Roshni Chavan 123

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

SHREEYASH PRATISHTHAN’S

SHREEYASH COLLEGE OF ENGINEERING AND TECHNOLOGY


(POLYTECHNIC), CHH. SAMBHAJINAGAR

MICRO-PROJECT REPORT

NAME OF DEPARTMENT:- ELECTRICAL ENGINEERINGACADEMIC


YEAR:- 2024-25
SEMESTER:- 5TH
COURSE NAME:- MANAGEMENT

CODE:- 22509
MICRO-PROJECT TITLE :- STUDY OF MAJORS TO BE TAKEN FOR INSURE INCYBER
SECURITY
PREPARED BY:-

1) ROSHNI CHAVAN
Gokul Borade EN. NO. 2210920251

UNDER THE GUIDANCE OF:- Prof.


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION,
MUMBAI
CERTIFICATE

This isistotocertify
certifythat
thatMs.
Mr./ Ms. Vikas
Roshni GokulChavan
Shivaji Borade
of 5th Semester of Diploma in Electrical Engineering
of Institute Shreeyash Collage of Engineering And
techonology (polytechnic) Chh. Sambhajinagar

has successfully completed Micro-Project Work in Course of STUDY OF MAJORS TO BE


TAKEN FOR INSURE IN CYBER SECURITY

for the academic year 2024-25 as prescribed in the I-Scheme Curriculum.

Date:- Enrollment No:-2210920251


Place:-Chh. Sambhajinagar Exam Seat No.:-

Signature Signature Signature


Guide HOD Principal

Seal of Institute
ACKNOWLEDGEMENT
We wish to express our profound gratitude to our guide
Prof. who guided us endlessly in framing and completion of
Micro-Project. He / She guided us on all the main points in that Micro-Project.
We are indebted to his / her constant encouragement, cooperation and help. It
was his / her enthusiastic support that helped us in overcoming of various
obstacles in the Micro-Project.
We are also thankful to our Principal, HOD, Faculty Members
and classmates for extending their support and motivation in the completion of
this Micro-Project.

1) ROSHNI CHAVAN
Gokul Borade EN. NO. 2210920251
Annexure-1
Micro-Project Proposal
(Format or Micro-Project Proposal about1-2pages)

Title of Micro-Project:-_STUDY OF MAJORS TO BE TAKEN FOR INSURE IN CYBER


SECURITY

1.0 Aims/Benefits of the Micro-Project(minimum30-50words)


 Develop a strong foundation in programming, algorithms, and system
architecture to understand how software, hardware, and networks
interact
 Equip students with skills to design and implement secure systems by
identifying vulnerabilities and ensuring system integrity.
 Train students to manage and secure IT infrastructure, including
networks, servers, databases, and cloud environments.

2.0 Course Outcomes Addressed


 Apply principles of safety management in all activities.

3.0 Proposed Methodology (Procedure inbrief thatwill befollowed todo


the micro• project) in about 100 to 200 words).

To ensure success in cybersecurity, a structured methodology for studying relevant


majors is crucial. Here’s a step-by-step breakdown of how to approach these
majors, including theoretical and practical aspects:

 Identify Core Majors and Relevant Specializations


Majors to Consider:
 Computer Science: Learn programming, algorithms, and data structures.
 Information Technology (IT): Focus on system and network administration.
 Cybersecurity: Specialize in security protocols, ethical hacking, and
digital forensics.
 Network Security: Learn about securing network infrastructure.
 Cryptography: Focus on encryption techniques and secure communication.
 Specializations: Depending on your interests, you can further specialize
in areas like penetration testing, cyber forensics, cloud security, or
informationassurance
Annexure-1

4.0 Action Plan (Sequence and time required for major activity. The following is for Reference, The
Activities can be Added / reduced / Modified )
Name of
Sr. Planned Planned Responsible
Details of activity
No. Week Start Finish Team Members
date date
1 1 &2 Discussion & Finalization of Gokul borade
Topic
2 3 Preparation of the Abstract Gokul borade
3 4 Literature Review Gokul borade
4 5 Submission of Microproject Gokul borade
Proposal ( Annexure-I)
5 6 Collection of information about Gokul borade
Topic
6 7 Collection of relevant content / Gokul borade
materials for the execution of
Microproject.
7 8 Discussion and submission of Gokul borade
outline of the Microproject.
8 9 Analysis / execution of Gokul borade
Collected data / information and
preparation of Prototypes /
drawings / photos / charts /
graphs / tables / circuits / Models
/ programs etc.
9 10 Completion of Contents of Gokul borade
Project Report
10 11 Completion of Weekly progress Gokul borade
Report
11 12 Completion of Project Report ( Gokul borade
Annexure-II)
12 13 Viva voce / Delivery of Gokul borade
Presentation

5.0 Resources Required (major resources such asraw material, some machining facility,
software etc.)

Sr. Name of Resources / Materials Specification Qty Remarks


No.
1 GOOGLE - -
2 YOUTUBE - -
3 BOOK - -

Names of Team Members with En. Nos.

