0% found this document useful (0 votes)
31 views6 pages

Nis Ajp

This document outlines a proposed micro project on cyber security issues in India. It discusses the rationale, literature review, proposed methodology including data collection and analysis, stakeholder engagement, risk assessment, and policy analysis. An action plan and required resources are also included.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views6 pages

Nis Ajp

This document outlines a proposed micro project on cyber security issues in India. It discusses the rationale, literature review, proposed methodology including data collection and analysis, stakeholder engagement, risk assessment, and policy analysis. An action plan and required resources are also included.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

(PART-A)

Guidelines and Assessment Manual


For

Micro Projects
(Group No. 07)

COMPUTER Engineering Program

(“I” Scheme Curriculum)


A
Micro-Project Proposal
On
“CYBER SECURITY ISSUES IN INDIA”

Sr. Student Name Rol Enrolment No.


No. l
No
1 YASH GUPTA ANIL 25 2112420263
2 VAISHNAVI PRABHUDAS MACHHIRKE 26 2112420265
3 DIKSHA MACHINDRA JAGNE 27 2112420268
4 RITIK MINESH DHODHARMAL 28 2112420269

Guided By
Mr. Zhamesh Bhalare
Department of Computer Technology Government Polytechnic, Gondia
(2023-24)
“CYBER SECURITY ISSUES IN INDIA”

1.0 Rational:
This project is about the study of cyber security issues in India. This project will
help to monitor the latest cyber security issues in India in different regions based on
their behaviour and frequency of attacks and by gaining this data we will be able to
understand the risk and upcoming threats in the market. The proposed analysis is based
on advanced data analysis Concerning financial and organizational impacts, it
identifies, rate and compares the overall impact of risks related to the organization. It
helps to identify gaps in information security and determine the next steps to eliminate
the risks of security. It can also enhance the communication and decision-making
processes related to information security. It improves security policies and procedures
as well as develop cost-effective methods for implementing information security
policies and procedures.
It increases employee awareness about risks and security measures during the risk
analysis process and understands the financial impacts of potential security risks.

2.0 Literature survey:

India faces significant cybersecurity challenges due to its rapid digitization and
extensive use of technology. Vulnerabilities such as data breaches and ransomware
attacks are compounded by weak infrastructure and low user awareness. Government
organizations, financial institutions, and businesses are prime targets for cybercriminal
activities. The proliferation of digital payment systems and IoT devices further
exacerbates these risks. Despite initiatives like the National Cyber Security Policy and
CERTs, continuous efforts are needed to strengthen cybersecurity and safeguard
sensitive data and critical systems.

3.0 Proposed Methodology

1. Problem Definition and Scope: Clearly define the scope and objectives of the study,
outlining the key areas of focus within the realm of cybersecurity issues in India.
2. Literature Review and Analysis: Conduct an in-depth review of existing literature,
research papers, and reports to gain insights into the current landscape of cybersecurity
challenges faced by India.
3. Data Collection and Analysis: Gather relevant data and statistics pertaining to cyber
threats, vulnerabilities, and incidents in India. Analyse the data to identify trends,
patterns, and emerging issues.

4. Stakeholder Engagement: Engage with key stakeholders including government


agencies, cybersecurity experts, industry professionals, and affected organizations to
gather firsthand insights and perspectives on the cybersecurity challenges in India.

5. Risk Assessment: Conduct a comprehensive risk assessment to evaluate the potential


impact and likelihood of various cyber threats and vulnerabilities on critical
infrastructure, businesses, and individuals in India.

6. Policy and Regulatory Analysis: Review existing cybersecurity policies, regulations,


and initiatives in India. Assess their effectiveness in addressing the identified
cybersecurity issues and propose recommendations for improvement.

7. Best Practices and Case Studies: Identify international best practices and successful
case studies from other countries in addressing similar cybersecurity challenges.
Evaluate their applicability and feasibility in the context of India.

4.0Action Plan:

Sr. Details of Activity Planned Planned Name of


No. Start Date End Date Responsible Team
Members
1 Project Scope Definition All group members
2 Research and Learning All group members
3 Conceptual Design All group members
4 Development Vaishnavi
Machhirke
Yash Gupta
5 Presentation /execution Yash Gupta
Vaishnavi
Machhirke
5.0Resources Required: -

5.1 Hardware

Type of resources Name of Specifications Quantity


resources

Processor Intel i5 11th gen 1


Hardware

RAM 4GB

Storage 512 SSD

5.2 Software

Type of resources Name of Specifications Quantity


resources

MS word 2016
1

Software Operating System Windows 10

Power point

6.0Name of Team Members: -


Sr. Name Of Students Sign
No. Batch
1. YASH GUPTA ANIL
CM
2. VAISHNAVI PRABHUDAS MACHHIRKE (2023-
2024)
3. DIKSHA MACHINDRA JAGNE

4. RITIK MINESH DHODHARMAL

Approved by
Mr. Zhamesh Bhalare

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy