0% found this document useful (0 votes)
22 views16 pages

Eti Rep

The document is a micro-project report on 'Cyber Attacks' presented by students from Karmaveer Bhaurao Patil Polytechnic, focusing on various forms of cyber threats, their impacts, and protective measures. The project aims to raise awareness about cybersecurity, educate on common cyber attacks, and promote safe online practices. It includes a detailed action plan, resources, and evaluation criteria for assessing the project outcomes.

Uploaded by

atullawale42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views16 pages

Eti Rep

The document is a micro-project report on 'Cyber Attacks' presented by students from Karmaveer Bhaurao Patil Polytechnic, focusing on various forms of cyber threats, their impacts, and protective measures. The project aims to raise awareness about cybersecurity, educate on common cyber attacks, and promote safe online practices. It includes a detailed action plan, resources, and evaluation criteria for assessing the project outcomes.

Uploaded by

atullawale42
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Rayat Shikshan Sanstha’s

Karmaveer Bhaurao Patil Polytechnic, Satara


Micro-Project Report
On

“ Cyber Attacks”
Presented By
Roll No Name of Student
30 KHATAVKAR SAISH PRASHANT
34 LAWALE ATUL ANAND
37 MAHAMUNI SARTHAK SANJAY

Program: Diploma in Information Technology Engineering


Class: Third Year ( Semester : VI)
Course: Emerging Trends in CO/IT ( Subject Code: 22618 )

Guided By
Prof. Mrs. Jadhav P.M
Information Technology Engineering Department

[2024-2025]
Rayat Shikshan Sanstha’s
Karmaveer Bhaurao Patil Polytechnic, Satara

CERTIFICATE
This is to certify that
Mr . KHATAVKAR SAISH PRASHANT
Mr . LAWALE ATUL ANAND
Mr . MAHAMUNI SARTHAK SANJAY

of Third Year Year (SemesterVI) have successfully completed the Micro-Project work
entitled “Cyber Attakcs” in the Course “Emerging Trends in IT” of Program Diploma
in Information Technology Engineering of Maharashtra State of Technical Education,
Mumbai, Maharashtra State.

Prof. Mrs. Jadhav P.M Prof. Mrs. Patil M.M Prin [Link] N.B
Guide Head of Department Principal

Date: / /2025
Place: SATARA
Undertaking by Students
We will preserve micro-project and the report in our custody till end of completion of
our program. We assure that we will produce the same whenever we or anybody from our
group will be asked to produce it without fail.

Sr. Roll Name of Student Mobile No. Signature


No. No.
1 30 KHATAVKAR SAISH PRASHANT 8799869300
2 34 LAWALE ATUL ANAND 8623917839
3 37 MAHAMUNI SARTHAK SANJAY 7385511966
Annexure – I A

Part A – Plan (About 2-3 pages)


Format for Micro-Project Proposal (For 1st to 4th Semester)
Title of Micro- Project BMI CALCULATOR
1.0 Brief Introduction:
The Cyber Attacks Microproject is focused on understanding various forms of cyber threats,
their impacts, and the measures required to safeguard against them. In today’s digital age,
cyber attacks have become more frequent, sophisticated, and damaging—targeting everything
from individual user data to critical national infrastructure.
This project aims to explore different types of cyber attacks such as phishing, malware,
ransomware, and DDoS attacks. It also covers essential cybersecurity concepts, tools, and
practices used to detect, prevent, and respond to such threats. Through this project, users gain
awareness of how vulnerable our digital systems can be and the importance of cybersecurity in
our daily lives.
2.0Aim of the Micro-Project

✓ Increase Awareness of Cyber Threats: To educate users about common types of cyber
attacks and their consequences on individuals, organizations, and governments.

✓ Promote Cyber Hygiene Practices: To raise awareness on best practices such as using
strong passwords, enabling two-factor authentication, and avoiding suspicious links and
emails.

✓ Understand Cybersecurity Concepts: To provide foundational knowledge about


cybersecurity tools, ethical hacking, and real-world defense mechanisms against cyber
threats.

✓ Learn Basic Research and Documentation Skills: To enhance analytical and presentation
skills by collecting, organizing, and presenting information on cyber attacks and protection
methods.

