My Internship Report
My Internship Report
ON
Cyber Security
AT
BY
2020-21
CSE MVSR 1
CYBER SECURITY VIRTUAL INTERNSHIP
CERTIFICATE
CSE MVSR 2
CYBER SECURITY VIRTUAL INTERNSHIP
DECLARATION
This is to certify that the work reported in the present project entitled “Cyber Security Virtual
Internship” is a record of bonafide work done by us as part of an internship in the Cisco Networking
Academy. The report is based on the project work done entirely by us and not copied from any other
source.
M. A. Muqtadir
2451-18-733-141
ii
CSE MVSR 3
CYBER SECURITY VIRTUAL INTERNSHIP
ACKNOWLEDGEMENT
The internship opportunity I had with Cisco Networking Academy was a great chance for learning and
professional development.Additionally his continuous availability and guidance helped me the most to
finish this internship.Therefore, I consider myself as a very lucky individual as I was provided with an
opportunity to be a part of it. I am also grateful for having a chance to communicate and learn new things
with professionals who led me through this internship period. This section is a value of thanks and gratitude
towards all those persons who have implicitly or explicitly contributed in their own unique way towards
the completion of the project.
I am grateful to Kanajam Murali Krishna, the internal guide, Department of CSE, MVSR Engineering
College that has been a reservoir of immense support and encouragement throughout the process and has
given me confidence to believe in myself and complete the project.
iii
CSE MVSR 4
CYBER SECURITY VIRTUAL INTERNSHIP
VISION
● To create an industry ready workforce who will eventually become leaders in emerging technologies, EduSkills
& AICTE launched a 'Virtual Internship' program on Cybersecurity.
MISSION
● To make the learning process exciting, stimulating and interesting.
● To impart adequate fundamental knowledge and soft skills to students.
● To expose students to advanced computer technologies in order to excel in engineering practices by bringing
out the creativity in students.
● To develop economically feasible and socially acceptable software.
PO’s, PEO
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)
The Program Educational Objectives of undergraduate program in Computer Science &
Engineering are to prepare graduates who will:
v
CSE MVSR 6
CYBER SECURITY VIRTUAL INTERNSHIP
Course objectives
● To enhance practical and professional skills.
● To familiarize tools and techniques of systematic literature survey and documentation ● To
expose the students to industry practices and team work.
● To encourage students to work with innovative and entrepreneurial ideas
Course outcomes
Course Statement
code CS Student will be able to
403
CO1 Demonstrate the ability to synthesize and apply the knowledge and skills
acquired in the academic program to real-world problems.
CO3 Effectively plan a project and confidently perform all aspects of project
management.
CSE MVSR 7
Abstract
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. This
document describes the work that I have done as a part of my two months of virtual internship.This report
is demonstrating internship work-ow from March until April 2021. Keep in mind that this is just small
selected segments of what we have tackled during the internship period.Organizations must have a
framework for how they deal with both attempted and successful cyber attacks.It explains how you can
identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.
In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual
level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of
important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals,
and financial service companies. Securing these and other organizations is essential to keeping our society
functioning.
These cyberattacks are usually aimed at assessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.Implementing effective cybersecurity
measures is particularly challenging today because there are more devices than people, and attackers are
becoming more innovative.
Moreover, I have learnt the importance of cyber security, cyber insurance, cyber risk, coupled with the
obedient approach of computer and information security. And finally, we conclude by pointing the accent
to hence risk transfer, or in other words cyber insurance industry.
vii
CSE MVSR 8
List of Figures
viii
CSE MVSR 9
CYBER SECURITY VIRTUAL INTERNSHIP
INDEX
TABLE OF CONTENTS PAGE NOS.
Certificate on company letterhead i
Declaration ii
Acknowledgements iii
Vision & Mission, PO’s, PEO iv-v
Course Objectives & Outcomes vi
Abstract vii
List of Figures viii
CHAPTER I
INTRODUCTION
1.4 Contribution 5
CHAPTER II
METHODOLOGIES
2.2 Working 13
2.3 Summary 14
CHAPTER III
SYSTEM REQUIREMENTS SPECIFICATIONS
3.1 Software Requirements 15
3.2 Hardware Requirements 15
CHAPTER IV
Results and Discussion 16
Conclusion 18
References 19
CSE MVSR 10
CHAPTER I
INTRODUCTION
The present chapter describes the company overview, followed by the internship description and its
objectives.It also highlights the contribution during two months of internship period from August to
October.
1.1 Company Overview
Cisco Networking Academy is an IT skills and career building program for learning institutions and
individuals worldwide. Self-paced courses are designed to take at your own pace, at any point in your career
journey. For 20 years, Cisco Networking Academy has changed the lives of 10.9 million students in 180
countries by providing education, technical training, and career mentorship.Cisco Networking Academy is
a global IT and cybersecurity education program that provides best-in-class courses, tools, and resources to
help people from all backgrounds participate in the digital economy.
They lead with our strength in technology and we innovate with our instructors and education partners,
who share our commitment to powering an inclusive future for all. A powerful skills-to-jobs program,
Networking Academy helps students develop in-demand industry skills and connects them with peers,
mentors, and real jobs.
It provides-
● Licensed at no cost to nonprofit high schools, colleges and universities
CSE MVSR 1
CYBER SECURITY VIRTUAL INTERNSHIP
A series of case studies, simulations and interactive tools designed to help students develop critical
business and financial skills, and inspire them to be entrepreneurs. Intro to Collaboration:
Introduces enterprise collaboration and the underlying technologies in messaging, voice, and video.
Self-enroll courses:
Internet of Everything (IoE); Cybersecurity; Get Connected; Be Your Own Boss; Entrepreneurship;
Mobility; Packet Tracer; and more
Social media tools:
Networking Academy pages on Facebook, Twitter, LinkedIn, and our Instructor Community site connect
students and instructors around the world to encourage collaboration and learning outside the classroom.
In an effort to make skilling a national priority and transform India into a digital talent hub, Cisco,
AICTE, and NASSCOM FutureSkills PRIME launched the Virtual Internship Program
CSE MVSR 3
(VIP) to provide 20,000 online internship opportunities in cybersecurity through Cisco Networking
Academy.
Each year, approximately 1.2 million students look for a meaningful internship opportunity with one of
India’s 3,000 engineering institutions. But there aren’t enough internships for everyone. Furthermore, with
our world under pressure from the global pandemic and social unrest, this gap has widened.
I had completed Introduction to Cyber Security, Introduction to Packet Tracer, and Cyber Security
Essentials courses via contacting NetAcad instructors at their institution or via the Cyber Security
Internships pathway at FutureSkills PRIME.
Main outcomes of this internship:
● I gained cybersecurity knowledge and skills by completing Cisco Networking Academy courses
like Introduction of Cybersecurity and Cybersecurity Essentials.
● Next,I learned how to use the powerful network simulation tool – Packet Tracer. ● After
completing the courses, industry experts and Cisco leaders covered topics from enabling global skills
to careers in cybersecurity.
● Accredited Networking Academy instructors trained faculty members from participating
institutions to act as local mentors.
● With the guidance of the local mentor at the institution,I worked on a project to design a secure
network for their institution.
● Global implications of cyber threats and ways in which networks are vulnerable to attack. ● Impact
of cyber-attacks on industries and Cisco’s approach to threat detection and defense.
● Why cybersecurity is growing profession.
● Opportunities available for pursuing network security certifications.
● Describe the tactics,techniques and procedures used by cyber criminals. ● Describe the principles
of confidentiality,integrity and availability as they relate to data space states and cybersecurity
countermeasures.
CSE MVSR 4
CYBER SECURITY VIRTUAL INTERNSHIP
1.4 Contribution
Firstly, I learnt what cybersecurity is and its potential impact to you. Understand the most common threats,
attacks and vulnerabilities. Gain insights for how businesses protect their operations from attacks. Find the
latest job trends and why cybersecurity continues to grow.This course will answer today’s interconnected
world that makes everyone more susceptible to cyber-attacks.I learnt how to protect your personal privacy
online while gaining additional insight on the challenges companies, and governmental and educational
institutions face today.
Secondly,I understood security controls for networks, servers and applications.And also learned valuable
security principles and how to develop compliant policies.I worked on implementation of proper procedures
for data confidentiality and availability and developed critical thinking and problem-solving skills using
real equipment and Cisco Packet Tracer.
