Вы находитесь на странице: 1из 10

KARNATAK LAW SOCIETYS

GOGTE INSTITUTE OF TECHNOLOGY


UDYAMBAG, BELAGAVI-590008
(An Autonomous Institution under Visvesvaraya Technological University, Belagavi)
(APPROVED BY AICTE, NEW DELHI)

Design Thinking Project Report


Cyber Security
Submitted in the partial fulfilment for the academic requirement of
5th Semester B.E.
in
COMPUTER SCIENCE & ENGINEERING

Submitted by
Akshaykumar Chilad
2GI16CS403

GUIDE
Prof. S.R.Dhotre

2017 2018

1
Department of Computer Science and Engineering
KARNATAK LAW SOCIETYS

GOGTE INSTITUTE OF TECHNOLOGY


UDYAMBAG, BELAGAVI-590008
(An Autonomous Institution under Visvesvaraya Technological University, Belagavi)
(APPROVED BY AICTE, NEW DELHI)

Department of Computer Science & Engineering

CERTIFICATE
This is to certify that Mr. Akshaykumar chilad of 5th semester and bearing USN
2GI16CS403 has satisfactorily completed the Project in Design Thinking course (15CS59A).
It can be considered as a bonafide work carried out in partial fulfilment for the academic
requirement of 5th Semester B.E. (Computer Science & Engineering) prescribed by KLS
Gogte Institute of Technology, Belagavi during the academic year 2017- 2018.
The report has been approved as it satisfies the academic requirements prescribed for the said
Degree.

Signature of the Faculty Member Signature of the HOD

Date:

2
Department of Computer Science and Engineering
CONTENT

1. INTRODUCTION..4

2. NEED FOR THE PROJECT5

3. SPECIFICATION6

4. METHODOLOGY.6

5. WORKING DIAGRAM..7

6. GAPS IDENTIFIED ..8

7. ADVANTAGES..8

8. CONCLUSION..9

9. REFERENCES.9

3
Department of Computer Science and Engineering
INTRODUCTION
The World Wide Web and the Internet are fantastic places to converse, conduct
business, do research, or simply relax and play a few games. But unfortunately, it's also a
place where some individuals would like to create havoc by committing fraud, identity theft,
robbery, or to commit more serious crimes such as terrorism. This course looks at the world
of Cyber security by examining the types of attacks these ner-do-wells use breach
organisational defences and compromise systems.
cyber security as a continuation of evolved version of it-security, others view it as a
completely new branch of security and still others see it as mixture of the two. This course
will give you the basics based on actual literature reviews, academic research and personal
experience in global projects and work in cyber security, focusing on cyber warfare,
espionage, crime and defenses as well as attacks used. s.
Data is more accessible and transferable today than ever before, and the vast
majority of data is sensitive at various levels. Some is confidential simply because it is part of
an internal organization and was not meant to be available to the public. Some data is
sensitive because of corporate requirements, national laws, and international regulations.
Often the value of data is dependent upon its remaining confidential - consider intellectual
property and competition.
AES is an iterative rather than Feistel cipher. It is based on substitutionpermutation
network. It comprises of a series of linked operations, some of which involve replacing
inputs by specific outputs (substitutions) and others involve shuffling bits around
(permutations).

4
Department of Computer Science and Engineering
NEED FOR PROJECT

Security of users data


More trusty transactions
Higher secured connection of data
No extra charges to implement the data
SQL injection method is prevented

5
Department of Computer Science and Engineering
SPECIFICATIONS

Data storage and access to AZURE CLOUD


AES Encryption algorithm
AZURE LINK establishment

6
Department of Computer Science and Engineering
METHODOLOGY

The project is to prevent SQL injection while firing queries to database and to make
the database secured. This system is online so no need of implementation. It can be accessed
through internet from anywhere. The system uses SQL Injection mechanism to keep the data
safe and secured.
The highlighted part here is encryption of card data using AES (Advanced Encryption
Standard) technique. The Online Shop secures the card payment and wont let the card data
to get hacked. While user doing a card payment, all the card data is encrypted and then
stored into database. System also keeps user details in an encryption form using AES
encryption

7
Department of Computer Science and Engineering
WORKING DIAGRAM

USECASE DIAGRAM OF DATA LEAKAGE:

8
Department of Computer Science and Engineering
GAPS IDENTIFIED

Security will be provided to the E-commerce users data stored in the E-commerce
website database
Encryption of Users data and storing it into the databse
Encryption is done using advanced encryption standard technique so the data is 10x
times secured than normal encryption system

ADVANTAGES

Secured transaction while doing card payment and users can save their card
details as no risk of data leakage
The system is very secured and robust in nature
SQL injection prevention method is used
Advanced Encryption System will keep the data 10x secured

9
Department of Computer Science and Engineering
CONCLUSION

By using this Advanced Encryption in sql injection prevention method will let the
user to save data in the more security of the data so there will be no data leakage by any
means of leakage of data.

REFERENCES

1. Peterson, D. and Howard, D. "Cyber Security for the Electric Sector (link is external),"
September 12, 2005.
2. https://en.wikipedia.org/wiki/Cyber_security_standards
3.indtroduction about AES technique
https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm

10
Department of Computer Science and Engineering

Вам также может понравиться