0% found this document useful (0 votes)
11 views

B27 CHAPTER 1

final year project

Uploaded by

Rubini Mai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

B27 CHAPTER 1

final year project

Uploaded by

Rubini Mai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CHAPTER 1

INTRODUCTION
Cyberbullying Detection based on SMSDA INTRODUCTION

INTRODUCTION

1.1 Brief Introduction


Computer security (also known as cyber security or IT Security) is information
security as applied to computers and networks. The field covers all the processes and
mechanisms by which computer-based equipment, information and services are protected
from unintended or unauthorized access, change or destruction. Computer security also
includes protection from unplanned events and natural disasters. Otherwise, in the
computer industry, the term security -- or the phrase computer security -- refers to
techniques for ensuring that data stored in a computer cannot be read or compromised by
any individuals without authorization. Most computer security measures involve data
encryption and passwords. Data encryption is the translation of data into a form that is
unintelligible without a deciphering mechanism. A password is a secret word or phrase that
gives a user access to a particular program or system.

Working conditions and basic needs in the secure computing:

If you don't take basic steps to protect your work computer, you put it and all the
information on it at risk. You can potentially compromise the operation of other computers
on your organization's network, or even the functioning of the network as a whole.

1. Physical security:
Technical measures like login passwords, anti-virus are essential. However, a secure
physical space is the first and more important line of defense. Is the place you keep your
workplace computer secure enough to prevent theft or access to it while you are
away? While the Security Department provides coverage across the Medical center, it only
takes seconds to steal a computer, particularly a portable device like a laptop or a PDA. A
computer should be secured like any other valuable possession when you are not present.
Human threats are not the only concern. Computers can be compromised by environmental
mishaps (e.g., water, coffee) or physical trauma. Make sure the physical location
of your computer takes account of those risks as well.

BMSIT&M, CSE 2 2017-18


Cyberbullying Detection based on SMSDA INTRODUCTION

2. Access passwords:

The University's networks and shared information systems are protected in part by login
credentials (user-IDs and passwords). Access passwords are also an essential protection
for personal computers in most circumstances. Offices are usually open and shared spaces,
so physical access to computers cannot be completely controlled. To protect your
computer, you should consider setting passwords for particularly sensitive applications
resident on the computer (e.g., data analysis software), if the software provides that
capability.

3. Prying eye protection:

Because we deal with all facets of clinical, research, educational and administrative data
here on the medical campus, it is important to do everything possible to minimize exposure
of data to unauthorized individuals.

4. Anti-virus software:

Up-to-date, properly configured anti-virus software is essential. While we have server-


side anti-virus software on our network computers, you still need it on the client side (your
computer).

5. Firewalls:

Anti-virus products inspect files on your computer and in email. Firewall software and
hardware monitor communications between your computer and the outside world. That is
essential for any networked computer.

6. Software updates:

It is critical to keep software up to date, especially the operating system, anti-virus and anti-
spyware, email and browser software. The newest versions will contain fixes for
discovered vulnerabilities. Almost all anti-virus have automatic update features.Keeping
the "signatures" (digital patterns) of malicious software detectors up-to-date is essential for
these products to be effective.

BMSIT&M, CSE 3 2017-18


Cyberbullying Detection based on SMSDA INTRODUCTION

7. Keep secure backups:

Even if you take all these security steps, bad things can still happen. Be prepared for the
worst by making backup copies of critical data, and keeping those backup copies in a
separate, secure location. For example, use supplemental hard drives, CDs/DVDs, or flash
drives to store critical, hard-to-replace data.

8. Report problems:

If you believe that your computer or any data on it has been compromised, you should make
the information security incident report. That is required by University policy for all data
on our systems, and legally required for health, education, financial and any other kind of
record containing identifiable personal information.

Benefits of secure computing:

• Protect yourself - Civil liability


You may be held legally liable to compensate a third party should they experience
financial damage or distress as a result of their personal data being stolen from you or
leaked by you.
• Protect your credibility - Compliance
You may require compliancy with the Data Protection Act, the FSA, SOX or other
regulatory standards. Each of these bodies stipulates that certain measures be taken to
protect the data on your network.
• Protect your reputation – Spam
A common use for infected systems is to join them to a botnet (a collection of infected
machines which takes orders from a command server) and use them to send out spam.
This spam can be traced back to you, your server could be blacklisted and you could be
unable to send email.
• Protect your income - Competitive advantage
There are a number of “hackers-for-hire” advertising their services on the internet
selling their skills in breaking into company’s servers to steal client databases,
proprietary software, and merger and acquisition information, personnel detail set.

BMSIT&M, CSE 4 2017-18


Cyberbullying Detection based on SMSDA INTRODUCTION

• Protect your business – Blackmail


A seldom-reported source of income for “hackers” is to break into your server, change
all your passwords and lock you out of it. The password is then sold back to you. Note:
the “hackers” may implant a backdoor program on your server so that they can repeat
the exercise at will.
• Protect your investment - Free storage
The server’s hard drive space is used to house the hacker's video clips, music
collections, and pirated software. Your server or computer then becomes continuously
slow and your internet connection speeds deteriorate due to the number of people
connecting to your server in order to download the offered wares.

1.2 Problem Definition

Machine learning techniques make automatic detection of bullying messages in social


media possible, and this could help to construct a healthy and safe social media
environment. In this meaningful research area, one critical issue is robust and
discriminative numerical representation learning of text messages. When someone tries to
post any status update containing bullying words or bullying words, it is not safe for all
users of social media. It may affect people of different age groups in different manner. So
hence we try to block all the posts containing the bullying words.

1.3 Goals

➢ To construct a healthy and safe social media environment.

➢ To successfully block all the posts containing the bullying words.

➢ To notify the person on whose wall, the post was blocked with accept and reject
options.

1.4 Motivation

Nowadays most of them on social media are using bullying words. And social media is
used by people of all age groups nowadays. So these kind of posts may have an impact on
them mentally. To avoid this kind of problems happening and to safeguard the majority of
the users from being exposed to such words, we got an idea of creating a healthy social
media environment free from posts containing bullying words. We have created an online
BMSIT&M, CSE 5 2017-18
Cyberbullying Detection based on SMSDA INTRODUCTION

social media which is an imitation of the social media already present and tried to block
posts containing bullying words.

1.5 Project Scope

➢ People of all ages can use the social media without being exposed to any kind of
bullying posts.

➢ Parents can be sure that their children are safe from being bullied over social media.

➢ Admin has the permissions to see the blocked users and their posts and hence can
decide what to do about the user posting more number of posts containing bullying
words.

1.6 Methodology

We have used SMSDA to detect Cyberbullying. In this technique, we search for any
bullying word, misspelled word or any word with Meta characters. If directly any bullying
word is found, it is blocked. In case of any misspelled word or word with meta character
such as #,$,* etc the word will be rebuilt and then checked with our bag of words and then
find the correlation of the constructed word with the remaining words in the sentence. If
the rebuilt word matches any word in our bag of words, then that particular post is blocked
and that appropriate user is notified about the post.

BMSIT&M, CSE 6 2017-18

You might also like