0% found this document useful (0 votes)
23 views9 pages

ENGLISH COMMUNICATION LAB PROJECT (Hemant Kumar)

lab project, done by me

Uploaded by

lastbreathe1608
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views9 pages

ENGLISH COMMUNICATION LAB PROJECT (Hemant Kumar)

lab project, done by me

Uploaded by

lastbreathe1608
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ACKNOWLEDGEMENT

I WOULD LIKE TO EXPRESS


SPECIAL THANKS OF
GRATITUDE TO DR AMIT
PURUSHOTTAM FOR GIVING
THIS OPPORTUNITY TO MAKE
PROJECT ON ADVANCED
COMMUNICATION LAB
PROJECT.

HEMANT KUMAR

IT , 20

DATE: 07 APRIL 2023


CYBERSECURITY

CyberSecurity is the practice of Protecting computers,


mobile devices, Servers, electronic Systems, networks, and
data from malicious attacks.
It’s also known as Information Security (INFOSEC),
Information Assurance (IA), or System Security.
Cyber Security is important because the government,
Corporate, medical organizations collect, military, financial,
process, and store the unprecedented amount of data on a
computer and other property, personal information.
Cyber Security proper began in 1972 with a research
project on ARPANET (The Advanced Research Projects
Agency Network), a precursor to the internet.
ARPANET developed protocols for remote computer
networking.
Example – If we shop from any online shopping website
and share information like email id, address, and credit
card details as well as saved on that website to enable a
faster and hassle-free shopping experience, then the
required information is stored on a server.
one day we receive an email which state that the eligibility
for a special discount voucher from XXXXX (hacker use
famous website Name like Flipkart, Amazon, etc.) website
to receive the coupon code, and we will be asked to fill the
details then we will use saved card account credentials.
Then our data will be shared because we think it was just
an account for the verification step, then they can wipe a
substantial amount of money from our account.
That is why Cyber Security provides services as a Security
Gate-Way to make information more Secure.
In today’s time, hackers are advanced. We can’t surely say
whether the data stored in my Devices is safe from outside
threats. With Cybercrime increasing rapidly, it’s crucial to
have Cyber Security in place in our personal life and our
Business.
Types of Cyber security:
1. 1. Application Security:
 Most of the Apps that we use on our Cell-phone are
Secured and work under the rules and regulations of
the Google Play Store.
 Many of the apps pretend to be safe, but after taking
all information from us, the app users share
information in money with the 3rd-party as well app
stop working. Suddenly this comes under Cyber
attack.
 There are 1.85 million different apps available for
users to download. When we have other choices, this
does not mean that all apps are safe.
2. Network Security :
 Guard your internal network against outside threats
with increased network security.
 Sometimes we used to utilize free Wi-Fi in public
areas such as cafes, Malls, etc. With this activity,
3rd Party starts tracking your Phone over the
internet. If you are using any payment gateway,
then your bank account can be Empty.
 So, avoid using Free Network because free network
Doesn’t support Securities.
3. Cloud Security:
 Cloud base data storage has become a popular
option over the last decade. It enhances privacy
and saves data on the cloud, making it excess
able from any device but needs correct
authentication.
 Some Famous platforms are Google Drive,
Microsoft Cloud, Drop box, etc.
 These platforms are free to some extent if we
want to save more data than we have to pay.
 AWS is also a new Technique that helps to run
your business over the internet and provides
security to your data.
4. Mobile Security:
 Mobile is the very common gadgets we use daily.
Everything we excess is by mobile phone online class
then the mobile phone, Call to the client then the mobile
phone, sending money needs a mobile phone and many
more.
 The mobile phones made our life so easy only with a
single touch we can be excess news from another
country. Then this mobile phone must come under all
security patches.
 We must lock all the payment applications by phone in-
built app as well never share your phone password
except with your family.
Why is Cyber security Important?

Cybersecurity is essential for protecting our digital assets,


including sensitive personal and financial information,
intellectual property, and critical infrastructure.

Importance and challenges of Cyber Security:

Cyber security is vital in any organization, no matter how


big or small the organization is.
Due to increasing technology and increasing software
across various sectors like government, education,
hospitals, etc., information is becoming digital through
wireless communication networks.
The importance of cyber security is to secure the data of
various organizations like email, yahoo, etc., which have
extremely sensitive information that can cause damage to
both us and our reputation.
Attackers target small and large companies and obtain
their essential documents and information.
Cyber-attack: A cyber-attack is a deliberate attempt by
external or internal threats or attackers to exploit and
compromise the integrity and confidentiality of the
information system of a target organization.
Cyber-attacks come in a wide variety, and the following list
highlights some of the important ones that criminals and
attackers use to exploit software:
1. Malware
2. Ransomware
3. Injection attacks
4. Session management and Man-in-the-Middle attacks
5. Phishing
6. Denial of service
7. Privilege escalations
8. Unpatched/Vulnerable software

How to Protect Yourself from Cyber Threats:


There are several steps you can take to protect yourself
from cyber threats, including:
 Use strong passwords: Use unique and complex
passwords for all of your accounts, and consider using a
password manager to store and manage your
passwords.
 Keep your software up to date: Keep your operating
system, software applications, and security software up
to date with the latest security patches and updates.
 Enable two-factor authentication: Enable two-factor
authentication on all of your accounts to add an extra
layer of security.
 Be wary of suspicious emails: Be cautious of unsolicited
emails, particularly those that ask for personal or
financial information or contain suspicious links or
attachments.
 Educate yourself: Stay informed about the latest cyber
security threats and best practices by reading cyber
security blogs and attending cyber security training
programs.

.
NAME: HEMANT KUMAR
ROLL: UCET-2111120
BRANCH: INFORMATION TECHNOLOGY (I.T.)

SESSION: 2021-2025

SEMESTER: IIIRD

TEACHER’S SIGNATURE

.........................................

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy