100% found this document useful (1 vote)
2K views29 pages

My Internship Report

The document summarizes an internship report on a virtual cyber security internship from March to April 2021. It includes sections on the certificate, declaration, acknowledgements, vision and mission statements of the internship program, program outcomes, course objectives and outcomes, and an abstract. The internship was conducted remotely with Cisco Networking Academy and the report describes some of the work done, which involved learning tools and techniques for cyber security to protect systems, networks, and programs from digital attacks.

Uploaded by

Afaf Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views29 pages

My Internship Report

The document summarizes an internship report on a virtual cyber security internship from March to April 2021. It includes sections on the certificate, declaration, acknowledgements, vision and mission statements of the internship program, program outcomes, course objectives and outcomes, and an abstract. The internship was conducted remotely with Cisco Networking Academy and the report describes some of the work done, which involved learning tools and techniques for cyber security to protect systems, networks, and programs from digital attacks.

Uploaded by

Afaf Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

CYBER SECURITY VIRTUAL INTERNSHIP

Report of the Summer Internship project

ON
Cyber Security

AT

Company Name: Cisco Networking Academy


Location: Remote

Duration: 8th March 2021 – 8th April 2021

BY

Mr. M. A. Muqtadir (2451-18-733-141)

Department of Computer Science and Engineering


Maturi Venkata Subba Rao ENGINEERING COLLEGE
(Affiliated to Osmania University & Recognized by AICTE)
Nadergul, Saroor Nagar Mandal, Hyderabad – 501 510

2020-21

CSE MVSR 1
CYBER SECURITY VIRTUAL INTERNSHIP

CERTIFICATE

CSE MVSR 2
CYBER SECURITY VIRTUAL INTERNSHIP

DECLARATION

This is to certify that the work reported in the present project entitled “Cyber Security Virtual
Internship” is a record of bonafide work done by us as part of an internship in the Cisco Networking
Academy. The report is based on the project work done entirely by us and not copied from any other
source.

M. A. Muqtadir
2451-18-733-141

ii

CSE MVSR 3
CYBER SECURITY VIRTUAL INTERNSHIP

ACKNOWLEDGEMENT

The internship opportunity I had with Cisco Networking Academy was a great chance for learning and
professional development.Additionally his continuous availability and guidance helped me the most to
finish this internship.Therefore, I consider myself as a very lucky individual as I was provided with an
opportunity to be a part of it. I am also grateful for having a chance to communicate and learn new things
with professionals who led me through this internship period. This section is a value of thanks and gratitude
towards all those persons who have implicitly or explicitly contributed in their own unique way towards
the completion of the project.

I express my sincere gratitude to Assistant Prof. Vikram Narayandas, Department of CSE,MVSR


Engineering College for his valuable guidance, suggestion and consistent encouragement during the course
of my virtual internship and timely assistance for completion of the project even under such difficult covid
situations.

I am grateful to Kanajam Murali Krishna, the internal guide, Department of CSE, MVSR Engineering
College that has been a reservoir of immense support and encouragement throughout the process and has
given me confidence to believe in myself and complete the project.

iii

CSE MVSR 4
CYBER SECURITY VIRTUAL INTERNSHIP

VISION
● To create an industry ready workforce who will eventually become leaders in emerging technologies, EduSkills
& AICTE launched a 'Virtual Internship' program on Cybersecurity.

MISSION
● To make the learning process exciting, stimulating and interesting.
● To impart adequate fundamental knowledge and soft skills to students.
● To expose students to advanced computer technologies in order to excel in engineering practices by bringing
out the creativity in students.
● To develop economically feasible and socially acceptable software.
PO’s, PEO
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)
The Program Educational Objectives of undergraduate program in Computer Science &
Engineering are to prepare graduates who will:

1. Achieve recognition through demonstration of technical competence for successful execution


of software projects to meet customer business objectives..
2. Practice lifelong learning by pursuing professional certifications ,higher education or research
in the emerging areas of information processing and intelligent systems at global level. 3.
Contribute to society by understanding the impact of computing using a multi disciplinary and
ethical approach
(A) PROGRAM OUTCOMES(POs)
1. Engineering Knowledge: Apply the knowledge of mathematics, science, Engineering
fundamentals, and an engineering specialization for the solution of complex
engineering problems.
2. Problem analysis: Identify, formulate, research literature and analyze complex
engineering problems reaching a substantiated conclusion using first principles of
mathematics, natural sciences and engineering sciences.
3. Design/Development of solutions: Design solutions for complex engineering problems
and design system components or processes that meet the specified needs with
appropriate consideration for public health and safety and cultural, societal, and
environmental considerations.
4. Conduct investigations of complex problems:Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis
of the information to provide valid conclusions.
5. Modern tool usage: Create, select and apply appropriate techniques, resources, and modern
engineering and IT tools, including prediction and modeling of complex engineering
activities, with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal, and cultural issues and the consequent responsibilities relevant
to the professional engineering practice.
7. Environment and Sustainability: Understand the impact of the professional engineering
solution in societal and environmental contexts and demonstrate the knowledge of and need
for sustainable development.
8. Ethics: Apply ethical principles and commit to a professional's ethics and responsibilities
and norms of the engineering practice.
9. Individuals and teamwork: Function effectively as an individual and as a member or leader
in diverse teams and in multidisciplinary settings.
iv
CSE MVSR 5
CYBER SECURITY VIRTUAL INTERNSHIP

10. Communication: Communicate effectively on complex engineering activities with the


engineering community and with the society at large, such as being able to comprehend
and write effective reports and design documentation, make effective presentations and
give and receive clear instructions.
11. Project Management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long learning: Recognize the need for and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.

v
CSE MVSR 6
CYBER SECURITY VIRTUAL INTERNSHIP

Course Objectives & Outcomes

Course objectives
● To enhance practical and professional skills.
● To familiarize tools and techniques of systematic literature survey and documentation ● To
expose the students to industry practices and team work.
● To encourage students to work with innovative and entrepreneurial ideas

Course outcomes
Course Statement
code CS Student will be able to
403

CO1 Demonstrate the ability to synthesize and apply the knowledge and skills
acquired in the academic program to real-world problems.

CO2 Evaluate different solutions based on economic and technical feasibility.

CO3 Effectively plan a project and confidently perform all aspects of project
management.

CO4 Demonstrate effective written and oral communication skills.

CO5 Demonstrate skills necessary for working in a team.


vi

CSE MVSR 7

CYBER SECURITY VIRTUAL INTERNSHIP

Abstract

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. This
document describes the work that I have done as a part of my two months of virtual internship.This report
is demonstrating internship work-ow from March until April 2021. Keep in mind that this is just small
selected segments of what we have tackled during the internship period.Organizations must have a
framework for how they deal with both attempted and successful cyber attacks.It explains how you can
identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.
In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual
level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of
important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals,
and financial service companies. Securing these and other organizations is essential to keeping our society
functioning.
These cyberattacks are usually aimed at assessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.Implementing effective cybersecurity
measures is particularly challenging today because there are more devices than people, and attackers are
becoming more innovative.
Moreover, I have learnt the importance of cyber security, cyber insurance, cyber risk, coupled with the
obedient approach of computer and information security. And finally, we conclude by pointing the accent
to hence risk transfer, or in other words cyber insurance industry.

vii
CSE MVSR 8

CYBER SECURITY VIRTUAL INTERNSHIP

List of Figures

Table no Name of table Page Nos

1.1 Cisco Networking Academy Logo 3


2.1 Phishing 8
2.2 Ransomware 9
2.3 Malware 11
2.4 Social Engineering 12
2.5 Cisco Packet Tracer 13
4.1 Connection of two switches 17

viii

CSE MVSR 9
CYBER SECURITY VIRTUAL INTERNSHIP

INDEX
TABLE OF CONTENTS PAGE NOS.
Certificate on company letterhead i
Declaration ii
Acknowledgements iii
Vision & Mission, PO’s, PEO iv-v
Course Objectives & Outcomes vi
Abstract vii
List of Figures viii

CHAPTER I
INTRODUCTION

1.1 Company Overview 1

1.2 Internship Description 3

1.3 Internship Objectives 4

1.4 Contribution 5

CHAPTER II
METHODOLOGIES

2.1 Area of interest 6

2.2 Working 13

2.3 Summary 14

CHAPTER III
SYSTEM REQUIREMENTS SPECIFICATIONS
3.1 Software Requirements 15
3.2 Hardware Requirements 15
CHAPTER IV
Results and Discussion 16
Conclusion 18
References 19
CSE MVSR 10

CYBER SECURITY VIRTUAL INTERNSHIP

CHAPTER I
INTRODUCTION
The present chapter describes the company overview, followed by the internship description and its
objectives.It also highlights the contribution during two months of internship period from August to
October.
1.1 Company Overview
Cisco Networking Academy is an IT skills and career building program for learning institutions and
individuals worldwide. Self-paced courses are designed to take at your own pace, at any point in your career
journey. For 20 years, Cisco Networking Academy has changed the lives of 10.9 million students in 180
countries by providing education, technical training, and career mentorship.Cisco Networking Academy is
a global IT and cybersecurity education program that provides best-in-class courses, tools, and resources to
help people from all backgrounds participate in the digital economy.
They lead with our strength in technology and we innovate with our instructors and education partners,
who share our commitment to powering an inclusive future for all. A powerful skills-to-jobs program,
Networking Academy helps students develop in-demand industry skills and connects them with peers,
mentors, and real jobs.
It provides-
● Licensed at no cost to nonprofit high schools, colleges and universities

● Hands-on labs, simulations and games


● Real-world projects to develop relevant job skills
● Adaptable for diverse programs and learning styles
● Instructor customization of quizzes, activities and games
● Education standards alignment with STEM initiatives, Common Core Standards, Next Generation
Science, and more
● Innovative online assessments
● Instructor training and professional development
● Lab equipment discounts

CSE MVSR 1
CYBER SECURITY VIRTUAL INTERNSHIP

Leverage Cisco expertise for social impact:


Cisco is the acknowledged world leader in networking technology. Its comprehensive Networking
Academy education program brings research and outcome based courses to schools, colleges, universities,
and nonprofits worldwide.
Courses range from computer basics to advanced networking and prepare students for globally-
recognized certifications. Cisco develops the content and provides 24/7 teaching and learning resources.
Schools and colleges provide instructors, classroom space, and lab facilities.
Networking Academy is Cisco’s largest corporate social responsibility effort in education. Since 1997,
more than 4 million students have taken academy courses, covering a wide spectrum of age, background,
and career goals.
Courses it offers:
IT Essentials:
PC Hardware and Software Computer fundamentals and intro to advanced concepts. Aligns with
CompTIAA+ certification.
CCNA Routing and Switching:
Networking theory, practical experience, soft-skills development, and career exploration. Aligns with
CCENT and CCNA certification.
CCNA:
Security Installation and troubleshooting network integrity, confidentiality, and availability of data and
devices. Aligns with CCNA Security certification.
CCNP:
Advanced configuration, installation and trouble-shooting of enterprise networks. Management of
wireless, security and voice applications. Aligns with CCNP certification. Linux courses Basic and
intermediate (developed by Networking Academy partner NDG) Cisco Packet Tracer:
A powerful visualization/simulation tool for students and instructors to design, build, troubleshoot and
experiment with virtual networks. Used to explore technical concepts and networking system designs in a
safe, virtual environment.
Cisco Passport21 to Entrepreneurship:
CSE MVSR 2

CYBER SECURITY VIRTUAL INTERNSHIP

A series of case studies, simulations and interactive tools designed to help students develop critical
business and financial skills, and inspire them to be entrepreneurs. Intro to Collaboration:
Introduces enterprise collaboration and the underlying technologies in messaging, voice, and video.
Self-enroll courses:
Internet of Everything (IoE); Cybersecurity; Get Connected; Be Your Own Boss; Entrepreneurship;
Mobility; Packet Tracer; and more
Social media tools:
Networking Academy pages on Facebook, Twitter, LinkedIn, and our Instructor Community site connect
students and instructors around the world to encourage collaboration and learning outside the classroom.

Fig 1.1 Cisco Networking Academy Logo


1.2 Internship Description
In today’s world, safety of people and things will be rooted in digital trust, with cybersecurity and data
privacy at the core. Currently, the demand for cybersecurity talent is outpacing supply, and this is a problem
in multiple new areas of technology where the landscape is changing swiftly. According to NASSCOM,
demand for cybersecurity talent is expected to increase fivefold over the next four years in India. We will
need 1 million people to join the cybersecurity domain; with the changing spectrum of industries, we need
nothing less than a skilling revolution to fulfill India’s digital talent need.

In an effort to make skilling a national priority and transform India into a digital talent hub, Cisco,
AICTE, and NASSCOM FutureSkills PRIME launched the Virtual Internship Program
CSE MVSR 3

CYBER SECURITY VIRTUAL INTERNSHIP

(VIP) to provide 20,000 online internship opportunities in cybersecurity through Cisco Networking
Academy.

Each year, approximately 1.2 million students look for a meaningful internship opportunity with one of
India’s 3,000 engineering institutions. But there aren’t enough internships for everyone. Furthermore, with
our world under pressure from the global pandemic and social unrest, this gap has widened.
I had completed Introduction to Cyber Security, Introduction to Packet Tracer, and Cyber Security
Essentials courses via contacting NetAcad instructors at their institution or via the Cyber Security
Internships pathway at FutureSkills PRIME.
Main outcomes of this internship:
● I gained cybersecurity knowledge and skills by completing Cisco Networking Academy courses
like Introduction of Cybersecurity and Cybersecurity Essentials.
● Next,I learned how to use the powerful network simulation tool – Packet Tracer. ● After
completing the courses, industry experts and Cisco leaders covered topics from enabling global skills
to careers in cybersecurity.
● Accredited Networking Academy instructors trained faculty members from participating
institutions to act as local mentors.
● With the guidance of the local mentor at the institution,I worked on a project to design a secure
network for their institution.

1.3 Internship Objectives

● Global implications of cyber threats and ways in which networks are vulnerable to attack. ● Impact
of cyber-attacks on industries and Cisco’s approach to threat detection and defense.
● Why cybersecurity is growing profession.
● Opportunities available for pursuing network security certifications.
● Describe the tactics,techniques and procedures used by cyber criminals. ● Describe the principles
of confidentiality,integrity and availability as they relate to data space states and cybersecurity
countermeasures.

CSE MVSR 4
CYBER SECURITY VIRTUAL INTERNSHIP

● Describe technologies,products and procedures used to protect confidentiality,ensure integrity and


provide high availability.
● Explain how cybersecurity professionals use technologies,processes and procedures to define all
components of the network.
● Explain the purpose of laws related to cybersecurity.
● How to work on Cisco packet tracer.

1.4 Contribution
Firstly, I learnt what cybersecurity is and its potential impact to you. Understand the most common threats,
attacks and vulnerabilities. Gain insights for how businesses protect their operations from attacks. Find the
latest job trends and why cybersecurity continues to grow.This course will answer today’s interconnected
world that makes everyone more susceptible to cyber-attacks.I learnt how to protect your personal privacy
online while gaining additional insight on the challenges companies, and governmental and educational
institutions face today.
Secondly,I understood security controls for networks, servers and applications.And also learned valuable
security principles and how to develop compliant policies.I worked on implementation of proper procedures
for data confidentiality and availability and developed critical thinking and problem-solving skills using
real equipment and Cisco Packet Tracer.
Nextly,I had hands-on experience on how to download and start learning valuable tips and best practices
for using our innovative, virtual simulation tool, Cisco Packet Tracer.The basic operations of the tool with
multiple hands-on activities helping you to visualize a network using everyday examples, including Internet
of Things (IoT).
We also had several sessions in the two months of the time where we could learn many things as mentioned
above and as it is a virtual internship I could contact them from wherever I am there,whatever time it is.

CSE MVSR 5
CYBER SECURITY VIRTUAL INTERNSHIP

CHAPTER II
METHODOLOGIES
2.1 Area of interest
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These
cyberattacks are usually aimed at assessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes.Implementing effective cybersecurity measures is
particularly challenging today because there are more devices than people, and attackers are becoming more
innovative.
Cybersecurity is not about eliminating potential threats, but about reducing risks and putting in measures
that will minimize the damage to your infrastructure, your data, and your operations.A successful
cybersecurity approach has multiple layers of protection spread across the computers, networks, programs,
or data that one intends to keep safe. In an organization, the people, processes, and technology must all
complement one another to create an effective defense from cyber attacks. A unified threat management
system can automate integrations across select Cisco Security products and accelerate key security
operations functions: detection, investigation, and remediation.
Importance of technology in cybersecurity:
Technology is essential to giving organizations and individuals the computer security tools needed to
protect themselves from cyber attacks. Three main entities must be protected: endpoint devices like
computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these
entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email
security solutions.
Importance of cybersecurity:

In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual
level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of
important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals,
and financial service companies. Securing these and other organizations is essential to keeping our society
functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at
Talos, who investigate new and emerging threats and cyber attack strategies. They

CSE MVSR 6
CYBER SECURITY VIRTUAL INTERNSHIP

reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open
source tools. Their work makes the Internet safer for everyone.
Types of cybersecurity threats:
1. Phishing:
Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.
The aim is to steal sensitive data like credit card numbers and login information. It’s the most
common type of cyber attack. You can help protect yourself through education or a technology
solution that filters malicious emails.
Working:
Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The
message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is
coaxed into providing confidential information, often on a scam website. Sometimes malware is
also downloaded onto the target’s computer.
Dangers of the threat:
Sometimes attackers are satisfied with getting a victim’s credit card information or other personal
data for financial gain. Other times, phishing emails are sent to obtain employee login information
or other details for use in an advanced attack against a specific company. Cybercrime attacks such
as advanced persistent threats (APTs) and ransomware often start with phishing.
How can we protect against phishing attacks:
User education
One way to protect your organization from phishing is user education. Education should
involve all employees. High-level executives are often a target. Teach them how to recognize a
phishing email and what to do when they receive one. Simulation exercises are also key for assessing
how your employees react to a staged phishing attack.
Security technology
No single cybersecurity technology can prevent phishing attacks. Instead, organizations
must take a layered approach to reduce the number of attacks and lessen their impact when they do
occur. Network security technologies that should be implemented include email and web security,
malware protection, user behavior monitoring, and access control.

CSE MVSR 7
CYBER SECURITY VIRTUAL INTERNSHIP

Fig 2.1 Phishing


2. Ransomware:
Ransomware is a type of malicious software. It is designed to extort money by blocking access to
files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the
files will be recovered or the system restored.Ransomware is a type of malicious software, also
known as malware. It encrypts a victim’s data until the attacker is paid a predetermined ransom.
Typically, the attacker demands payment in a form of cryptocurrency such as bitcoin. Only then
will the attacker send a decryption key to release the victim’s data.
A number of ransomware variants have appeared in recent years, which we’ll describe in
greater detail below. We will also explain how you can protect your system against future attacks.
Working:
Ransomware is typically distributed through a few main avenues. These include email phishing,
malvertising (malicious advertising), and exploit kits. After it is distributed, the ransomware
encrypts selected files and notifies the victim of the required payment. How can we protect
against ransomware:
● Backup all your data
● Patch your systems
● Educate users on attack sources
● Protect your network
● Segment network access

CSE MVSR 8
CYBER SECURITY VIRTUAL INTERNSHIP

● Keep a close eye on network activity


● Prevent initial infiltration
● Arm your endpoints
● Gain real-time threat intelligence
● Say no to ransom

Fig 2.2 Ransomware


3. Malware:
Malware is a type of software designed to gain unauthorized access or to cause damage to a
computer.Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software.” Examples of common
malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
How to protect my network against malware
Typically, businesses focus on preventative tools to stop breaches. By securing the
perimeter, businesses assume they are safe. Some advanced malware, however, will eventually
make their way into your network. As a result, it is crucial to deploy technologies that continually
monitor and detect malware that has evaded perimeter defenses. Sufficient advanced malware
protection requires multiple layers of safeguards along with high-level network visibility and
intelligence.
Types of malware
Virus:

CSE MVSR 9
CYBER SECURITY VIRTUAL INTERNSHIP

Viruses are a subgroup of malware. A virus is malicious software attached to a document or


file that supports macros to execute its code and spread from host to host. Once downloaded, the
virus will lay dormant until the file is opened and in use. Viruses are designed to disrupt a system’s
ability to operate. As a result, viruses can cause significant operational issues and data loss.
Worms:
Worms are a malicious software that rapidly replicates and spreads to any device within the
network. Unlike viruses, worms do not need host programs to disseminate. A worm infects a device
via a downloaded file or a network connection before it multiplies and disperses at an exponential
rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss.
Trojan virus:
Trojan viruses are disguised as helpful software programs. But once the user downloads it,
the Trojan virus can gain access to sensitive data and then modify, block, or delete the data. This
can be extremely harmful to the performance of the device. Unlike normal viruses and worms,
Trojan viruses are not designed to self-replicate.
Spyware:
Spyware is malicious software that runs secretly on a computer and reports back to a remote
user. Rather than simply disrupting a device’s operations, spyware targets sensitive information and
can grant remote access to predators. Spyware is often used to steal financial or personal
information. A specific type of spyware is a keylogger, which records your keystrokes to reveal
passwords and personal information.
Adware:
Adware is malicious software used to collect data on your computer usage and provide
appropriate advertisements to you. While adware is not always dangerous, in some cases adware
can cause issues for your system. Adware can redirect your browser to unsafe sites, and it can even
contain Trojan horses and spyware. Additionally, significant levels of adware can slow down your
system noticeably. Because not all adware is malicious, it is important to have protection that
constantly and intelligently scans these programs.
Ransomware:

CSE MVSR 10

CYBER SECURITY VIRTUAL INTERNSHIP


Ransomware is malicious software that gains access to sensitive information within a
system, encrypts that information so that the user cannot access it, and then demands a financial
payout for the data to be released. Ransomware is commonly part of a phishing scam. By clicking
a disguised link, the user downloads the ransomware. The attacker proceeds to encrypt specific
information that can only be opened by a mathematical key they know. When the attacker receives
payment, the data is unlocked.
Fileless malware:
Fileless malware is a type of memory-resident malware. As the term suggests, it is malware
that operates from a victim’s computer’s memory, not from files on the hard drive. Because there
are no files to scan, it is harder to detect than traditional malware. It also makes forensics more
difficult because the malware disappears when the victim computer is rebooted. In late 2017, the
Cisco Talos threat intelligence team posted an example of fileless malware that they called
DNSMessenger.

Fig 2.3 Malware

4. Social engineering:
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information.
They can solicit a monetary payment or gain access to your confidential data. Social engineering
can be combined with any of the threats listed above to make you more likely to click on links,
download malware, or trust a malicious source.
Working:

CSE MVSR 11

CYBER SECURITY VIRTUAL INTERNSHIP


In a typical social engineering attack, a cybercriminal will communicate with the intended victim
by saying they are from a trusted organization. In some cases, they will even impersonate a person
the victim knows.
If the manipulation works (the victim believes the attacker is who they say they are), the
attacker will encourage the victim to take further action. This could be giving away sensitive
information such as passwords, date of birth, or bank account details. Or they might encourage the
victim to visit a website where malware is installed that can cause disruptions to the victim's
computer. In worse case scenarios, the malicious website strips sensitive information from the
device or takes over the device entirely.
Dangers:
One of the greatest dangers of social engineering is that the attacks don't have to work
against everyone: A single successfully fooled victim can provide enough information to trigger an
attack that can affect an entire organization.
Over time, social engineering attacks have grown increasingly sophisticated. Not only do
fake websites or emails look realistic enough to fool victims into revealing data that can be used for
identity theft, social engineering has also become one of the most common ways for attackers to
breach an organization's initial defenses in order to cause further disruption and harm.

Fig 2.4 Social engineering

CSE MVSR 12
CYBER SECURITY VIRTUAL INTERNSHIP
2.2 Working
I worked on Cisco Packet Tracer 8.0.0 during the two months of the internship where they provided services
in different languages such as Russian, German, Spanish and French to work on.Cisco Packet Tracer is
Cisco's simulation software.It acts as a playground for you to explore networking and the experience is very
close to what you see in computer networks.
Purpose:
The purpose of this is to become familiar with the Packet Tracer interface. Learn how to use existing
topologies and build your own.

Fig 2.5 Cisco Packet Tracer


Features of Cisco Packet Tracer:
● Cisco Packet Tracer supports a multi-user system that allows many users to connect various
topologies across a computer network. Instructors can also build exercises for students to perform
using Packet Tracer.
● Supports feature expansion via additional programmes that use an API to improve Cisco Packet
Tracer's capabilities in areas including curriculum and assessment delivery, gaming, accessibility,
and interacting with real-world equipment.

CSE MVSR 13
CYBER SECURITY VIRTUAL INTERNSHIP

● The Enhanced Physical Mode transports you to a virtual lab where you can simulate cabling devices
on a rack. Refresh key skills such as device placement (Rack & Stack), on-device power switching,
device port-to-port cabling (including cable selection and management), troubleshooting, and more.
● It can be downloaded for free through a Netacad account.
● It enables its users to simulate the configuration relating to the Cisco routers and can be accessed
anywhere anytime.
● The Network Controller allows you a centralized dashboard to see the network's state, instantly
discover and diagnose issues, and push configuration changes to all managed devices at once,
whether you use its Web GUI or its APIs. You may also use real-world programmes on your
computer to access the Network Controller and run your own infrastructure automation scripts.
● It can be accessed through unlimited devices.
● Provides an interactive and self-paced environment.

2.3 Summary
To summarize, information is a critical part of any organization and investing in the right service provider
keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and
customized cyber security-driven business model includes disaster-recovery capabilities and secures data
and the underlying infrastructure of the organization, thus building a safe barrier for the information even
before it is attacked and saving the organization from a loss of billions of dollars that could result from the
security threat.

CSE MVSR 14
CYBER SECURITY VIRTUAL INTERNSHIP
Chapter 3
System Requirement specifications
3.1 Software requirements
Software -Cisco Packet Tracer 8.0.0
Operating System - Windows 7 or above
3.2 Hardware requirements
RAM - 4GB or above
HDD - Minimum Required

CSE MVSR 15
CYBER SECURITY VIRTUAL INTERNSHIP
Chapter 4
Results and Discussion
Here, in this section I will include an example done in the Cisco packet tracer, the process of simple
connection of two switches.
STEP-1:Place the 4 PCs on one side of the screen named as Host1,Host2,Host3,Host4 respectively and
other 4 PCs on the other side as PC1,PC2,PC3,PC4 respectively .Then,place a router named RTR1,RTR2
and a switch as SW1,SW2 on both sides.
STEP-2:Now connect the FastEthernet0 of PCs with the straight-through wire to
FastEthernet0/1,FastEthernet0/2,FastEthernet0/3,FastEthernet0/4 of the router. STEP-3:Now connect the
FastEthernet0/5 of the switch to the FastEthernet0/0 of the router.Similarly, do it on the other side.
STEP-4:Now connect the both switches using serial ports.
STEP-5:Now assign the IP address to PCs as 192.168.100.1,192.168.100.2,192.168.100.3,
192.168.100.4.Similarly give IP addresses to other 4 PCs as 172.16.200.1, 172.16.200.2,
172.16.200.3, 172.16.200.4.Then give IP address to routers and switches.
STEP-6:By default, switches and routers together cannot connect so I had configured them to make the
connection work.

CSE MVSR 16
CYBER SECURITY VIRTUAL INTERNSHIP

Fig 4.1 Connection of two switches

CSE MVSR 17
CYBER SECURITY VIRTUAL INTERNSHIP

Conclusion
Worldwide cyber insurance is arising, and at the same time insurance companies are starting to a greater
extent offering cyber insurance policies, in other words premiums. In the same fashion, we have
increasingly data breaches, followed by incidents affecting IT assets and having impact on the businesses.
Growing number of available vulnerabilities and exploits are contributing to business’s risk. Accordingly,
Cisco Networking Academy, have devoted the period of two months to initialize and set up a security
laboratory within main focus on providing services respectfully to cyber security.The hands-on exercises
on cisco packet tracer had helped me to build the topologies across computer networks in an easier and
understandable manner. It also helped me to gain knowledge over the real-world application and
connections that can be made.
In reality, cyberspace faces risks due to security attacks, as well as risks due to non-security related failures.
However, cyber insurance agencies would most likely insure risks only due to security attacks.It provides
an interactive and self-paced environment.
In this regard, I believe that the two months of internship period was dynamic and extremely interesting.
Facing different challenges everyday, and at the same time providing effective and beneficial services to
customers, without a significant degradation in performance.

CSE MVSR 18
CYBER SECURITY VIRTUAL INTERNSHIP

References
https://www.netacad.com/courses/packet-tracer/introduction-packet-tracer
https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
https://www.cisco.com/c/m/en_emear/campaigns/security/cybersecurity-essentials.html
https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
https://www.cisco.com/c/en_in/products/security/advanced-malware-protection/what-is-malware .html
https://www.cisco.com/c/en_in/solutions/security/ransomware-defense/what-is-ransomware.html
https://www.cisco.com/c/en_in/products/security/email-security/what-is-phishing.html
https://www.cisco.com/c/en/us/products/security/what-is-social-engineering.html

CSE MVSR 19

You might also like