Meetreport

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Different Types of Modus Operandi

Report submitted to
RASHTRIYA RAKSHA UNIVERSITY
An Institution of National Importance

for the partial fulfilment for the award of the degree of

Bachelor of Technology in
Computer Science and
Engineering with specialization in
Cyber Security
Submitted by

Vaishnav Meet Dhavalbhai (200031101611060)

Under the Guidance of

Ms. Stefina Macwan


Assistant Professor, SITAICS
School Of Information Technology, Artificial Intelligence and Cyber SecurityLavad,
Dehgam, Gandhinagar-382305, Gujarat,
India

School of Information Technology Artificial Intelligence and Cyber Security


RASHTRIYA RAKSHA UNIVERSITY, Lavad, Dehgam,
Gandhinagar-382305, Gujarat, India May 2024
Different Types of Modus Operandi

Report submitted to
RASHTRIYA RAKSHA UNIVERSITY
(An Institution of National Importance)

for the partial fulfilment for the award of the degree of

Bachelor of Technology in
Computer Science and
Engineering with specialization in
Cyber Security
Submitted by

Vaishnav Meet Dhavalbhai (200031101611060)

Under the Guidance of

Ms. Stefina Macwan


Assistant Professor, SITAICS
School Of Information Technology, Artificial Intelligence and Cyber Security Lavad,
Dehgam, Gandhinagar-382305, Gujarat,
India

NAME OF THE SCHOOL


RASHTRIYA RAKSHA UNIVERSITY, Lavad, Dehgam,
Gandhinagar-382305, Gujarat, India May 2024
Annexure-II

DECLARATION

We hereby declare that the Internship report submitted along with the Internship entitled Different

Types of Modus Operandi submitted in partial fulfillment for the degree of Bachelor of Technology

in Computer Science Engineering Specialization in Cyber Security to Rashtriya Raksha University is a

bonafide record of original project work carried out by me at State Cyber Crime Cell, CID Crime

Gandhinagar under the supervision of PSI Nikhil Prajapat and that no part of this report has been

directly copied from any students’ reports or taken from any other source, without providing due

reference.

Vaishnav Meet Dhavalbhai


(Name & Signature of the Candidate)

Date:
Annexure-III

CERTIFICATE

This is to certify that the Report titled “Different Types of Modus Operandi “was carried out by

Mr. Vaishnav Meet Dhavalbhai (200031101611060) studying at (SITAICS) for partial fulfillment
of “Bachelor of Technology in Computer Science & Engineering with Specializing in Cyber Security”
degree to be awarded by Rashtriya Raksha University. This research work has been carried out
under my guidance and supervision and it is up to my satisfaction. The Report is fit to be considered
for evaluation for the degree of Computer Science and Engineering Specialization in Cyber Security.

Date:
Place:

Signature and Name of Supervisor Signature and Name of School Director

Round Seal of RRU

Dedication Page, if any


Annexure- IV

ACKNOWLEDGEMENTS

I would like to express my sincere gratitude to all those who have supported me
throughout my internship journey.

First and foremost, I am deeply grateful to my dissertation advisor, Ms. Stefina Macwan for
their invaluable guidance, insightful feedback, and unwavering support throughout this
process. Their expertise and encouragement were instrumental in shaping my research and
keeping me motivated.

I am also grateful to my dissertation committee mentor for their time and insightful
suggestions during the internship period. Their valuable questions and perspectives
helped me refine my work and ensure its quality.

I would like to extend my thanks to my colleagues for their collaboration on this


project. Their expertise and contributions were greatly appreciated.

Thank you to all for your support and encouragement, without which this internship
would not have been possible.
Annexure-V

Table of Contents
Declaration ............................................................................................................ Annexure-II
Certificate .............................................................................................................. Annexure-III
Acknowledgements ................................................................................................. Annexure-IV
Table of Contents.................................................................................................... Annexure-V
CHAPTER 1 ............................................................................................................ Page no.
Overview of the Company
• Overview of different plant/unit/department/shop of the organization and Layout of the
production/process being carried out in company
• Prepare schematic layout which shows the sequence of operation for manufacturing of end product.
• Explain in details about each stage of production.

CHAPTER 2 ........................................................................................................... Page no.


Introduction to Project / Internship and Project / Internship Management
• Purpose
• Objective
• Scope (what it can do and can’t do)
• Technology and Literature Review
• Project / Internship Planning

CHAPTER 3 ......................................................................................................... Page no.


System Analysis
• Study of Current System
• Problem and Weaknesses of Current System
• Requirements of New System
• System Feasibility
• Activity / Process in New System / Proposed System
• Features of New System / Proposed System
• List Main Modules / Components / Processes / Techniques of New System / Proposed System
• Selection of Hardware / Software / Algorithms / Methodology / Techniques / Approaches and
Justification

CHAPTER 4 ........................................................................................................... Page no.


System Design
• System Design & Methodology
• Database Design / Data Structure Design / Circuit Design / Process Design / Structure Design
• Input / Output and Interface Design (If applicable)
o State Transition Diagram (optional)
o Access Control / Mechanism / Security (If applicable)

CHAPTER 5 ........................................................................................................... Page no.


Implementation
• Implementation Platform / Environment
• Process / Program / Technology / Modules Specification(s)
• Finding / Results / Outcomes
• Result Analysis / Comparison / Deliberations
CHAPTER 6 ........................................................................................................... Page no.
Testing
• Testing Plan / Strategy
• Test Results and Analysis
• Test Cases (test ID, test condition, expected output, actual output, remark)

CHAPTER 7 ........................................................................................................... Page no.


Conclusion and Discussion
• Overall Analysis of Internship / Project Viabilities
• Problem Encountered and Possible Solutions
• Summary of Internship / Project work
• Limitation and Future Enhancement

*This is suggested Project Guidelines and the project mentors can make appropriate
modifications as per their requirements.”
CHAPTER 1

Overview of the Company

The Cyber Crime Investigation Cell (CID) in Gandhinagar, Gujarat, is a specialized unit dedicated to handling
cybercrimes in the region. Here's an overview:

1. Jurisdictio: The CID Cyber Cell in Gandhinagar typically has jurisdiction over cybercrimes that occur within
the state of Gujarat. They investigate a wide range of cyber offenses, including hacking, online fraud,
cyberbullying, identity theft, and more.

2. Responsibilities: The primary responsibility of the CID Cyber Cell is to investigate and solve cybercrimes.
This involves gathering digital evidence, analyzing data, tracking down perpetrators, and collaborating with
other law enforcement agencies, both within the state and at the national level.

3. Infrastructure and Expertise: The cell is equipped with advanced technology and skilled personnel trained in
cyber forensics, computer science, and law enforcement procedures. They use specialized software tools and
techniques to trace digital footprints, uncover hidden networks, and secure digital evidence in a manner
admissible in court.

4. Collaboration: The CID Cyber Cell often collaborates with other law enforcement agencies, such as the
Gujarat Police, the Cyber Crime Cell, and the Central Bureau of Investigation (CBI), to tackle complex
cybercrimes that may transcend geographical boundaries.

5.Public Awareness and Education: In addition to enforcement, the CID Cyber Cell may engage in public
awareness campaigns and educational initiatives to educate citizens about cyber threats, safe online practices,
and how to report cybercrimes.

6.Legal Framework: The CID Cyber Cell operates within the legal framework established by Indian laws,
including the Information Technology Act, 2000, and the Indian Penal Code. They work closely with
prosecutors and legal experts to ensure that their investigations adhere to legal standards and that perpetrators
are brought to justice.

Overall, the CID Cyber Cell in Gandhinagar plays a crucial role in safeguarding digital infrastructure,
combating cybercrimes, and promoting cybersecurity in the state of Gujarat.
Following are the list of departments under CID
1. Admin Unit – deals with all kind of paper works.
2. 1930 helpline Unit – deals with financial fraud, basic info of customer then transfer case to
Bank Unit.
3. Bank Unit – deals with report and freeze the account.
4. ABU Unit – calls related to harassments are transferred to the ABU Unit.
5. Prevention Unit – work before the fraud and scam is enacted, basically it deals with
preventing the suspected task before it comes to act.
6. Forensics Unit – deals with data retrieve all over Gujarat.
7. Awareness Unit – spread awareness about cyber bulling.
8. Refund Unit – all the victims can get there lost and cased money back.
9. Tipline Unit – deals with under age nude video calls.
10. Investigation Unit – all the case after paper work come in this department for the purpose
of justice and thus the investigation is started.
11. Intelligent Unit – further when investigation team require help this Unit help according to
the request of requirements.

You might also like