MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION,MUMBAI
GOVERNMENT POLYTECHNIC,BEED
[Institute Code:0032 ]
OperatingSystem
Course & Code :- Operating System (22516)
Title of Micro project :- “Security Of Operating
System"
Subject Teacher Head of Department Principal
Seal of institute
1
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION,MUMBAI
CERTIFICATEOFMICROPROJECT
This is to certify that following students of CM5I of Diploma in
COMPUTER TECHNOLOGY of the institute GOVERNMENT
POLYTECHNIC,BEED, Institute code:0032, have satisfactorily completed
MICROPROJECT work in subject/Course for academic year 2024-25 as
prescribed in the curriculum.
Exam Enrollment
Roll No.
No. Name of Student Title of Microproject
17502200320254 Mule Suraj Parmeshwar “Security Of Operating
System ”
Place :- Beed Date: /11/2024
SubjectTeacher Head of Department Principal
2
Teacher Evaluation Sheet
:- Mule Suraj
Name of Student Enrollment No
Parmeshwar Programe: Computer :- 2200320254
Technology Semester:-
Operating System (22516)
Course Title& Code:- Roll CM5I no :-
1750
Micro-Project: [In :-
Title of the short] "Security Of Operating System "
Course Outcomes :-
a. Understand the mechanisms of user authentication, authorization, and
auditing in OS environments.
b. Explore security techniques for protecting the kernel, such as system call
interception and secure boot mechanisms.
Evaluation as per Suggested Rubric for Assessment of Micro Project
Sr. Excellent
Characteristic to be assessed Poor 1 - 3 ) (Average
( Marks Marks 4 - 5 ) (Good
Marks 6 - (8 )
No. 0 Marks 9- 1
)
[A] Process and Assessment (Convert total marks out of 06)
Product
1 Relevance to the course
2 Literature Review/information
collection
3 Completion of the Target as
per project proposal
4 Analysis and data
representation
5 Quality of Prototype/Model
6 Report Preparation
Total Marks Out of
(6)
[B] Individual Presentation/Viva (Convert total marks out of 04)
1 Presentation
2 Viva
Total Marks Out of
(4)
Micro-Project Evaluation Sheet
Process and Product Total
Assessment (6 marks) Individual Mark
(Note:ThetotalmarkstakenfromtheaboveRu Presentation/Viv s 10
3
brics a (4 marks)
istobeconvertedinproportionof‘6’mark
s)
4
Annexure–I
Part – A Micro-Project Proposal
(FormatforMicro-ProjectProposalAabout2-3pages)
Title of Micro project : " Security Of Operating System"
1.0 (minimum 30-50 words)
Aims/Benefits of the Micro-Project
Aims:
● Understanding Core Security Concepts: To provide students with a
deep. understanding of the fundamental principles and concepts of
computer security as applied to operating systems.
● To explore methods of securing the operating system kernel and
managing the execution of user and system processes to prevent
malicious interference.
● To guide students in designing and building operating systems that are
resilient to various types of cyberattacks and malicious activity.
● To provide knowledge on various access control mechanisms (DAC,
MAC, RBAC) and how these models are implemented to manage user
permissions and prevent unauthorized access to system resources.
Benefits:
1) Enhanced SystemProtection:
Understanding OS security helps prevent unauthorized access, data breaches,
and system compromises, ensuring the integrity and confidentiality of data.
2) Improved System Stability :
By applying security best practices, students help maintain the stability and
reliability of systems, preventing downtime caused by security incidents.
3) Secure SystemDesign :
Knowledge gained allows students to design and configure operating systems
with built- in security features, strengthening overall defense against evolving
threats.
4) Compliance with Security Standards:
Understanding OS security enables organizations to meet industry regulations
and compliance standards (e.g., GDPR, HIPAA) by implementing necessary controls
and audit mechanisms.
5) Improved System Stability:
By applying security best practices, students help maintain the stability and
5
reliability of systems, preventing downtime caused by security incidents.
6
2.0Course Outcomes Addressed
● Demonstrate an understanding of fundamental security concepts such as
confidentiality, integrity, availability, and authentication in the context of operating systems.
● Implement and manage access control models such as Discretionary Access Control
(DAC), Mandatory Access Control (MAC), and Role-Based Access Control (RBAC) to secure
user access.
● Apply cryptographic techniques like encryption, decryption, and hashing to secure
communication, data storage, and integrity verification within operating systems.
● Understand and apply techniques for securing the OS kernel, managing processes,
and preventing unauthorized access to system resources.
● Apply OS hardening techniques, such as patch management, minimizing attack
surfaces, and configuring secure system settings to strengthen system defenses.
3.0Proposed Methodology
(Procedure in brief that will be followed to do the micro-project) in about 100 to
200 words).
Step 1: Study the micro project.
First of all group members will go through the micro project list. The discussion
will be done in group After the topic will be finalized. The guide will help to clear
the doubts and problem in project making.
Step 2: Collecting information from internet, books.
The work will be distributed among the group members. And different format
will be collected for report making like certificate, teacher evaluation sheet,
Annexure-A and B
Step 3: Finalizing the formats in collaboration.
All group member will go through sample collected, then format will be finalized.
Step 4: Finalizing the topic.
After finalizing the format, the topic will be discussed .the topic will be discussed
unanimously and as per the availability of material.
7
Step 5: Listing the stationaryitems requiredfor project along with budget. Everyone will
give stationary list required for report writing.
8
Step 6: Discussion of budget and finalize the amount.
The group members will discuss their views and budget will be finalized.
Step 7: Collection of photos and information/contents.
Every group member will collect their data from different website, books and from
personal visit to industry and give it to project guide for proof reading. After proof
reading the data along with photo will be finalized and every group member will be
proceed for their job.
Step 8: Printing/Drawing.
Printing or drawing will be done and shown to project guide
Step 9: Explanation/Preparation.
During oral/vi-va project will be explained.
5.0Action Pl an (Sequence and time required for major activity)
Name of
Sr. Planned Planned
Details of activity Responsible
No. Start date Finish date
Team
Members
1 Collecting different formats 06/03/202 07/01/202 Mule Suraj
4 4
2 Finalization of formats in 09/01/202 11/01/202 Mule Suraj
collaboration 4 4
3 Finalizing topic title 13/01/202 14/01/202 Mule Suraj
4 4
4 Writing a Code of Project 20/01/202 01/02/202 Mule Suraj
4 4
Searching information of related Mule Suraj
5 a 03/02/202 07/03/202
4 4
topic
Arrange the Information in The Mule Suraj
6 MS 09/03/202 20/03/202
4 4
Word
7 Prepare a Report of Micro-Project 25/03/202 03/04/202 Mule Suraj
4 4
8 Taking Print 05/04/202 11/04/202 Mule Suraj
4 4
9
6.0 Resources Required (major resources such as raw material, some
machining facility, software etc.)
S. Name of
Specifications Qty Remarks
No. Resource/material
1 Processor: Intel(R) Core(TM) i5-
Computer 12450H CPU @ 2.00GHz 2.00 01
GHz
Ram: 16 GB
Operating System Windows 12 -
2 MS Word For Writing a Report -
3 Google Chrome Browser For Searching Information -
4 Printer Taking Print 01
Names of Members with Enrollment No.
Enrollment No. Name of students
2200320325 MULE SURAJ
PARMESHWAR
10
– II
Annexure
Part – B Micro-Project Report
(OutcomesafterExecution)FormatforMicro-ProjectReport(Mn
i imum6pages)
TitleofMicro-Project: Security Of Operating
System
1.0Rationale
(Importance of the project, in about 30 to 50 words. This is a modified version of
the
earlier one written after the work)
A Restaurant management system (HMS) is a software solution designed to streamline
Restaurant operations, from reservations and check-ins to billing and housekeeping. It
centralizes data, enabling efficient management of guest information, room availability,
bookings, and payments. An HMS improves service speed, reduces manual errors, and
allows personalized guest experiences by tracking preferences and history. Key features
often include inventory management, reporting, billing, and role-based access for data
security. With real-time updates and insightful analytics, an HMS helps Restaurant s
enhance guest satisfaction, maximize occupancy, and improve operational efficiency,
making it an essential tool for modern hospitality management.
2.0 Aims/BenefitsoftheMicro-Project
Aims:
Understanding Core Security Concepts: To provide students with a deep. understanding
●To explore methods of securing the operating system kernel and
managing the execution of user and system processes to prevent
malicious interference.
●To guide students in designing and building operating systems that are
resilient to various types of cyberattacks and malicious activity.
●To provide knowledge on various access control mechanisms (DAC,
MAC, RBAC) and how these models are implemented to manage user
permissions and prevent unauthorized access to system resources.
11
Benefits:
1) Enhanced System Protection:
Understanding OS security helps prevent unauthorized access,
data breaches, and system
compromises,ensuringtheintegrityandconfidentialityofdata.
2) ImprovedSystemStability:
By applying security best practices,
students help maintain the stability and reliability of
systems,preventingdowntimecausedbysecurityincidents.
3) SecureSystemDesign:
Knowledgegainedallowsstudentstodesignandconfigureoperatingsystemswithbuilt-in
securityfeatures,strengtheningoveralldefenseagainstevolvingthre
ats.
4) CompliancewithSecurityStandards:
Understanding OS security enables organizations to meet industry
regulations and compliance standards (e.g., GDPR, HIPAA) by implementing
necessary controls and audit mechanisms.
5) ImprovedSystemStability:
By applying security best practices,
students help maintain the stability and reliability of
systems,preventingdowntimecausedbysecurityincidents.
3.0 CourseOutcomesAchieved(Add to the earlier list if more COs are addressed)
a. Understanding of Restaurant Operations and Management Processes
b. Proficiency in Software Development for Hospitality
c. Ability to Implement Database and Data Management Solutions
d. User Interface (UI) and User Experience (UX) Design Skills
e. Knowledge of Security and Access Control
12
5.0ActualMethodologyFolowed.
Step 1: Study the micro project.
First of all group members derived the micro project list form the project guide
and went through the topics. The discussion will be done in group. After the topic
will be finalized. The guide will helped to clear the doubts and problem in project
making.