✓ Encourage Ethical Use of Technology: To promote responsible behavior in the digital


world by understanding the difference between ethical and malicious hacking.
Action Plan ( Sequence and time required for major activities for 8 weeks )

Sr. Planned Planned Name of Responsible


Details of Activity
No. Start date Finish date Team Members
1 Project topic discussion All members
2 Topic confirmed Sarthak
3 Collecting resources Atul & Sarthak
4 Collecting information Atul
5 Creating reports Saish
1.0 Resources Requires ( Major resources such as raw materials, some machining facility, software etc )

Sr.
Name of resource / material Specification Quantity Remarks
No.
1 Computer System Intel core i7 1
2 Operating system Windows 7 Professional 1
3 Google/ChatGpt With internet 1
*********
Annexure – II A
Part B – Outcome after Execution

Format for Micro-Project Report

For 1st to 4th Semester

Title of Micro-Project

1.0 Brief Description:

The Cyber Attacks Microproject is focused on understanding various forms of cyber threats,
their impacts, and the measures required to safeguard against them. In today’s digital age,
cyber attacks have become more frequent, sophisticated, and damaging—targeting everything
from individual user data to critical national infrastructure.
This project aims to explore different types of cyber attacks such as phishing, malware,
ransomware, and DDoS attacks. It also covers essential cybersecurity concepts, tools, and
practices used to detect, prevent, and respond to such threats. Through this project, users gain
awareness of how vulnerable our digital systems can be and the importance of cybersecurity in
our daily lives.

2.0 Aim of the Micro-Project

Raise Awareness About Cybersecurity: Educate users about the growing threats in the
digital world and the importance of protecting personal and organizational data from
cyber attacks.
Understand Common Cyber Attacks: Provide insights into different types of cyber
attacks such as phishing, malware, ransomware, and DoS/DDoS, along with real-life
examples.
Encourage Safe Online Practices: Promote responsible and secure behavior on the
internet by highlighting best practices like strong password creation, safe browsing,
regular updates.
Develop Research and Presentation Skills: Improve students’ ability to gather
information, analyze threats, and document findings in a clear and structured manner.
3.0 Course Outcome Integrated:
Understanding and Implementing Basic Programming Concepts

➢ Outcome : Students will be able to understand the basic concepts of cybersecurity, types of
cyber attacks, and the importance of safe digital practices in modern computing
environments.
➢ Integration: This microproject helps students explore real-world cyber threats,
understand the functioning of common attacks, and learn about protective strategies. It
enhances their ability to relate theoretical IT knowledge to practical security challenges
and encourages ethical thinking in digital usage.
4.0Actual Procedure Followed
Write the step wise the work was done, including which team member did what work and
how the data was analysed.
Actual Resources Used
( Mention the actual resources used )

Sr.
Name of resource / Specification Quantity Remarks
No. material
1 Computer System Intel core i7 1
2 Operating system Windows 7 Professional 1
3 Google/Chrome With interne 1
Annexure – III

Teacher Evaluation Sheet

Name of Student: KHATAVKAR SAISH PRASHANT Enrollment No: 2200410213

Name of Program: Information Technology Semester: VI

Course Title: Emerging Trends in CO/IT Code:22618

Title of the Micro-Project: Cyber Attacks

Course Outcomes Achieved:

Evaluation as per suggested Rubric for Assessment of Micro-Project


(Please tick in appropriate cell for each characteristic)

Poor Average Good Excellent


Sr. Characteristic to be
( Marks 1 -3 ( Marks 4 -5 ( Marks 6 -8 ( Marks 9 -
No. assessed
) ) ) 10)
1 Relevance to the course
2 Literature survey /
Information collected
3 Project Proposal
4 Completion of target as
per project proposal
5 Analysis of data and
representation
6 Quality of prototype /
Model
7 Report Preparation
8 Presentation
9 Defense
Micro-Project Evaluation Sheet
Process assessment Product assessment Total Marks
Part A Project Part B Individual
Project Methodology Project Report / Presentation / 10
Proposal ( 2 marks ) Working Model Viva
( 2 marks ) ( 2 marks ) ( 4 marks)

Note: Every course teacher is expected to assign marks for group evolution in first 3 columns and
individual evolution in 4th column for each group of students as per suggested rubrics.

Comments / suggestion about team work / leadership / inter-personal communication (if any):

Any other Comment:

Name and designation of faculty member:

Signature:
Guidelines for report:
1) Paper Size: A4
2) Font name: Calibri
3) Font size: 12 points (excluding cover page and initial pages)
4) Margins (Top, Bottom, Left, Right) : 2.5 cm
5) Line spacing: 1.2
6) Black and White printing (No colour printing)
Annexure – III

Teacher Evaluation Sheet

Name of Student: LAWALE ATUL ANAND Enrollment No: 2200410216

Name of Program : Information Technology Semester:VI

Course Title: Emerging Trends in CO/IT Code: 22618

Title of the Micro-Project: Cyber Attacks

Course Outcomes Achieved:

Evaluation as per suggested Rubric for Assessment of Micro-Project


(Please tick in appropriate cell for each characteristic)

Poor Average Good Excellent


Sr. Characteristic to be
( Marks 1 -3 ( Marks 4 -5 ( Marks 6 -8 ( Marks 9 -
No. assessed
) ) ) 10)
1 Relevance to the course
2 Literature survey /
Information collected
3 Project Proposal
4 Completion of target as
per project proposal
5 Analysis of data and
representation
6 Quality of prototype /
Model
7 Report Preparation
8 Presentation
9 Defense
Micro-Project Evaluation Sheet
Process assessment Product assessment Total Marks
Part A Project Part B Individual
Project Methodology Project Report / Presentation / 10
Proposal ( 2 marks ) Working Model Viva
( 2 marks ) ( 2 marks ) ( 4 marks)

Note: Every course teacher is expected to assign marks for group evolution in first 3 columns and
individual evolution in 4th column for each group of students as per suggested rubrics.

