SlideShare uma empresa Scribd logo
1 de 26
CYBERSECURITY AWARENESS IN ONLINE EDUCATION: A
CASE STUDY ANALYSIS
SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY
(AUTONOMOUS)
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu)
(Accredited by NBA for Civil, EEE, Mech., ECE & CSE
Accredited by NAAC with ‘A+’ Grade)
Puttur -517583, Chittoor District, A.P. (India)
GUIDE
ASSISTANT PROFESSOR,
MCA DEPARTMENT,
SIETK, PUTTUR
PRESENTED BY
Name,
Roll Number,
MCA DEPARTMENT,
SIETK, PUTTUR
Contents
 ABSTRACT
 INTRODUCTION
SOFTWARE AND HARDWARE REQUIREMENTS
ALGORITHM
MODULES
MODULES FUNCTIONALITY
UML DIAGRAMS
ER DIAGRAMS
REFERENCES
ABSTRACT
This study presents to what extent students are knowledgeable about cybersecurity in the distance education
process. The survey was conducted with a sample of students from all faculties of the university at the
undergraduate, graduate, and PhD levels. Our research study shows that although huge numbers of
cyberattacks are occurring around the world, the students did not have any knowledge about cybersecurity
and the effects of cyberattacks overall. An analysis of cybersecurity awareness was undertaken by asking
questions focused on malicious software, password security, and social media security. Although we live in
an age of technology where our entire lives are indexed to the internet through the distance education
process, it has been determined that students have a weak cybersecurity awareness. It has been further
concluded that cybersecurity education should be given to prevent the students from becoming a victim of
cyberattacks, helping them to use the internet more effectively.
Keywords : Students, Online, Education, Cyber Security, Cyber attacks
INTRODUCTION
 With the spread of technology and the penetration of the internet into every aspect of daily life,
cybersecurity has begun to be of great importance for both individuals and states alike.
Although these innovations have made our lives easier, the increase in cyberattacks has made it
necessary to take measures in this area.
 Cybersecurity awareness, or information security awareness, has become an important issue today.
 The number of studies on this subject, which affects every aspect of daily life, is increasing.
 First of all, defining cybersecurity awareness is important to better gain a full understanding of the
subject.
 As can be understood from the definition, the important points are evaluated in two ways.
Firstly, it emphasizes the importance and responsibilities to do with information security.
 Secondly, it is aimed at knowing and applying information security control practices at an adequate
level to protect the information.
EXISTING SYSTEM
 In Existing system, conducted a study on this subject involving Malaysian students.
They investigated whether the sample of students knew about this subject and whether they had
been the victim of this type of fraud.
The results of their survey showed that more than 30% of students had been a victim of a social
networking site scam and surveyed cybersecurity awareness among college students.
They found that the students were able to protect themselves from cyber threats and here conducted
a survey among undergraduate and graduate students.
The survey was conducted on students from various countries.
The results revealed that internet users are aware of cyber risks and simple precautions are taken by
them.
The authors claimed that there is a link between cyber awareness and cyber knowledge.
DISADVANTAGES OF EXISTING SYSTEM
 The system is not implemented Security Vulnerabilities And Cyber Threats.
 The system is not implemented Awareness Of Cybercrimes And Laws.
PROPOSED SYSTEM
Cybersecurity awareness, or information security awareness, has become an important issue today.
 First of all, defining cybersecurity awareness is important to better gain a full understanding of the
subject
defined the concept as; ``the degree of understanding of users about the importance of information
security and their responsibilities and acts to exercise sufficient levels of information security
control to protect the organization's data and networks''.
As can be understood from the definition, the important points are evaluated in two ways.
Firstly, it emphasizes the importance and responsibilities to do with information security.
Secondly, it is aimed at knowing and applying information security control practices at an adequate
level to protect the information
on the other hand, defines cybersecurity awareness as a phenomenon that aims to increase the level
of knowledge about the online applications
 Within the framework of these definitions, it can be clearly seen that security awareness training
should be provided to improve cybersecurity awareness.
ADVANTAGES OF PROPOSED SYSTEM
 It measures the level of awareness of an ordinary computer user about the risks of cyberattacks, it
is important to determine whether they have basic security knowledge.
 Since it is predicted that most of the participants are a population that uses passwords, has social
media accounts, and installs various software on their computers, the questions were chosen in this
direction
ALGORITHM USED
 Logistic Regression
HARDWARE REQUIREMENTS
 Processor- Intel (R) Core (TM) i3-4200U
 CPU - 1.6GHz
 RAM:4 GB
 Hard Disk: 500 GB.
SOFTWARE REQUIREMENTS
Operating System - Windows 10/11
Server - XAMPP Server
Front End - HTML, CSS, JS
Back End - Python
Data base - MYSQL
IDE - PyCharm
 Framework - Django
MODULES
In this proposed system there are two modules they are:
1. Admin
2. user
MODULES FUNCTIONALITY
Admin: The following are the functionalities provided by the Admin:
1. Login
2. Browse & Train & Test Data sets
3. View Trained & Tested Accuracy in Bar Chart
4. View Trained & Tested Accuracy results
5. View Prediction of Cyber Security Awareness
6. View Cyber Security Awareness type Ratio
7. Download Trained Data sets
8. View Cyber Security Awareness type ratio results
9. View all users
10. Log out
MODULES FUNCTIONALITY
Users: The following are the functionalities provided by the User:
1. Register & Login
2. Predict Cyber Security Awareness type
3. View Your Profile
4. Log Out
UML DIAGRAMS
CLASS DIAGRAM
Use Case Diagram for User
Use Case Diagram for Admin
SEQUENCE DIAGRAM
Admin Server User
Login
Reg & Login
1. browse & Train & Test Data Sets
2. View Trained & tested Accuracy In Bar Chart
3. View Trained & Tested Accuracy results
4. View Prediction of Cyber Security Awareness
5. View Cyber Security Awareness type ratio
6. Download Trained Data Sets
7. View Cyber Security awareness type ratio results
8. View all Users
9. Predict cyber security awareness Type
10. View Your Profile
ACTIVITY DIAGRAM FOR ADMIN
ACTIVITY DIAGRAM FOR USER
DEPLOYMENT DIAGRAM
Server
Admin User
COLLABORATION DIAGRAM
: Admin : Server : Users
Browse & Train & test Data Sets
View Trained & Tested Accuracy in Bar Chart
View Trained & Tested Accuracy Results
View Prediction of Cyber Security Awareness
View cyber Security Awareness type Ratio
Doanload Trained Data Sets
View Cyber Security Awareness type Ratio
Results
View all Users
Predict Cyber Security Awareness Type
View Your Profile
1:
2:
ER Diagrams For Admin
Download
Trained Data Sets
View Cyber
Security
Awareness type
ratio
View Cyber
Security
Awareness Type
Ratio Results
Admin
Name ID
has
password
Login
Data
Password
User name
manage
Browse & Train &
Test Data Sets
View Trained &
tested Accuracy In
Bar Chart
View Trained &
Tested Accuracy
Results
View
Prediction of
Cyber Security
Awareness
View all Users
ER Diagrams For User
View Your Profile
User
Name ID
has
password
Login
Data
Password
User name
mana
ge
Predict Cyber
Security Awareness
Type
[1] M. Zwilling, G. Klien, D. Lesjak, Ł. Wiechetek, F. Cetin, and H. N. Basim, ‘‘Cyber
security awareness, knowledge and behavior: A comparative study,’’ J. Comput. Inf. Syst.,
vol. 62, no. 1, pp. 82–97, Jan. 2022.
[2] A. A. Karim, P. M. Shah, F. Khalid, M. Ahmad, and R. Din, ‘‘The role of personal
learning orientations and goals in Students’ application of information skills in Malaysia,’’
Creative Educ., vol. 6, no. 18, pp. 2002–2012, 2015.
[3] N. Kaloudi and J. Li, ‘‘The AI-based cyber threat landscape: A survey,’’ ACM Comput.
Surv., vol. 53, no. 1, pp. 1–34, Jan. 2021.
[4] J. Jang-Jaccard and S. Nepal, ‘‘A survey of emerging threats in cybersecurity,’’ J.
Comput. Syst. Sci., vol. 80, no. 5, pp. 973–993, Aug. 2014.
REFERENCES
Cyber Security PPT.pptx

