CybersecurityEdited Merged
CybersecurityEdited Merged
(PCCET)
An summer internship-1 Report Submitted in Partial Fulfillment of the
Requirements for the award of Degree of
Bachelor of Technology
In
By
Name: Regno:
B.TEJA 20KD1A0516
Vizianagaram-535005
November 2021-September-2022
CERTIFICATE
CONTENTS
1. Cyber Security 01-08
1.1 Introduc on 01
2.1 Introduc on 09
3.5.1 Smishing
3.5.2 Wardriving
3.5.6 Phishing
5. Conclusion 30
Pg No : 1
1.CYBER SECURITY
1.1 Introduction:
The internet has made the world smaller in many ways, but it has also opened us up to influences that
have never been so varied and so challenging. As fast as security grew, the hacking world grew faster. There
are two ways of looking at the issue of cyber security. One is that the companies that provide cloud
computing do that and only that so these companies will be extremely well secured with the latest in cutting
edge encryption technology.
Cyber refers to the technology that includes systems, networks, programs, data and security is
concerned with the protection of systems, networks, applications, and information. In some cases, it is also
called electronic information security or information technology security.
Reg No : 20KD1A0516
Pg No : 2
Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks.
Also known as information technology (IT)security, cybersecurity measures are designed to combat threats
against networked systems and applications, whether those threats originate from inside or outside of an
organization.Security system complexity, created by disparate technologies and a lack of in-house expertise,
can amplify these costs. But organizations with a comprehensive cybersecurity strategy, governed by best
practices and automated using advanced analytics, artificial intelligence (AI) and machine learning, can fight
cyberthreats more effectively and reduce the lifecycle and impact of breaches when they occur.
Cyber terrorism: It is the innovative use of information technology by terrorist groups to further their
political agenda. It took the form of attacks on networks, computer systems and telecommunication
infrastructures.
Cyber warfare: involves nation-states using information technology to go through another nation's
networks to cause damage. In the U.S. and many other people live in a society, cyber warfare has been
acknowledged as the fifth domain of warfare.
Cyber warfare attacks are primarily executed by hackers who are well-trained in use to benefit the quality of
details computer networks and operate under the favorable and support of nation-states. Rather than closing
a targets key network, a cyber-warfare attack may force to put into a situation into networks to compromise
Reg No : 20KD1A0516
Pg No : 3
valuable data, degrade communications, impair such infrastructural services as transportation and medical
services, or interrupt commerce.
Cyber siphonage: It is the practice of using information technology to obtain secret information without
permission from its owners or holders. It is the most often used to gain strategic, economic, military
advantage, and is conducted using cracking techniques and malware.
1. Any illegal act where a special knowledge of computer technology is essential for its perpetration,
investigation or prosecution.
2. Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers.
4. Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for
ransom.
Reg No : 20KD1A0516
Pg No : 4
"Cybercrime (computer crime) is any illegal behavior, directed by means of electronic operations,
that targets the security of computer systems and the data processed by them."
Note that in a wider sense, "computer-related crime can be any illegal behavior committed by means
of, or in relation to a computer system or network”. However, this is not cybercrime.
Statute and treaty law both refer to "cybercrime." The term "cybercrime" relates to several other
terms that may sometimes be used interchangeably to describe crimes committed using computers.
Computer related crime, Computer crime, Internet crime, E-crime, High-tech crime, etc. are the other
synonymous terms. Cybercrime specifically can be defined in several ways; a few definitions are:
1. A crime committed using a computer and the Internet to steal a person's identity (identity theft) or sell
contraband or stalk victims or disrupt operations with malevolent programs
3. Any illegal activity done through the Internet or on the computer. All criminal activities are done using
the medium of computers, the internet, cyberspace.
Cybercriminals are individuals or teams of people who use technology to commit malicious activities on
digital systems or networks with the intention of stealing sensitive company information or personal data
and generating profit.
Cybercriminals are known to access the cybercriminal underground markets found in the deep web to trade
malicious goods and services, such as hacking tools and stolen data.
Reg No : 20KD1A0516
Pg No : 5
1. Hobby hackers
2. IT professionals (social engineering is one of the biggest threats)
3. Politically motivated hackers
4. Terrorist organizations.
1. Psychological prevents
2. Financially motivated hackers (corporate espionage)
3. State – sponsored hacking (national espionage, sabotage)
4. Organized criminals.
Thus, the typical motives behind cybercrime seem to be greed, desire to gain power and/or publicity, desire
for revenge, a sense of adventure, looking for thrill to access forbidden information, destructive mindset and
desire to sell network security services.
