SlideShare a Scribd company logo
1 of 17
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SCHOOL OF COMPUTING
10214CC501
COMMUNITY SERVICE PROJECT
WINTER SEMESTER(2023-2024)
REVIEW - I
“DIGITAL PARENTAL CONTROL USING KEY LOGGER”
PRESENTED BY
1. P. Jithu Singh (VTU24207) (REG.22UECS0777)
2. G. Charan Kumar Reddy (VTU.21858)(REG.22UECS0237)
3. T. Harsha Vardhan (VTU.22361)(REG.22UECS0678)
SUPERVISED BY
Faculty Name : Dr.D Sundar Narayana
Designation: Asst.professor
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
1
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 2
AGENDA
• ABSTRACT
• OBJECTIVE
• INTRODUCTION ABOUT VILLAGE
• ACTIVITY LOG
• SURVEY
• SURVEY ANALYSIS WITH REPORT
• SOCIETY RELEVANT PROBLEM IDENTIFICATION
• NOVEL IDEA GENERATION
• PROTOTYPE/DEVELOPMENT OF NEW SOLUTION
• GEOTAGGED PHOTOS AND DETAIL&VIDEOLINK
• AUTHENTICATED SIGNATURES PROOF AND DETAIL
• PLAGIARISM REPORT
 The aim is to focus on digital parental controlling by through an application,
for Safeguarding Children’s Online Experiences.
 Features and Functionalities: Content Filtering, App Management, Time
Limits, Location Tracking.
 Ensuring Privacy and Data Protection in Parental Control Solution and, The
Challenges Faced by Parents in Managing Children’s Digital Activities.
 Role of Parental Involvement and Communication in Digital Parenting
Comparative Analysis of Popular Parental Control Solution, Future
Developments: AI, Machine Learning, and Data Analytics
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 3
Aim of the Project:
The aim is to focus on digital parental controls through the website, for the
safe search of children activities.
Scope of the Project:
 Content Filtering and Monitoring: Parental control tools are designed to
filter and monitor content across the internet, social media, apps, and online
games. The scope includes refining filtering algorithms to block age-
inappropriate content effectively.
 App and Game Management: Parental control solutions allow parents to
manage and restrict access to specific apps and games, ensuring children
spend time on educational or suitable content.
 Safe Search and Web Browsing: Parental control solutions implement safe
search settings to filter out explicit content from search results, ensuring a
safer browsing experience.
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 4
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 5
Census Parameter Census Data
Total Population 30,062
Total No of Houses 7,367
Total Literacy rate 67.77%
Working Population 19,400
Koilakuntala is the village where we conducted our survey regarding a
software-based keylogger and persistence function for parents to monitor the
children's online activities daily on the Internet. The impact of insufficient
cyber awareness in village is particularly profound on children,who are
increasingly active online for both educational and recreational purposes.
Without proper guidance and education on cyber safety, children are at a higher
risk of encountering online predators, cyberbullying, and exposure to
inappropriate content.
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 6
Day/Date Brief Description of the activity Learning Outcome
Day1
13/12/2023
Seeking permissions from the
sarpanch to the survey
Overview of the
village
Day2
14/17/2023
Discussions with parents &
children about cyberattacks
Understanding of
cybersecurity
concepts
Day3
15/18/2023
Engaging converstions with
parents to know about key
logger.
parents want to
overcome their
children from
cyberattacks
Day4
16/12/2023
Guided session on key logger Accessing technology
to get aware on
cyberattcks
Day5
17/20/2023
Collaborative creation
of Cyber Attacks
Gain expert guidance
for
future Cyber Attacks
• How concerned are you about online risks and threats affecting your child?
• Which devices do you believe in need of parental control the most?
• What additional resources or support would you like to have to enhance
your understanding and usage of digital parental controls?
• Do your child have smart phone, how long do your child uses phone?
• Have you experienced any issues with false positives (blocking
appropriate content) or false negatives (allowing inappropriate content) with
the parental control solution?
• What are your primary reasons for using digital parental control solutions?
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 7
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 8
• Awareness and Adoption: Determine the percentage of respondents who
are aware of digital parental control solutions and the proportion
who currently use such tools.
• Challenges Faced: Analyze the challenges reported by parents while
using digital parental control solutions. Identify common issues or pain
points that may need improvement.
• Comparative Analysis: If the survey includes questions about different
parental control solutions, conduct a comparative analysis to identify which
ones are most preferred and why.
• Concerns and Priorities: Parents may have different concerns related
to internet safety, such as cyberbullying, online predators, excessive screen
time, exposure to inappropriate content, or privacy concerns.
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 9
HTTPS://DOCS.GOOGLE.COM/FORMS/D/E/1FAIPQLSEEABGCW6VMUX8HPNYVG0WZCTSF6F9-
AS61E7JDQZXKDZCRZW/VIEWFORM?USP=SF_LINK
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 10
 Cybersecurity Risks: Parental control solutions themselves may be
vulnerable to cyber-attacks or hacking, posing risks to both the children's
safety and their data.
 Parental Education: Society needs to address the lack of awareness and
knowledge about digital parental control among some parents. Providing
comprehensive parental education on the use and limitations of such
tools is essential.
 Psychological Impact: Excessive monitoring and restrictions might lead to
feelings of mistrust or frustration in children, affecting their emotional well-
being and parent-child relationships.
 Community feedback : It can provide valuable insights into user
experiences and satisfaction levels. Here are some common themes of
community feedback for digital parental control
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 11
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 12
Keylogger applications designed by implementing the Exact String Matching
algorithm can record all user activities related to the keyboard, and the results
are stored automatically in a dedicated database that can only be accessed by
the keylogger owner
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 13
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 14
RECOMMENDATIONS:
 Collaborative Approach
 Continous Improvements & Postive Imapct
 Use Parental Controls
 Empowering cyberattacks
Conclusion:
A keylogger is a type of surveillance software or Hardware Devics that
has the capability to record every keystroke, instant messages, e-mail, and
any information you type at any time using your keyboard.
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 15
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 16
THANK YOU
12-04-2024
BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 17

More Related Content

Similar to cse-csp batch4 review-1.1.pptx cyber security

TCDSB Information and Technology Strategy
TCDSB Information and Technology StrategyTCDSB Information and Technology Strategy
TCDSB Information and Technology StrategySteve Camacho, MBA
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeJulie Evans
 
Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022 Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022 Julie Evans
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
12 feb18microsoft sk,sf
12 feb18microsoft sk,sf12 feb18microsoft sk,sf
12 feb18microsoft sk,sfJisc
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelJulie Evans
 
Using Speak Up Data to Inform Your Digital Learning Plans
Using Speak Up Data to Inform Your Digital Learning PlansUsing Speak Up Data to Inform Your Digital Learning Plans
Using Speak Up Data to Inform Your Digital Learning PlansJulie Evans
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilitiesFiras Dabbagh
 
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022Kavika Roy
 
Digital health and wellbeing: the case for broadening the EU DigComp framework
Digital health and wellbeing: the case for broadening the EU DigComp frameworkDigital health and wellbeing: the case for broadening the EU DigComp framework
Digital health and wellbeing: the case for broadening the EU DigComp frameworkdebbieholley1
 
Information behavior or learning behavior? Empirical experience with web anal...
Information behavior or learning behavior? Empirical experience with web anal...Information behavior or learning behavior? Empirical experience with web anal...
Information behavior or learning behavior? Empirical experience with web anal...Michal Černý
 
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...EduSkills OECD
 
Learner digital experience insights survey 2020: UK further education (FE) su...
Learner digital experience insights survey 2020: UK further education (FE) su...Learner digital experience insights survey 2020: UK further education (FE) su...
Learner digital experience insights survey 2020: UK further education (FE) su...Jisc
 
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...IJCSIS Research Publications
 
Virtual Labs and digital divide in India (1).pptx
Virtual Labs and digital divide in India (1).pptxVirtual Labs and digital divide in India (1).pptx
Virtual Labs and digital divide in India (1).pptxRitabrataGhosh4
 

Similar to cse-csp batch4 review-1.1.pptx cyber security (20)