1) ROSHNI CHAVAN
Gokul borade EN. NO.2210920251
(To be approved by the concerned teacher)
Annexure-II

Micro-Project Report
Format for Micro-Project Report (Minimum 4 pages)

Title of Micro-Project:- STUDY OF MAJORS TO BE TAKEN FOR INSURE INCYBER


SECURITY
1.0 Rationale (Importance of the project, in about 30to 50words.This is a
modified version ofthe earlier one written after the work)

 An engineer has to work in industry with human capital and machine.


Therefore , managerial skills are essential for enhancing their
employability and career growth . This course is therefore designed to
provide the basic concepts in management principles , safety aspects
and industrial Acts

2.0 Aims/Benefits of the Micro-Project:- (In about 50 to 150 words)

 Develop a strong foundation in programming, algorithms, and system architecture to


understand how software, hardware, and networks interact
 Equip students with skills to design and implement secure systems by identifying
vulnerabilities and ensuring system integrity.
 Train students to manage and secure IT infrastructure, including networks, servers,
databases, and cloud environments.

3.0 Course Outcomes Achieved(Add to the earlier list if more Cos are addressed)
 Apply principles of safety management in all activities.

4.0 Literature Review:- ( you can include all the resources which you have used to gather the
information for the Micro-project)
Sample:-
1. Google
2. Book
3. Youtube
4. Chat GPT
6.0 Actual Methodology Followed (Write step wise work done,data
collected and its analysis (if any).The contribution of individual
member may also be noted.)

To ensure success in cybersecurity, a structured methodology for studying relevant


majors is crucial. Here’s a step-by-step breakdown of how to approach these majors,
including theoretical and practical aspects:

• Identify Core Majors and Relevant


Specializations Majors to Consider:
• Computer Science: Learn programming, algorithms, and
datastructures.
• Information Technology (IT): Focus on system and
network administration.
• Cybersecurity: Specialize in security protocols, ethical
hacking, and digital forensics.
• Network Security: Learn about securing network infrastructure.
• Cryptography: Focus on encryption techniques and
securecommunication.
• Specializations: Depending on your interests, you can further
specialize in areas like penetration testing, cyber forensics,
cloud security, or information assurance.

6.0 Actual Resources Used (Mention the actual resources used).

sr.
NameofResource/material Specifications Qty Remarks
No.

1 Google - - -

youtube - - -
2

3 textbook - - -
7.0 Outputs of the Micro-Projects

 Apply principles of safety management in all activities.

8.0 Skill Developed/Learning outcome of this Micro-Project

 Identifying - the problem and causes of problems in the area related and
prepare project proposal before starting the project

 Derive- Derive different possible solution creatively

 Designing - designing of micro project with minimum required resources


 Teamwork - learn to work in a team and boost individual confidence
 Confidence - confidently, answer the questions asked about the project
9.0 Applications of this Micro-Project:- (In about 30 to 50 words)

 Secure Software Development: Use programming skills to write secure


code, ensuring applications are resistant to vulnerabilities like buffer
overflows, SQLinjections, and other attacks.
 Incident Response: Analyze malware, reverse-engineer threats, and respond to
security breaches using algorithms and coding expertise.
 Network Security: Implement secure communication protocols, develop
encryption algorithms, and work with network monitoring tools to prevent
breaches.
 System Administration: Manage and secure IT infrastructure, including
servers, networks, and databases. This involves installing security patches,
setting up firewalls, and configuring secure system architectures
 Network Defense: Set up and monitor intrusion detection/prevention systems
(IDS/IPS), ensuring that networks remain safe from unauthorized access.
 Cloud Security: Secure cloud environments by implementing proper
accesscontrols, encryption, and monitoring cloud service vulnerabilities.
 Ethical Hacking: Use penetration testing techniques to identify vulnerabilities
in organizational networks, software, and hardware. This helps to proactively
securesystems before they can be attacked.
 Digital Forensics: Apply forensic techniques to investigate cyber incidents,
recover
deleted data, and trace the origins of attacks. This skill is essential for post-
incidentinvestigations.
MICRO-PROJECT EVOLUTION SHEET

Nameof
Name of Student:-
Student:-Gokul
Roshni VikasBorade
Shivaji chavan
En. No.2210920251
Name of Program:-Electrical Engineering Semester:-5TH
Course Name:- MANAGEMENT
Course Code:-22509
Title of The Micro-Project:- STUDY OF MAJORS TO BE TAKEN FOR INSURE IN CYBER
SECURITY
Course Outcomes Achieved:-

a) Apply principles of safety management in all activities.

Sr. Poor Average Good Excellent Sub


Characteristictobeassessed Total
No. (Marks1-3) (Marks4-5) (Marks 6-8) (Marks9-10)
(A) ProcessandProductAssessment(ConvertBelowtotalmarksoutof6Marks)
1 Relevancetothecourse
2 LiteratureReview/informati
on
collection
3 CompletionoftheTargetasP
erprojectproposal
4 AnalysisofDataand
representation
5 QualityofPrototype/Model
6 ReportPreparation
(B)IndividualPresentation/Viva(ConvertBelowtotalmarksoutof4Marks)
7 Presentation
8
Viva

(A) (B)
Process and Product Individual Presentation/ TotalMarks
Assessment (6 marks) Viva (4 marks) 10

Comments/Suggestions about team work/leadership/inter-personal communication (ifany)

Name of Course Teacher:-

Dated Signature:-

You might also like