Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/8030
Title: | Cyber Security Threats Detection, Analysis and Remediation |
Authors: | Dave, Kushal |
Keywords: | Computer 2016 Project Report 2016 Computer Project Report Project Report 16MCEI 16MCEI06 INS INS 2016 CE (INS) |
Issue Date: | 1-May-2018 |
Publisher: | Institute of Technology |
Abstract: | Nowadays human is connected with internet for almost everything, & various mediums are available for users to search to get relevant information for either business perspective or entertainment perspective. Similar way it can be a way to steal the information and attack on organization in various new techniques, in these scenario cyber security comes into the picture which is essential in each and every manner for user & organization perspective. Our project consist various types of well-known threats which are highly impactful for the company and complete process of the detection & remediation in best possible manner. The entire project is mainly divided into three basic modules which covers almost all the types of cyber threats that are coming in every organization every day, those are malware, security & suspicious emails. Malware Threats are generally propagates into the system through various malicious urls and malicious files or software which are downloaded by the users in company environment, that can potentially compromise the organization network as those are Worms, Trojans, Backdoors, and Ransomware. Security Threats are generally propagates through various SQL Injection, Cross site scripting or unauthorized excessive login into any servers which contain confidential information that could lead company to huge loss. Suspicious email conversation is the most dangerous way to attack on any organization by phishing, spoofing the headers and spam mails, which can be sent through outside company environment and it can be major setback if it is not solved properly. This project also explores certain ways to automate the current process of cybersecurity threat detection, analysis and remediation by developing a tool and make some changes in various rules-set in current tools to remediate false positives so that meantime To Response (MTTR) against every attack can be minimal, which plays important role in every organization. |
URI: | http://10.1.7.192:80/jspui/handle/123456789/8030 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
16MCEI06.pdf | 16MCEI06 | 3.69 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.