Eumind
EumindEumind
Eumind
 
TCDSB Information and Technology Strategy
TCDSB Information and Technology StrategyTCDSB Information and Technology Strategy
TCDSB Information and Technology Strategy
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Cybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and PracticeCybersecurity - Strategy, Policy and Practice
Cybersecurity - Strategy, Policy and Practice
 
Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022 Speak Up Data Featured at FETC 2022
Speak Up Data Featured at FETC 2022
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
12 feb18microsoft sk,sf
12 feb18microsoft sk,sf12 feb18microsoft sk,sf
12 feb18microsoft sk,sf
 
Fetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity PanelFetc 2022 Cybersecurity Panel
Fetc 2022 Cybersecurity Panel
 
Using Speak Up Data to Inform Your Digital Learning Plans
Using Speak Up Data to Inform Your Digital Learning PlansUsing Speak Up Data to Inform Your Digital Learning Plans
Using Speak Up Data to Inform Your Digital Learning Plans
 
Our kids and the digital utilities
Our kids and the digital utilitiesOur kids and the digital utilities
Our kids and the digital utilities
 
Aisd5 article 2
Aisd5   article 2Aisd5   article 2
Aisd5 article 2
 
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022
Top 10 Innovative K-12 Educational Technology Trends to Watch Out in 2022
 
Digital health and wellbeing: the case for broadening the EU DigComp framework
Digital health and wellbeing: the case for broadening the EU DigComp frameworkDigital health and wellbeing: the case for broadening the EU DigComp framework
Digital health and wellbeing: the case for broadening the EU DigComp framework
 
Information behavior or learning behavior? Empirical experience with web anal...
Information behavior or learning behavior? Empirical experience with web anal...Information behavior or learning behavior? Empirical experience with web anal...
Information behavior or learning behavior? Empirical experience with web anal...
 
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...
Starting Strong - Empowering Young Children in the Digital Age - EDU Webinar ...
 
Learner digital experience insights survey 2020: UK further education (FE) su...
Learner digital experience insights survey 2020: UK further education (FE) su...Learner digital experience insights survey 2020: UK further education (FE) su...
Learner digital experience insights survey 2020: UK further education (FE) su...
 
Poster_fa
Poster_faPoster_fa
Poster_fa
 
eumind
eumindeumind
eumind
 
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...
Knowledge Extraction by Applying Data Mining Technique to Use in Decision Mak...
 
Virtual Labs and digital divide in India (1).pptx
Virtual Labs and digital divide in India (1).pptxVirtual Labs and digital divide in India (1).pptx
Virtual Labs and digital divide in India (1).pptx
 

Recently uploaded

Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 

Recently uploaded (20)

Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 

cse-csp batch4 review-1.1.pptx cyber security

  • 1. DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING SCHOOL OF COMPUTING 10214CC501 COMMUNITY SERVICE PROJECT WINTER SEMESTER(2023-2024) REVIEW - I “DIGITAL PARENTAL CONTROL USING KEY LOGGER” PRESENTED BY 1. P. Jithu Singh (VTU24207) (REG.22UECS0777) 2. G. Charan Kumar Reddy (VTU.21858)(REG.22UECS0237) 3. T. Harsha Vardhan (VTU.22361)(REG.22UECS0678) SUPERVISED BY Faculty Name : Dr.D Sundar Narayana Designation: Asst.professor 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 1
  • 2. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 2 AGENDA • ABSTRACT • OBJECTIVE • INTRODUCTION ABOUT VILLAGE • ACTIVITY LOG • SURVEY • SURVEY ANALYSIS WITH REPORT • SOCIETY RELEVANT PROBLEM IDENTIFICATION • NOVEL IDEA GENERATION • PROTOTYPE/DEVELOPMENT OF NEW SOLUTION • GEOTAGGED PHOTOS AND DETAIL&VIDEOLINK • AUTHENTICATED SIGNATURES PROOF AND DETAIL • PLAGIARISM REPORT
  • 3.  The aim is to focus on digital parental controlling by through an application, for Safeguarding Children’s Online Experiences.  Features and Functionalities: Content Filtering, App Management, Time Limits, Location Tracking.  Ensuring Privacy and Data Protection in Parental Control Solution and, The Challenges Faced by Parents in Managing Children’s Digital Activities.  Role of Parental Involvement and Communication in Digital Parenting Comparative Analysis of Popular Parental Control Solution, Future Developments: AI, Machine Learning, and Data Analytics 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 3
  • 4. Aim of the Project: The aim is to focus on digital parental controls through the website, for the safe search of children activities. Scope of the Project:  Content Filtering and Monitoring: Parental control tools are designed to filter and monitor content across the internet, social media, apps, and online games. The scope includes refining filtering algorithms to block age- inappropriate content effectively.  App and Game Management: Parental control solutions allow parents to manage and restrict access to specific apps and games, ensuring children spend time on educational or suitable content.  Safe Search and Web Browsing: Parental control solutions implement safe search settings to filter out explicit content from search results, ensuring a safer browsing experience. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 4
  • 5. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 5 Census Parameter Census Data Total Population 30,062 Total No of Houses 7,367 Total Literacy rate 67.77% Working Population 19,400 Koilakuntala is the village where we conducted our survey regarding a software-based keylogger and persistence function for parents to monitor the children's online activities daily on the Internet. The impact of insufficient cyber awareness in village is particularly profound on children,who are increasingly active online for both educational and recreational purposes. Without proper guidance and education on cyber safety, children are at a higher risk of encountering online predators, cyberbullying, and exposure to inappropriate content.
  • 6. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 6 Day/Date Brief Description of the activity Learning Outcome Day1 13/12/2023 Seeking permissions from the sarpanch to the survey Overview of the village Day2 14/17/2023 Discussions with parents & children about cyberattacks Understanding of cybersecurity concepts Day3 15/18/2023 Engaging converstions with parents to know about key logger. parents want to overcome their children from cyberattacks Day4 16/12/2023 Guided session on key logger Accessing technology to get aware on cyberattcks Day5 17/20/2023 Collaborative creation of Cyber Attacks Gain expert guidance for future Cyber Attacks
  • 7. • How concerned are you about online risks and threats affecting your child? • Which devices do you believe in need of parental control the most? • What additional resources or support would you like to have to enhance your understanding and usage of digital parental controls? • Do your child have smart phone, how long do your child uses phone? • Have you experienced any issues with false positives (blocking appropriate content) or false negatives (allowing inappropriate content) with the parental control solution? • What are your primary reasons for using digital parental control solutions? 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 7
  • 8. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 8
  • 9. • Awareness and Adoption: Determine the percentage of respondents who are aware of digital parental control solutions and the proportion who currently use such tools. • Challenges Faced: Analyze the challenges reported by parents while using digital parental control solutions. Identify common issues or pain points that may need improvement. • Comparative Analysis: If the survey includes questions about different parental control solutions, conduct a comparative analysis to identify which ones are most preferred and why. • Concerns and Priorities: Parents may have different concerns related to internet safety, such as cyberbullying, online predators, excessive screen time, exposure to inappropriate content, or privacy concerns. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 9
  • 11.  Cybersecurity Risks: Parental control solutions themselves may be vulnerable to cyber-attacks or hacking, posing risks to both the children's safety and their data.  Parental Education: Society needs to address the lack of awareness and knowledge about digital parental control among some parents. Providing comprehensive parental education on the use and limitations of such tools is essential.  Psychological Impact: Excessive monitoring and restrictions might lead to feelings of mistrust or frustration in children, affecting their emotional well- being and parent-child relationships.  Community feedback : It can provide valuable insights into user experiences and satisfaction levels. Here are some common themes of community feedback for digital parental control 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 11
  • 12. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 12 Keylogger applications designed by implementing the Exact String Matching algorithm can record all user activities related to the keyboard, and the results are stored automatically in a dedicated database that can only be accessed by the keylogger owner
  • 13. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 13
  • 14. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 14
  • 15. RECOMMENDATIONS:  Collaborative Approach  Continous Improvements & Postive Imapct  Use Parental Controls  Empowering cyberattacks Conclusion: A keylogger is a type of surveillance software or Hardware Devics that has the capability to record every keystroke, instant messages, e-mail, and any information you type at any time using your keyboard. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 15
  • 16. 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 16
  • 17. THANK YOU 12-04-2024 BATCH NO: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING 17