Sakshi Synopsis
Sakshi Synopsis
CHANDRAPUR
(DR. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
P
a (2023-24)
g
e
|
1
SEMINAR REPORT
On
CYBER SECURITY
Submitted
By
Your Name: Sakshi Raju Kaurase
Roll No: CSEA315
CERTIFICATE
This is to certify that, Miss. / Mr. Sakshi Raju Kaurase
Chandrapur.
1. Abstract 1
2. Introduction 2
5. Future Scope 7
6. Conclusion 8
7. Reference 9
Abstract
P
a
In recent years, the Internet has become an integral element of
g
e
people's everyday lifestyles all across the world. Online criminality,
|
on the other hand, has risen in tandem with the growth of Internet
4
\
Aim & Objectives
P
a
gAim of cyber security:
eThe aim of cybersecurity is to protect against cyber threats and safeguard
|
8valuable assets and information, as well as to maintain trust and compliance
with regulations
1 . Protect Critical Assets: Critical assets are responsible for ensuring the
smooth functioning of a business. These can include infrastructure, systems,
data, intellectual property, and business continuity. Protecting these assets is
critical because their compromise can have severe consequences, such as
financial loss, damage to reputation, or legal consequences. One way to
protect critical assets is by implementing robust security measures such as
firewalls, encryption, and access controls.
P
a we can say that Cyber Security is one of the most important issues that
gwe have faced with the increase in technological advancements, anything and
e
|everything that exists on the internet isn't completely safe. With the increase
11
in Cyber crimes in India the government of India took a major step and
introduced an act in the year 2000 which is called as (IT act 2000)which states
that it is the primary law in India dealing with cybercrime and electronic
commerce. The Act provides a legal framework for electronic governance by
giving recognition electronic records and digital signatures. It also defines
cyber crimes and prescribe penalties for them .Cybersecurity is a never-
ending battle. A permanently decisive solution to the problem will not be
found in the foreseeable future, even Mark Zukerberg the creator of one of
the most used social networking sites Facebook is seen covering his laptop's
front camera with a duct tape so that the camera might not be accessed by
anyone else then what else can we expect from our security. So, be little
cautions and attentive when while using / working on the internet because the
safety is in our hands only.
References
P
a
1. www.google.com
g 2. www.youtube.com
e
|
3. ChatGPT
12 4. https://www.udemy.com/course/the-complete-internet-security-
privacy-course-volume-1/
5. https://www.geeksforgeeks.org/cyber-system-security/
6. Cybersecurity Essentials by charles Brooks and Christopher Grow (
October 30,2018 )
7. Cybersecurity-Attack and Defense Strategies by Yuri Diogenes (
December 31, 2019 )
8. https://en.wikipedia.org/wiki/Cybercrime