International Research Journal of Engineering and Technology (IRJET) Volume: 11 Issue: 03 | Mar 2024
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
Cybersecurity Solutions- Pocket Tools for Cyber Well-being Siddhi Jadhav1, Prachit Save2 Abhijit Vadu3 , Anshul Jha4, Dr. Pandharinath Ghonge5, Shilpa Katre6 1,2,3,4 Student,Department of Electronics and Telecommunication Engineering, (University of Mumbai) St. John
College of Engineering and Management Palghar, India
5 HoD, Department of Electronics and Telecommunication Engineering, (University of Mumbai) St. John College of
Engineering and Management Palghar, India
6 Assistant Professor, Department of Electronics and Telecommunication Engineering, (University of Mumbai) St.
John College of Engineering and Management Palghar, India ---------------------------------------------------------------------***---------------------------------------------------------------Abstract— In an era marked by increasing dependence on computational technologies, the security of computer basedsystems and networks has became preeminent. The primary objective is to detect and prevent various breaches, ensuring the accuracy of data and privacy of data. This project leverages the stout capabilities of the Raspberry Pi 3B+ and to turn it into Mini computer which is very compact device. A customized Linux-based operating system is employed to provide a reliable and adaptable software environment for the system. A user-friendly interface is developed to allow system administrators to analyze network activity, configure reliable policies, and receive alerts in real-time. The cybersecurity solution includes active defense mechanisms to mitigate imminences, such as blocking malicious IP addresses, isolating compromised devices, and implementing firewall rules. This project's approach to cybersecurity emphasizes a provident and multi-layered strategy to safeguard virtual property. By combining the computational power of the Raspberry Pi, the safety features of Linux, and the flexibility of Node-MCU, this solution serves a scalable and cost-effective means of countering cyber perils. The proposed system is expected to contribute significantly to enhance cybersecurity and securing vital data in a variety of environments, from home networks to a small and mediumsized occupations. Furthermore, it offers as a precious learning source of supply for particular interested in cybersecurity. This project represents a step forward in the ongoing battle to secure electronic ecosystems and preserve the accuracy of data in an increasingly unified world.
available on-demand according to approved criterion. Cyber safety could be described as the mode to simplify the safety dreads aiming to keep safe repute damage [1] By general observation we saw getting various bombards on wireless fidelity system, sometimes uncertified users get linked, numerous times we use public open wireless network so our safety can be compromised. This project incorporates of showcasing various types of bombard and to establish explication on it to eliminate the risk and to stay inviolable in computational world
II. ABOUT THE CYBERSECURITY A. Introduction to Cybersecurity Cyber protection is the hone of safeguarding structured, organization, and programs from progressive invasion. These cyberattacks are more often than not acute at approaching to, reforming, or pulverizing touchy data extortion customer receipts by means of ransomware; or hindering typical trade forms. Implementing viable cybersecurity procedure is especially challenging nowadays since there are more devices than individuals, and invaders are getting to be more imaginative. Cyber safety can also be determined as a procedure and tactics that are crafted to fortify cybernetics materials and electronic data against the menaces[2]. B. Importnce of Cybersecurity
Keywords: Cybersecurity1, virus2, Vulnerabilities3, Raspberry Pi 3B+ 4, Honeypot5, USB Rubber Ducky6, Kali Linux7, prevention8
Nowadays we live in a computerized period where all angles of our lives depend on the organize, computer and other electronic gadgets, and computer program applications. All basic foundation such as the keeping money framework, healthcare, money related terms, governments, and fabricating businesses utilize gadgets associated to the Web as a center portion of their operations. A few of their data, such as mental property, monetary information, and individual information, can be delicate for unauthorized get to or introduction that seems to have negative results. This data gives gatecrashers and danger performing artists to penetrate them for budgetary pick up, blackmail, political or social thought processes, or
I. INTRODUCTION Cyber Security is a operation to shield interconnected networks apparatuses from foreign danger. The world of digital safety spins around the business standard of secrecy of data, consistency of data, and accessible data, or CIA. Secrecy means data can be accessed only by licensed associations. Data consistency means data can be adjunct, mutated, or detached only by licensed users. Accessible proofs means systems, activities, and information must be © 2024, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 972