Nextly,I had hands-on experience on how to download and start learning valuable tips and best practices
for using our innovative, virtual simulation tool, Cisco Packet Tracer.The basic operations of the tool with
multiple hands-on activities helping you to visualize a network using everyday examples, including Internet
of Things (IoT).
We also had several sessions in the two months of the time where we could learn many things as mentioned
above and as it is a virtual internship I could contact them from wherever I am there,whatever time it is.
CSE MVSR 5
CYBER SECURITY VIRTUAL INTERNSHIP
CHAPTER II
METHODOLOGIES
2.1 Area of interest
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These
cyberattacks are usually aimed at assessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes.Implementing effective cybersecurity measures is
particularly challenging today because there are more devices than people, and attackers are becoming more
innovative.
Cybersecurity is not about eliminating potential threats, but about reducing risks and putting in measures
that will minimize the damage to your infrastructure, your data, and your operations.A successful
cybersecurity approach has multiple layers of protection spread across the computers, networks, programs,
or data that one intends to keep safe. In an organization, the people, processes, and technology must all
complement one another to create an effective defense from cyber attacks. A unified threat management
system can automate integrations across select Cisco Security products and accelerate key security
operations functions: detection, investigation, and remediation.
Importance of technology in cybersecurity:
Technology is essential to giving organizations and individuals the computer security tools needed to
protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like
computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these
entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email
security solutions.
Importance of cybersecurity:
In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual
level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of
important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals,
and financial service companies. Securing these and other organizations is essential to keeping our society
functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at
Talos, who investigate new and emerging threats and cyber attack strategies. They
CSE MVSR 6
CYBER SECURITY VIRTUAL INTERNSHIP
reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open
source tools. Their work makes the Internet safer for everyone.
Types of cybersecurity threats:
1. Phishing:
Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.
The aim is to steal sensitive data like credit card numbers and login information. It’s the most
common type of cyber attack. You can help protect yourself through education or a technology
solution that filters malicious emails.
Working:
Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The
message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is
coaxed into providing confidential information, often on a scam website. Sometimes malware is
also downloaded onto the target’s computer.
Dangers of the threat:
Sometimes attackers are satisfied with getting a victim’s credit card information or other personal
data for financial gain. Other times, phishing emails are sent to obtain employee login information
or other details for use in an advanced attack against a specific company. Cybercrime attacks such
as advanced persistent threats (APTs) and ransomware often start with phishing.
How can we protect against phishing attacks:
User education
One way to protect your organization from phishing is user education. Education should
involve all employees. High-level executives are often a target. Teach them how to recognize a
phishing email and what to do when they receive one. Simulation exercises are also key for assessing
how your employees react to a staged phishing attack.
Security technology
No single cybersecurity technology can prevent phishing attacks. Instead, organizations
must take a layered approach to reduce the number of attacks and lessen their impact when they do
occur. Network security technologies that should be implemented include email and web security,
malware protection, user behavior monitoring, and access control.
CSE MVSR 7
CYBER SECURITY VIRTUAL INTERNSHIP
CSE MVSR 8
CYBER SECURITY VIRTUAL INTERNSHIP
CSE MVSR 9
CYBER SECURITY VIRTUAL INTERNSHIP
CSE MVSR 10
4. Social engineering:
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information.
They can solicit a monetary payment or gain access to your confidential data. Social engineering
can be combined with any of the threats listed above to make you more likely to click on links,
download malware, or trust a malicious source.
Working:
CSE MVSR 11
CSE MVSR 12
CYBER SECURITY VIRTUAL INTERNSHIP
2.2 Working
I worked on Cisco Packet Tracer 8.0.0 during the two months of the internship where they provided services
in different languages such as Russian, German, Spanish and French to work on.Cisco Packet Tracer is
Cisco's simulation software.It acts as a playground for you to explore networking and the experience is very
close to what you see in computer networks.
Purpose:
The purpose of this is to become familiar with the Packet Tracer interface. Learn how to use existing
topologies and build your own.
CSE MVSR 13
CYBER SECURITY VIRTUAL INTERNSHIP
● The Enhanced Physical Mode transports you to a virtual lab where you can simulate cabling devices
on a rack. Refresh key skills such as device placement (Rack & Stack), on-device power switching,
device port-to-port cabling (including cable selection and management), troubleshooting, and more.
● It can be downloaded for free through a Netacad account.
● It enables its users to simulate the configuration relating to the Cisco routers and can be accessed
anywhere anytime.
● The Network Controller allows you a centralized dashboard to see the network's state, instantly
discover and diagnose issues, and push configuration changes to all managed devices at once,
whether you use its Web GUI or its APIs. You may also use real-world programmes on your
computer to access the Network Controller and run your own infrastructure automation scripts.
● It can be accessed through unlimited devices.
● Provides an interactive and self-paced environment.
2.3 Summary
To summarize, information is a critical part of any organization and investing in the right service provider
keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and
customized cyber security-driven business model includes disaster-recovery capabilities and secures data
and the underlying infrastructure of the organization, thus building a safe barrier for the information even
before it is attacked and saving the organization from a loss of billions of dollars that could result from the
security threat.
CSE MVSR 14
CYBER SECURITY VIRTUAL INTERNSHIP
Chapter 3
System Requirement specifications
3.1 Software requirements
Software -Cisco Packet Tracer 8.0.0
Operating System - Windows 7 or above
3.2 Hardware requirements
RAM - 4GB or above
HDD - Minimum Required
CSE MVSR 15
CYBER SECURITY VIRTUAL INTERNSHIP
Chapter 4
Results and Discussion
Here, in this section I will include an example done in the Cisco packet tracer, the process of simple
connection of two switches.
STEP-1:Place the 4 PCs on one side of the screen named as Host1,Host2,Host3,Host4 respectively and
other 4 PCs on the other side as PC1,PC2,PC3,PC4 respectively .Then,place a router named RTR1,RTR2
and a switch as SW1,SW2 on both sides.
STEP-2:Now connect the FastEthernet0 of PCs with the straight-through wire to
FastEthernet0/1,FastEthernet0/2,FastEthernet0/3,FastEthernet0/4 of the router. STEP-3:Now connect the
FastEthernet0/5 of the switch to the FastEthernet0/0 of the router.Similarly, do it on the other side.
STEP-4:Now connect the both switches using serial ports.
STEP-5:Now assign the IP address to PCs as 192.168.100.1,192.168.100.2,192.168.100.3,
192.168.100.4.Similarly give IP addresses to other 4 PCs as 172.16.200.1, 172.16.200.2,
172.16.200.3, 172.16.200.4.Then give IP address to routers and switches.
STEP-6:By default, switches and routers together cannot connect so I had configured them to make the
connection work.
CSE MVSR 16
CYBER SECURITY VIRTUAL INTERNSHIP
CSE MVSR 17
CYBER SECURITY VIRTUAL INTERNSHIP
Conclusion
Worldwide cyber insurance is arising, and at the same time insurance companies are starting to a greater
extent offering cyber insurance policies, in other words premiums. In the same fashion, we have
increasingly data breaches, followed by incidents affecting IT assets and having impact on the businesses.
Growing number of available vulnerabilities and exploits are contributing to business’s risk. Accordingly,
Cisco Networking Academy, have devoted the period of two months to initialize and set up a security
laboratory within main focus on providing services respectfully to cyber security.The hands-on exercises
on cisco packet tracer had helped me to build the topologies across computer networks in an easier and
understandable manner. It also helped me to gain knowledge over the real-world application and
connections that can be made.
In reality, cyberspace faces risks due to security attacks, as well as risks due to non-security related failures.
However, cyber insurance agencies would most likely insure risks only due to security attacks.It provides
an interactive and self-paced environment.
In this regard, I believe that the two months of internship period was dynamic and extremely interesting.
Facing different challenges everyday, and at the same time providing effective and beneficial services to
customers, without a significant degradation in performance.
CSE MVSR 18
CYBER SECURITY VIRTUAL INTERNSHIP
References
https://www.netacad.com/courses/packet-tracer/introduction-packet-tracer
https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
https://www.cisco.com/c/m/en_emear/campaigns/security/cybersecurity-essentials.html
https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
https://www.cisco.com/c/en_in/products/security/advanced-malware-protection/what-is-malware .html
https://www.cisco.com/c/en_in/solutions/security/ransomware-defense/what-is-ransomware.html
https://www.cisco.com/c/en_in/products/security/email-security/what-is-phishing.html
https://www.cisco.com/c/en/us/products/security/what-is-social-engineering.html
CSE MVSR 19