraj Ghamat
16.                      Ghusekar Samiksha Ravindra
17.                      Honale Dipak Ramchandra
0.
About
The present paper focuses on Security Awareness Capaigns, trying to identity factors which
potentially lead to failure of these in changing the information security behaviours. Changing
behaviours of consumers and employees. Past and current efforts to improve information
security practices have not had the desired efforts. In this paper, we explain the challenges
involved in improving information security behaviours. Changing behaviours requires more then
giving information about risk and correct behaviours. We review the suitability of persuasion
techniques, including the widely used fear appeals. Essential components for an awareness
campaign as well as factors factors which an lead to a campaign’s failure are also discussed.
 
The Campaign covers following Topics-
1. Passwords
2. Bank Safely Online/on your mobile
3. Common Shopping Scams
4. Identity theft
5. Phishing
6. Wireless Network Security
7. Lottery Message Scams
8. Prevent Cybercrime
9. Cyber laws
10. National cyber security
11. Cyber Attacks
12. Social Engineering
13. Computer Security
14. Hacking
15. Information Security
16. Physical Security
Topics in short
 
 
Passwords
 We should keep Password that will remember but not easily identify or recognize
by anyone, we should decide a password that has combination of letters, numbers,
characters. We should not share our password with anyone or we should keep the
same password for many accounts.
 
Bank Safely Online/on your mobile
 Access to internet is a trend now and so its popularity as a medium to make
financial transactions. Banking or making financial transaction on internet saves
time at no extra cost but the danger are very real. Staying safe is about being
diligent and smart.
 
Common Shopping Scams
Normally shopping scam starts with a fake website, mobile app or increasingly
social media platform ad, Some fake e-store are invented and they make it like
familiar as they keep logos and slogan and a URL nearly same thats easily mistaken
for real thing. They offer popular items at a fraction of the usual cost and promise
perks like free shiping and overnight delivery, exploiting the premium online
shoppers put on price and speed.
 
Identity theft
Identity theft is the crime of obtaining the personal or financial information of
another person to use their identity to commit fraud, Identity theft happens when
someone steals your personal information to commit fraud. The identity theif may
use your information to apply for credit, files taxes or get medical services,
misbehave, illegal work. These act can damage your credit status, and cost you time
and money to restore your good name. 
 
Phishing
Phishing is a type of social enginnering where an attacker sends a fraudulent
message designed to trick a person into revealing sensitive information to the
attacker or to deploy malicious software on the victim's infrastructure like
ransomware.
 
Wireless Network Security
 Wireless security is the prevention of unauthorized access or damage to computers
or data using wireless networks. which include Wi-Fi networks. The term may also
refer to the protection of the wireless network itself from adversaries seeking to
damage the confidentiality, integrity, or availability of the network.

Lottery Message Scams


In this type of scam where the sender requests to help in facilitating the transfer of a
substantial sum of money, generally in the form of an email. In return, the sender
offers a commision, usually in the range of several million dollars. The scammers
then request that money be sent to pay for some of the costs associated with the
transfer. If money is sent to the scammers, they will either disappear immediately or
try to get more money with claims of continued prolems with transfer.
 
Prevent Cybercrime
Keeping your software and operating system up to date ensures that you benefit
from the latest security patches to protect your computer, also use anti-virus or a
comprehensive internet security solution like Quick heal, NPAV, etc. Be sure to use
strong passswords that people will not able to guess and do not record them
anywhere. 
 
Cyber laws
Cyber law, also known as internet Law or Cyber Law, is a part of the overall legal
system that is related to legal informatics and supervises the digital circulation of
information, e-commerce, software and information security. It is associated with
legal informatics and electronic elements, including information systems,
computers, software, and hardware. There are several cyber laws against cyber
crime.
 
National cyber security
 The National cyber security day is celebrated on 30 November every year, as we all
know that we all are surrounded by the internet nowdays and we should be aware to
be safe and our personal information should be safe National Cyber Security
Organization help us if any cyber crime happens with you.
 
Cyber Attacks
A cyber attacks is an atempt to disable computers, steal data, or use a breached
computer system to launch additional attacks. Cybercrime use different methods to
launch a cyber attcks that includes malware, phishing, man-in-the-middle attack
and several method that happens to steal data through internet is known as attacks 
 
Social Engineering
 Social engineering is an attack vector that relies heavily on human interaction and
often involves manipulating people into breaking normal security procedure and
best practices to gain unautorized access to systems, networks or physical locations
for finacial gain, threat actors use social engineering techniques to conceal their true
identities and motives, presenting themselves as trusted individual or information
sources.

Computer Security
Computer security, cybersecurity, or information technology security is the
protection of computer systems and networks from information disclosure, theft, or
damage to their hardware, software or electronic data, as well as from the disrution
or misdirection of the services they provide.
 
Hacking Information Security
Hacking is the activity of identifying weakness in a computer system or a network to
exploit the security to gain access to personal data or business data. Computers have
become mandatory to run a successful business. It is not enough to have isloated
computers systems, they need to be networked to facilatate communication with
external businesses. This exposes them to the outside world and hacking.

Physical Security
Physical security protects cybersecurity by limiting access to spaces where data is
stored, and the reverse is also true. Physical security components connected to the
internet, such as RFID key card door locks, smartphones and video surveillance
cameras, are common targets for hackers.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy