Synopsis
Synopsis
SYNOPSIS
Master of Computer Application
This is to certify that the mini project report on
Cyber Security Awareness
As per the Requirement of the Dr. Babasaheb Ambedkar Marathwada University, Aurangabad in
the project fulfillment of Post Degree of M.C.A IInd Semester, for the Academic year 2021-2022.
Guided by
Prof. Sucheta Yambal Madam
Participant
1. Adbane Pradip Saluba
2. Ahmed Salem Ahmed Nasser
3. Aishwarya Balaji Waghmare
4. Ajay Arjun Mahajan
5. Aman Tukaram Tambe
6. Ambhore Sumit Ramchandra
7. Bansode Sachin Babasaheb
8. Chapkanade Gajanan Rakhamaji
9. D. Darshana
10. Dandge Rajwant Ramesh
11. Deshmukh Ganesh Sahebrao
12. Farhad Yasin
13. Gaikwad Snehal Ganesh
14. Gajbhiye Piyush Omganesh
15. Gayatri Tirthraj Ghamat
16. Ghusekar Samiksha Ravindra
17. Honale Dipak Ramchandra
0.
About
The present paper focuses on Security Awareness Capaigns, trying to identity factors which
potentially lead to failure of these in changing the information security behaviours. Changing
behaviours of consumers and employees. Past and current efforts to improve information
security practices have not had the desired efforts. In this paper, we explain the challenges
involved in improving information security behaviours. Changing behaviours requires more then
giving information about risk and correct behaviours. We review the suitability of persuasion
techniques, including the widely used fear appeals. Essential components for an awareness
campaign as well as factors factors which an lead to a campaign’s failure are also discussed.
The Campaign covers following Topics-
1. Passwords
2. Bank Safely Online/on your mobile
3. Common Shopping Scams
4. Identity theft
5. Phishing
6. Wireless Network Security
7. Lottery Message Scams
8. Prevent Cybercrime
9. Cyber laws
10. National cyber security
11. Cyber Attacks
12. Social Engineering
13. Computer Security
14. Hacking
15. Information Security
16. Physical Security
Topics in short
Passwords
We should keep Password that will remember but not easily identify or recognize
by anyone, we should decide a password that has combination of letters, numbers,
characters. We should not share our password with anyone or we should keep the
same password for many accounts.
Bank Safely Online/on your mobile
Access to internet is a trend now and so its popularity as a medium to make
financial transactions. Banking or making financial transaction on internet saves
time at no extra cost but the danger are very real. Staying safe is about being
diligent and smart.
Common Shopping Scams
Normally shopping scam starts with a fake website, mobile app or increasingly
social media platform ad, Some fake e-store are invented and they make it like
familiar as they keep logos and slogan and a URL nearly same thats easily mistaken
for real thing. They offer popular items at a fraction of the usual cost and promise
perks like free shiping and overnight delivery, exploiting the premium online
shoppers put on price and speed.
Identity theft
Identity theft is the crime of obtaining the personal or financial information of
another person to use their identity to commit fraud, Identity theft happens when
someone steals your personal information to commit fraud. The identity theif may
use your information to apply for credit, files taxes or get medical services,
misbehave, illegal work. These act can damage your credit status, and cost you time
and money to restore your good name.
Phishing
Phishing is a type of social enginnering where an attacker sends a fraudulent
message designed to trick a person into revealing sensitive information to the
attacker or to deploy malicious software on the victim's infrastructure like
ransomware.
Wireless Network Security
Wireless security is the prevention of unauthorized access or damage to computers
or data using wireless networks. which include Wi-Fi networks. The term may also
refer to the protection of the wireless network itself from adversaries seeking to
damage the confidentiality, integrity, or availability of the network.
Computer Security
Computer security, cybersecurity, or information technology security is the
protection of computer systems and networks from information disclosure, theft, or
damage to their hardware, software or electronic data, as well as from the disrution
or misdirection of the services they provide.
Hacking Information Security
Hacking is the activity of identifying weakness in a computer system or a network to
exploit the security to gain access to personal data or business data. Computers have
become mandatory to run a successful business. It is not enough to have isloated
computers systems, they need to be networked to facilatate communication with
external businesses. This exposes them to the outside world and hacking.
Physical Security
Physical security protects cybersecurity by limiting access to spaces where data is
stored, and the reverse is also true. Physical security components connected to the
internet, such as RFID key card door locks, smartphones and video surveillance
cameras, are common targets for hackers.