Step 2: Collecting information from internet, books.
Then the work was distributed among the group [Link] preliminary search
was collection of different formats required for [Link] responsibility was
given to [Link] Swami & [Link] Yangali both of them made search of welding
form different websites,books,magazines [Link] tis they took help of
teachers,parants,neighbours,and visited some places also and the collection was
done by them,
Step 3: Finalizing the formats in collaboration.
All group member will go through sample collected, everyone expressed their
views on making of job using welding and requirement of [Link] one hour
discussion on it all members finalized the annexure A,B
Step 4: Finalizing the topic.
After finalizing the format, the topic will be discussed . the different field were
discussed by
the
[Link] that it was decided to prepare microproject on topic of operating
“Security
system
”.
the topic will be discussed unanimously
and as per the availability of [Link] everyone was given deadline for that.
Step 5: Listing the stationary items required for project along with budget.
Everyone was told to prepare stationary list required for report writing and
information collection and keep ready budget for it.
Step 6: Discussion of budget in group and finalize the amount.
In the next week every group members discussed their views and budget was
[Link] was Rs 50 each and it was told budget of group should not exceed than
the above amount.
Step 7: Collection of photos and information/contents.
Every group member will collected their data from different website, books and
from personal visit to industry and gave it to project guide for proof reading. After
13
proof reading the data along with photo were be finalized and every group
member started their [Link]
collected and included in this report
Step 8: Printing/Drawing.
We all decided to make report in print format,one member took printout of report,it was
shown to project guide by every member and collected tips for presentation.
14
6.0 Actual Resources Used (Mention the actual resources used).
S. No. Name of Resource/material Specifications Qty Remarks
Processor: i5
1 Computer 01
Ram:16 GB
For
2 Google Understanding -
the Project.
Taking Print of
3 Printer -
soft copy
8.0Skil l Devel
oped / Learning outcome of this Micro-Project
Through this microproject the following things are learnt and the skill developed by the
group
1. The concept of project understood.
2. The structure and requirement of proposal and report understood.
3. The necessity of team work is understood.
4. What is the role of group leader and team member? It well understood.
5. The importance of time management and good communication skill is
understood.
6. How to search information and use of different online tools came to know.
7. The writing in English skill is developed.
8. The new words are collected.
9. The computer access skill is developed.
10. Able to tackle and solve the problem arised
due to miscommunicationand misunderstanding.
11. The decision making ability is developed but needed good cooperation.
9.0Applications of this Micro-Project
1. Creating Security Of Operating System project.
2. Understand how to create Projects by using particular topic.
3. Creating bond with friends and teachers
15
IOS :
Title: macOS Security Overview
macOS is built with a strong focus on security, offering multiple layers to protect your
data. One of its key features is FileVault, which encrypts your entire hard drive,
ensuring that only you can access your files. Gatekeeper helps keep your system
safe by allowing only trusted apps from the Mac App Store or verified developers to
be installed. For added protection, System Integrity Protection (SIP) prevents malware
from modifying critical system files.
macOS also includes XProtect, an automatic malware scanner, and offers Touch ID
and strong password protection for quick and secure access. Additionally, Apple's
privacy controls allow you to manage app permissions, controlling which apps
can access your camera, location, or microphone. To keep everything up to
date, macOS regularly checks for security updates, ensuring your system is
always protected from the latest threats.
Stay safe by utilizing these built-in tools and best practices!
16
Windows
Title:WindowsSecurityOverview
Windows offers robust security features designed to protect your
device and data. Windows Defender Antivirus provides real-time
protection against malware, spyware, and other threats. It works
seamlessly with Firewall & Network Protection to block
unauthorized network access.
BitLocker encrypts your hard drive, ensuring that even if your
device is lost or stolen, your data remains secure.
Windows Hello offers biometric authentication with facial
recognition or fingerprint scanning, adding an extra layer of
security. The Action Center alerts you to potential security risks,
and Windows Update ensures that your system regularly receives
the latest security patches.
Windows also includes App & Browser Control to block malicious
websites and apps, as well as Controlled Folder Access to
protect sensitive files from ransomware. By staying up-to-date
17
with Windows security features and best practices, you can
maintain a secure and smooth computing experience.
18
Ubuntu :
Title: Ubuntu OSSecurityOverview
Ubuntu offers strong security features designed to protect your
system and data. One key tool is AppArmor, which provides
mandatory access control, restricting applications from accessing
sensitive files and resources. UFW (Uncomplicated Firewall)
makes it easy to configure and manage firewall rules, while
SELinux enhances security with detailed access controls for
processes and files.
Ubuntu also encourages regular updates, with the Software
Updater ensuring that your system receives the latest security
patches. Disk Encryption with LUKS ensures that your data
remains protected in case of theft or loss.
For additional protection, sudo enforces administrative
privileges, requiring a password for any system-level changes.
The Ubuntu Security Team actively monitors and releases
security fixes for vulnerabilities, ensuring your system stays
secure over time.
By leveraging these built-in security features and
19
following best practices, Ubuntu provides a secure and
reliable environment for everyday use.
20