Comments / suggestion about team work / leadership / inter-personal communication (if any):

Any other Comment:

Name and designation of faculty member:

Signature:
Guidelines for report:
1) Paper Size: A4
2) Font name: Calibri
3) Font size: 12 points (excluding cover page and initial pages)
4) Margins (Top, Bottom, Left, Right) : 2.5 cm
5) Line spacing: 1.2
6) Black and White printing (No colour printing)
Annexure – III

Teacher Evaluation Sheet

Name of Student: MAHAMUNI SARTHAK SANJAY Enrollment No: 23210940570

Name of Program : Information Technology Semester:VI

Course Title: Emerging Trends in CO/IT Code:22618

Title of the Micro-Project: Cyber Attacks

Course Outcomes Achieved:

Evaluation as per suggested Rubric for Assessment of Micro-Project


(Please tick in appropriate cell for each characteristic)

Poor Average Good Excellent


Sr. Characteristic to be
( Marks 1 -3 ( Marks 4 -5 ( Marks 6 -8 ( Marks 9 -
No. assessed
) ) ) 10)
1 Relevance to the course
2 Literature survey /
Information collected
3 Project Proposal
4 Completion of target as
per project proposal
5 Analysis of data and
representation
6 Quality of prototype /
Model
7 Report Preparation
8 Presentation
9 Defense
Micro-Project Evaluation Sheet
Process assessment Product assessment Total Marks
Part A Project Part B Individual
Project Methodology Project Report / Presentation / 10
Proposal ( 2 marks ) Working Model Viva
( 2 marks ) ( 2 marks ) ( 4 marks)

Note: Every course teacher is expected to assign marks for group evolution in first 3 columns and
individual evolution in 4th column for each group of students as per suggested rubrics.

Comments / suggestion about team work / leadership / inter-personal communication (if any):

Any other Comment:

Name and designation of faculty member:

Signature:
Guidelines for report:
1) Paper Size: A4
2) Font name: Calibri
3) Font size: 12 points (excluding cover page and initial pages)
4) Margins (Top, Bottom, Left, Right) : 2.5 cm
5) Line spacing: 1.2
6) Black and White printing (No colour printing)
Suggested Rubric for Assessment of Micro-Project
Sr. Characteristic to be Poor Average Good Excellent
No. assessed ( Marks 1 -3 ) ( Marks 4 -5 ) ( Marks 6 -8 ) ( Marks 9 -10)
1 Relevance to the course Relate to very Relate to very Take care of Take care of
few LOs few LOs at-least one CO more than one
CO
2 Literature survey / Not more than At-least 5 At-least 7 At-least 10
Information collected two sources relevant relevant relevant
(primary and sources, at sources, most sources, most
secondary), least 2 latest. latest. latest.
very old
reference
3 Project Proposal Poor Satisfactory Good Excellent
4 Completion of target as Completed less Completed n Completed n Completed
per project proposal than 50% 50 to 60% 60 to 80% more than 80%
5 Analysis of data and Sample size Sufficient and Sufficient and Enough data
representation small, data appropriate appropriate collected by
neither sample, sample, sufficient and
organised nor enough data enough data appropriate
presented well. generated but generated sample size.
not organised which is Proper
and not well organised but inferences
present. poor inferences drawn by
drawn. organising and
presenting data
through tables,
charts and
graphs.
6 Quality of prototype / Incomplete Just assembled Well Well
Model fabrication / / fabricated and assembled / assembled /
assembly. parts are not fabricated with fabricated with
functioning proper proper
well. Not in functioning functioning
proper shape, parts. In proper parts. In proper
dimensions shape, within shape, within
beyond tolerance tolerance
tolerance limit. dimensions and dimensions and
Appearance / good finish / good finish /
finish is appearance. appearance.
shabby. But no Creativity in
creativity in design and use
design and use of material.
of material.
7 Report Preparation Very short, Nearly Detailed Very detailed
poor quality sufficient and correct and correct, clear
correct details clear description of
about methods, description of methods,
materials, methods, materials,
precautions materials, precautions.
and precautions. and
conclusion, but and conclusion,
clarity is not conclusion, Enough tables,
there in Sufficient charts and
presentation. graphic sketches.
But not enough description.
graphic
description.
8 Presentation Major Includes major Includes major Well organized
information is information but information includes major
not included, not well and well information,
information is organized and organized but well
not well presented well. not presented presented.
organized. well.
9 Defense Could not Replied to Replied Replied most
reply to considerable properly to of the
considerable number of considerable questions
number of questions but number of properly.
question. not very questions.
properly.

You might also like