Mais conteúdo relacionado

Semelhante a Cyber Security PPT.pptx

Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docx
toltonkendal
 

Semelhante a Cyber Security PPT.pptx (20)

Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
A Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing SystemA Privacy-Aware Tracking and Tracing System
A Privacy-Aware Tracking and Tracing System
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docx
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
H364752
H364752H364752
H364752
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 

Último

Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Klinik kandungan
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
HyderabadDolls
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 

Último (20)

Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 

Cyber Security PPT.pptx

  • 1. CYBERSECURITY AWARENESS IN ONLINE EDUCATION: A CASE STUDY ANALYSIS SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY (AUTONOMOUS) (Approved by AICTE, New Delhi & Affiliated to JNTUA, Ananthapuramu) (Accredited by NBA for Civil, EEE, Mech., ECE & CSE Accredited by NAAC with ‘A+’ Grade) Puttur -517583, Chittoor District, A.P. (India) GUIDE ASSISTANT PROFESSOR, MCA DEPARTMENT, SIETK, PUTTUR PRESENTED BY Name, Roll Number, MCA DEPARTMENT, SIETK, PUTTUR
  • 2. Contents  ABSTRACT  INTRODUCTION SOFTWARE AND HARDWARE REQUIREMENTS ALGORITHM MODULES MODULES FUNCTIONALITY UML DIAGRAMS ER DIAGRAMS REFERENCES
  • 3. ABSTRACT This study presents to what extent students are knowledgeable about cybersecurity in the distance education process. The survey was conducted with a sample of students from all faculties of the university at the undergraduate, graduate, and PhD levels. Our research study shows that although huge numbers of cyberattacks are occurring around the world, the students did not have any knowledge about cybersecurity and the effects of cyberattacks overall. An analysis of cybersecurity awareness was undertaken by asking questions focused on malicious software, password security, and social media security. Although we live in an age of technology where our entire lives are indexed to the internet through the distance education process, it has been determined that students have a weak cybersecurity awareness. It has been further concluded that cybersecurity education should be given to prevent the students from becoming a victim of cyberattacks, helping them to use the internet more effectively. Keywords : Students, Online, Education, Cyber Security, Cyber attacks
  • 4. INTRODUCTION  With the spread of technology and the penetration of the internet into every aspect of daily life, cybersecurity has begun to be of great importance for both individuals and states alike. Although these innovations have made our lives easier, the increase in cyberattacks has made it necessary to take measures in this area.  Cybersecurity awareness, or information security awareness, has become an important issue today.  The number of studies on this subject, which affects every aspect of daily life, is increasing.  First of all, defining cybersecurity awareness is important to better gain a full understanding of the subject.  As can be understood from the definition, the important points are evaluated in two ways. Firstly, it emphasizes the importance and responsibilities to do with information security.  Secondly, it is aimed at knowing and applying information security control practices at an adequate level to protect the information.
  • 5. EXISTING SYSTEM  In Existing system, conducted a study on this subject involving Malaysian students. They investigated whether the sample of students knew about this subject and whether they had been the victim of this type of fraud. The results of their survey showed that more than 30% of students had been a victim of a social networking site scam and surveyed cybersecurity awareness among college students. They found that the students were able to protect themselves from cyber threats and here conducted a survey among undergraduate and graduate students. The survey was conducted on students from various countries. The results revealed that internet users are aware of cyber risks and simple precautions are taken by them. The authors claimed that there is a link between cyber awareness and cyber knowledge.
  • 6. DISADVANTAGES OF EXISTING SYSTEM  The system is not implemented Security Vulnerabilities And Cyber Threats.  The system is not implemented Awareness Of Cybercrimes And Laws.
