0% found this document useful (0 votes)
18 views

Project Proposal

Porjeent

Uploaded by

221002321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Project Proposal

Porjeent

Uploaded by

221002321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Green University of Bangladesh

Department of Computer Science and Engineering (CSE)


Faculty of Sciences and Engineering
Semester: (Fall, Year: 2022), B.Sc. in CSE (Day)

LAB REPORT PROPOSAL


Course Title: Structure Programming Lab
Course Code: CSE 104 Section: 222 -D8

Project Proposal Name:


1. Create a simple C programming of Cyber security Organizations Of management.
Student Details

Name ID

Md Sabbir Hossen 221002321

Lab Date : 29/11/2022


Submission Date : 03/12/2022
Course Teacher’s Name : Ms . Sobhana Jahan
Lecturer
Green University Bangladesh

[For Teachers use only: Don’t Write Anything inside this box]

Project Proposal Status


Marks: ………………………………… Signature:.....................

Comments:.............................................. Date:.............................
Title Of The Project Proposal:

1. Create a simple C programming of Cyber security Organizations Of management.

2. Problem Domain & Motivations:


• In broad terms, the Problem Domain describes the area undergoing analysis.
The scope of the problem domain needs to be identified upfront by the business
analyst. The size and scope of the problem domain can vary greatly depending on the
goals of the project being undertaken. The scope may align with the boundaries of an
entire organization or it may be much more granular, aligning with a single
organizational unit, a specific business process, or a particular system.

• Even when the scope of the problem domain aligns with the boundaries of a
particular group or system it may also include stakeholders outside of the process or
organizational group such as customers, suppliers, or any other stakeholder which
provides an input or accepts an output of a process, organization, or system.

• In short, the Problem Domain is anything and everything that is needed to


define the area under analysis, fully understand the inputs and outputs of its processes,
and achieve the goals of the area under analysis, but nothing more.

3. Objectives And Aims

• Heterogeneous environments: The networks are becoming more and more


heterogeneous with the integration and deployment of different systems, devices and
software.

• Hyperconnectivity of users and systems: The “network” aspect of information security


has reached an unprecedented level since the proliferation of Internet and smart mobile
devices have enabled “anytime, anywhere” connectivity.
• Circulation of software from untrusted and unknown developers: The Internet and
the spread of mobile devices have enabled the widespread circulation of free software
from unknown sources dramatically. The retrieval and installation of such software is
usually effortless and straightforward, leading to harder-to-control computation and
communication environments.

4. Tools & Technologies:

Cybersecurity tools are the different applications or software programs


companies use to protect their systems and networks from unauthorised
access. This access can lead to cyberattacks or identity theft, causing
significant issues for organisations.

Using these tools can help to protect an organisation's data and business
systems against cyber threats. As an IT professional, you can use such tools
to establish different authentication or authorisation systems. As a result, only
authorised personnel can access these systems. Depending on the tools, you
can also monitor traffic and identify new users and potential threats. Some
tools can also offer increased productivity levels, enhanced network protection
and better website performance.

If an organisation experiences a cyberattack, the results can be serious.


Depending on the extent of the breach and the information accessed, this can
lead to a reduction in funds and impact a business's reputation. If infiltrators
access private data, such as employee or customer information, this can also
affect individuals. Depending on the systems and processes a company has in
place, there may also be legal ramifications.
5. Conclusion

Data plays an integral role in the commission of many cybercrimes and


vulnerabilities to cybercrime. Even though data provides users of it
(individuals, private companies, organizations, and governments) with
innumerable opportunities, these benefits can be (and have been) exploited by
some for criminal purposes. Specifically, data collection, storage, analysis, and
sharing both enables many cybercrimes and the vast collection, storage, use,
and distribution of data without users' informed consent and choice and
necessary legal and security protections. What is more, data aggregation,
analysis, and transfer occur at scales that governments and organizations are
unprepared for, creating a slew of cybersecurity risks. Privacy, data protection,
and security of systems, networks, and data are interdependent. In view of
that, to protect against cybercrime, security measures are needed that are
designed to protect data and user's privacy.

You might also like