0% found this document useful (0 votes)
48 views

Sakshi Synopsis

1) The document is a seminar report on cyber security submitted by a student named Sakshi Raju Kaurase. 2) It includes an abstract, introduction, literature survey, aim and objectives, future scope, and conclusion sections. 3) The aim of cyber security is to protect against cyber threats and safeguard valuable assets and information, as well as to maintain trust and compliance with regulations.

Uploaded by

mohaktalodhikar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Sakshi Synopsis

1) The document is a seminar report on cyber security submitted by a student named Sakshi Raju Kaurase. 2) It includes an abstract, introduction, literature survey, aim and objectives, future scope, and conclusion sections. 3) The aim of cyber security is to protect against cyber threats and safeguard valuable assets and information, as well as to maintain trust and compliance with regulations.

Uploaded by

mohaktalodhikar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

RAJIV GANDHI COLLEGE OF ENGINEERING, RESEARCH & TECHNOLOGY,

CHANDRAPUR
(DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
P
a (2023-24)
g
e
|
1

SEMINAR REPORT
On

CYBER SECURITY

SEMISTER- III SECOND YEAR


Seminar –I

Submitted
By
Your Name: Sakshi Raju Kaurase
Roll No: CSEA315

Guided By Seminar Incharge


Dr. Manisha Pise Prof. R. V. Lichode

Dr. Nitin Janwe


HOD, CSE & IT
RAJIV GANDHI COLLEGE OF ENGINEERING, RESEARCH &
TECHNOLOGY, CHANDRAPUR
P (DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE)
a
g DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
e
| (2023-24)
2

CERTIFICATE
This is to certify that, Miss. / Mr. Sakshi Raju Kaurase

Roll No. CSEA315 studying in B. E. Third semester Computer Science and

Engineering, has successfully completed seminar-I on “ Cyber security ”

satisfactorily during the academic session 2023-2024 from CSE, RCERT,

Chandrapur.

Guided By Seminar Incharge


Dr. Manisha Pise Prof. R. V. Lichode

Dr. Nitin Janwe


HOD, CSE & IT
Table of Content
P
a
g
e
|
3
Chapters Title Page No.

1. Abstract 1

2. Introduction 2

3. Literature Survey 3,4

4. Aim & Objective 5,6

5. Future Scope 7

6. Conclusion 8

7. Reference 9
Abstract
P
a
In recent years, the Internet has become an integral element of
g
e
people's everyday lifestyles all across the world. Online criminality,
|
on the other hand, has risen in tandem with the growth of Internet
4

activity. Cyber security has advanced greatly in recent years in order


to keep up with the rapid changes that occur in cyberspace. Cyber
security refers to the methods that a country or organization can use
to safeguard its products and information in cyberspace. Two
decades ago, the term "cyber security" was barely recognized by the
general public. Cyber security isn't just a problem that affects
individuals but it also applies to an organization or a government.
Everything has recently been digitized, with cybernetics employing
a variety of technologies such as cloud computing, smart phones, and
Internet of Things techniques, among others. Cyber-attacks are
raising concerns about privacy, security, and financial compensation.
Cyber security is a set of technologies, processes, and practices
aimed at preventing attacks, damage, and illegal access to networks,
computers, programmes, and data.
Introduction
P
a
g
e
|
Cyber Security is a process that’s designed to protect networks and
5 devices from external threats. Businesses typically employ Cyber
Security professionals to protect their confidential information,
maintain employee productivity, and enhance customer confidence
in products and services.

The world of Cyber Security revolves around the industry standard


of confidentiality, integrity, and availability, or CIA. Privacy means
data can be accessed only by authorized parties; integrity means
information can be added, altered, or removed only by authorized
users; and availability means systems, functions, and data must be
available on-demand according to agreed-upon parameters.

The main element of Cyber Security is the use of authentication


mechanisms. For example, a user name identifies an account that a
user wants to access, while a password is a mechanism that proves
the user is who he claims to be.
P
Literature Survey
a
g
e
| A literature survey of cyber security encompasses a broad array of
6
research and publications. Here is a condensed overview of some key themes
on cyber security :

1. A systematic literature review of cyber-security data repositories and


performance assessment metrics for semi-supervised learning :. This
survey provides a comprehensive overview of publicly available data
repositories and datasets used for building computer security or cyber-
security systems based on Semi-Supervised Learning, where only a few
labels are necessary or available for building strong models. It also highlights
the strengths and limitations of the data repositories and sets and provides an
analysis of the performance assessment metrics used to evaluate the built
models.

2. A Survey of Data Mining and Machine Learning Methods for Cyber


Security : This survey paper describes a focused literature survey of
machine learning (ML) and data mining (DM) methods for cyber analytics
in support of intrusion detection. Short tutorial descriptions of each ML/DM
method are provided.

3. Cyber risk and cybersecurity: a systematic review of data ³. This


research analyses the extant academic and industry literature on
cybersecurity and cyber risk management with a particular focus on data
availability.
4.A systematic literature review of how cyber security related behavior
is assembled : This paper aims to provide answers to how cybersecurity-
related behavior is assessed. Research questions were formulated, and a
systematic literature review (SLR) was performed by following the
P
arecommendations of the Preferred Reporting Items for Systematic Reviews
gand Meta-Analyses statement.
e
|
7

5. A Literature Review of Cyber Security : This literature review provides


an overview of the current state of cyber security. It covers the definition of
cyber security, its importance, and the various types of cyber threats. It also
discusses the various techniques used to protect against cyber threats.

\
Aim & Objectives

P
a
gAim of cyber security:
eThe aim of cybersecurity is to protect against cyber threats and safeguard
|
8valuable assets and information, as well as to maintain trust and compliance
with regulations

Objectives of the cyber security :

1 . Protect Critical Assets: Critical assets are responsible for ensuring the
smooth functioning of a business. These can include infrastructure, systems,
data, intellectual property, and business continuity. Protecting these assets is
critical because their compromise can have severe consequences, such as
financial loss, damage to reputation, or legal consequences. One way to
protect critical assets is by implementing robust security measures such as
firewalls, encryption, and access controls.

2. Protect the Privacy of Customer Data: Customers trust businesses and


organizations with their personal and sensitive information, such as debit or
credit card information, names, addresses, and social security numbers
(SSNs). It is the prime responsibility of businesses to protect customer data
from unauthorized access, theft, or misuse. To protect customer data,
organizations can implement security measures such as data encryption,
secure servers, and strong passwords.

3. Minimize Business Disruption : Cyberattacks can cause significant


business disruption, leading to financial loss, reputational damage, and legal
consequences. Organizations need to have a comprehensive disaster recovery
(DR) plan in place in case of any cyberattack or security breach.
4. Prevent Data Breaches : Data breaches can lead to the loss of sensitive
information, financial loss, and reputational damage. Organizations need to
P
make sure that their systems and networks are secure and employ strategies
asuch as encryption, authentication, and access control to protect the data from
g
emalicious actors.
|
9
5. Comply with Regulations : Organizations need to comply with various
regulations such as GDPR, HIPAA, and PCI DSS. Compliance with these
regulations is essential to avoid legal consequences and maintain customer
trust.

6. Maintain Trust : Maintaining trust is critical for businesses and


organizations. Cybersecurity helps maintain trust by protecting against cyber
threats and safeguarding valuable assets and information.
Future Scope

The scope of cybersecurity is vast and ever-evolving. With the


P
aincreasing reliance on technology, the demand for cybersecurity experts is at
gan all-time high Ad1. The future of cybersecurity is expected to be shaped by
e
|the following trends:
10

1. Multi-factor authentication: The multi-factor authentication market is


expected to reach $24.16 billion by 2025

2. Hybrid security: A hybrid strategy that bridges legacy tools such as


VPNs and firewalls with next-gen AI capabilities is expected to provide
comprehensive security cover and anonymity when using streaming
services, provide access to geo-blocked contents, and protect against
malware and phishing attacks

3. Cybersecurity spending: Worldwide cybersecurity spending is


expected to reach $174.7 billion in 2024, with security services being
the largest and fastest-growing market segment

4. Unfilled cybersecurity positions: There will be 3.5 million unfilled


cybersecurity positions worldwide by 2025

With the increasing number of cyberattacks, it is essential to stay up-to-


date with the latest developments in cybersecurity .
Conclusion

P
a we can say that Cyber Security is one of the most important issues that
gwe have faced with the increase in technological advancements, anything and
e
|everything that exists on the internet isn't completely safe. With the increase
11
in Cyber crimes in India the government of India took a major step and
introduced an act in the year 2000 which is called as (IT act 2000)which states
that it is the primary law in India dealing with cybercrime and electronic
commerce. The Act provides a legal framework for electronic governance by
giving recognition electronic records and digital signatures. It also defines
cyber crimes and prescribe penalties for them .Cybersecurity is a never-
ending battle. A permanently decisive solution to the problem will not be
found in the foreseeable future, even Mark Zukerberg the creator of one of
the most used social networking sites Facebook is seen covering his laptop's
front camera with a duct tape so that the camera might not be accessed by
anyone else then what else can we expect from our security. So, be little
cautions and attentive when while using / working on the internet because the
safety is in our hands only.
References
P
a
1. www.google.com
g 2. www.youtube.com
e
|
3. ChatGPT
12 4. https://www.udemy.com/course/the-complete-internet-security-
privacy-course-volume-1/
5. https://www.geeksforgeeks.org/cyber-system-security/
6. Cybersecurity Essentials by charles Brooks and Christopher Grow (
October 30,2018 )
7. Cybersecurity-Attack and Defense Strategies by Yuri Diogenes (
December 31, 2019 )
8. https://en.wikipedia.org/wiki/Cybercrime

You might also like