  • 7. PROPOSED SYSTEM Cybersecurity awareness, or information security awareness, has become an important issue today.  First of all, defining cybersecurity awareness is important to better gain a full understanding of the subject defined the concept as; ``the degree of understanding of users about the importance of information security and their responsibilities and acts to exercise sufficient levels of information security control to protect the organization's data and networks''. As can be understood from the definition, the important points are evaluated in two ways. Firstly, it emphasizes the importance and responsibilities to do with information security. Secondly, it is aimed at knowing and applying information security control practices at an adequate level to protect the information on the other hand, defines cybersecurity awareness as a phenomenon that aims to increase the level of knowledge about the online applications  Within the framework of these definitions, it can be clearly seen that security awareness training should be provided to improve cybersecurity awareness.
  • 8. ADVANTAGES OF PROPOSED SYSTEM  It measures the level of awareness of an ordinary computer user about the risks of cyberattacks, it is important to determine whether they have basic security knowledge.  Since it is predicted that most of the participants are a population that uses passwords, has social media accounts, and installs various software on their computers, the questions were chosen in this direction
  • 10. HARDWARE REQUIREMENTS  Processor- Intel (R) Core (TM) i3-4200U  CPU - 1.6GHz  RAM:4 GB  Hard Disk: 500 GB.
  • 11. SOFTWARE REQUIREMENTS Operating System - Windows 10/11 Server - XAMPP Server Front End - HTML, CSS, JS Back End - Python Data base - MYSQL IDE - PyCharm  Framework - Django
  • 12. MODULES In this proposed system there are two modules they are: 1. Admin 2. user
  • 13. MODULES FUNCTIONALITY Admin: The following are the functionalities provided by the Admin: 1. Login 2. Browse & Train & Test Data sets 3. View Trained & Tested Accuracy in Bar Chart 4. View Trained & Tested Accuracy results 5. View Prediction of Cyber Security Awareness 6. View Cyber Security Awareness type Ratio 7. Download Trained Data sets 8. View Cyber Security Awareness type ratio results 9. View all users 10. Log out
  • 14. MODULES FUNCTIONALITY Users: The following are the functionalities provided by the User: 1. Register & Login 2. Predict Cyber Security Awareness type 3. View Your Profile 4. Log Out
  • 16. Use Case Diagram for User
  • 17. Use Case Diagram for Admin
  • 18. SEQUENCE DIAGRAM Admin Server User Login Reg & Login 1. browse & Train & Test Data Sets 2. View Trained & tested Accuracy In Bar Chart 3. View Trained & Tested Accuracy results 4. View Prediction of Cyber Security Awareness 5. View Cyber Security Awareness type ratio 6. Download Trained Data Sets 7. View Cyber Security awareness type ratio results 8. View all Users 9. Predict cyber security awareness Type 10. View Your Profile
  • 22. COLLABORATION DIAGRAM : Admin : Server : Users Browse & Train & test Data Sets View Trained & Tested Accuracy in Bar Chart View Trained & Tested Accuracy Results View Prediction of Cyber Security Awareness View cyber Security Awareness type Ratio Doanload Trained Data Sets View Cyber Security Awareness type Ratio Results View all Users Predict Cyber Security Awareness Type View Your Profile 1: 2:
  • 23. ER Diagrams For Admin Download Trained Data Sets View Cyber Security Awareness type ratio View Cyber Security Awareness Type Ratio Results Admin Name ID has password Login Data Password User name manage Browse & Train & Test Data Sets View Trained & tested Accuracy In Bar Chart View Trained & Tested Accuracy Results View Prediction of Cyber Security Awareness View all Users
  • 24. ER Diagrams For User View Your Profile User Name ID has password Login Data Password User name mana ge Predict Cyber Security Awareness Type
  • 25. [1] M. Zwilling, G. Klien, D. Lesjak, Ł. Wiechetek, F. Cetin, and H. N. Basim, ‘‘Cyber security awareness, knowledge and behavior: A comparative study,’’ J. Comput. Inf. Syst., vol. 62, no. 1, pp. 82–97, Jan. 2022. [2] A. A. Karim, P. M. Shah, F. Khalid, M. Ahmad, and R. Din, ‘‘The role of personal learning orientations and goals in Students’ application of information skills in Malaysia,’’ Creative Educ., vol. 6, no. 18, pp. 2002–2012, 2015. [3] N. Kaloudi and J. Li, ‘‘The AI-based cyber threat landscape: A survey,’’ ACM Comput. Surv., vol. 53, no. 1, pp. 1–34, Jan. 2021. [4] J. Jang-Jaccard and S. Nepal, ‘‘A survey of emerging threats in cybersecurity,’’ J. Comput. Syst. Sci., vol. 80, no. 5, pp. 973–993, Aug. 2014. REFERENCES