Reg No : 20KD1A0516
Pg No : 6
Recipient servers and anti-malware software can help detect and filter spoofed messages.
Unfortunately, not every email service has security protocols in place. Still, users can review email headers
packaged with every message to determine whether the sender address is forged.
Reg No : 20KD1A0516
Pg No : 7
If an attacker puts himself between a client and a webpage, a Man-in-the-Middle (MITM) attack occurs.
This form of assault comes in many ways.
Reg No : 20KD1A0516
Pg No : 8
For example, to intercept financial login credentials, a fraudulent banking website can be used. Between the
user and the real bank webpage, the fake site lies "in the middle."
There are several reasons and strategies for hackers to use a MITM attack. Usually, like credit card numbers
or user login details, they try to access anything. They also spy on private meetings, which may include
corporate secrets or other useful information.
The feature that almost every attack has, in general, is that the attacker pretends to be somebody you trust
(or a webpage).
In the above diagram, you can see that the intruder positioned himself in between the client and server to
intercept the confidential data or manipulate the incorrect information of them.
Reg No : 20KD1A0516
Pg No : 9
2.CYBER OFFENSES
2.1 Introduction:
Cyber offences are illegitimate actions, which are carried out in a classy manner where either the
computer is the tool or target or both. Cyber-crime usually includes the following − Unauthorized access of
computers. Data diddling, Virus/worms attack.
Cybercrimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery,
defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also
given birth to new age crimes that are addressed by the Information Technology Act, 2000.
Section 16 of the MCC contains offenses in the first category, namely, illegal access, illegal
interception, data interference, system interference, and misuse of devices.
These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud,
human trafficking, spoofing, identity theft, and online libel or slander.
Some online crimes occur against property, such as a computer or server. These crimes include DDOS
attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement,
and IPR violations.
When a cybercrime is committed against the government, it is considered an attack on that nation's
sovereignty. Cybercrimes against the government include hacking, accessing confidential information, cyber
warfare, cyber terrorism, and pirated software.
Reg No : 20KD1A0516
Pg No : 10
Port scanning:
Network scanning:
Understand IP Addresses and related information about the computer network systems.
Vulnerability scanning:
Understand the existing weaknesses in the system. The scrutinizing phase is always called "enumeration" in
the hacking world.
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended victim
to gather necessary background information, such as potential points of entry and weak security protocols,
needed to proceed with the attack. Then, the attacker uses a form of pretexting such as impersonation to gain
the victim’s trust and provide stimuli for subsequent actions that break security practices, such as revealing
sensitive information or granting access to critical resources.
Reg No : 20KD1A0516
Pg No : 11
"Impersonation" is perhaps the greatest technique used by social engineers to deceive people. Social
engineers "take advantage of the fact that most people are basically helpful, so it seems harmless to tell
someone who appears to be lost where the computer room is located, or to let someone into the building who
"forgot his/her badge, etc., or pretending to be an employee or valid user on the system.
The attacker pretends to be an important user - for example, a Chief Executive Officer (CEO) or
high- level manager who needs immediate assistance to gain access to a system. The attacker uses
intimidation so that a lower-level employee such as a help-desk worker will help him/her in gaining access
to the system. Most of the low-level employees will not ask any question of someone who appears to be in a
position of authority.
An attacker pretends to have permission from an authorized source to a system. This trick is useful
when the supposed authorized personnel is on vacation.
Calling the technical support for assistance is a classic social engineering example. Helpdesk and
technical support personnel are trained to help users, which makes them good prey for social engineering
attacks.
So, who are these cybercriminals? Here’s a breakdown of the most common types:
Gray-Hat Hackers:
They work both with malicious intent and as legitimate security analysts.
Suicide Hackers:
They aim to openly bring down the critical infrastructure for a social cause.
Reg No : 20KD1A0516
Pg No : 12
Script Kiddies:
They are unskilled hackers who run scripts and software created by more experienced hackers.
Cyber Terrorists:
They create fear by disrupting large-scale computer networks; motivated by religious or political beliefs.
State-Sponsored Hackers:
They penetrate government networks, gain top-secret information, and damage information systems; paid
for by a hostile government.
Reg No : 20KD1A0516
Pg No : 13
The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and
availability, or CIA. Privacy means data can be accessed only by authorized parties; integrity means
information can be added, altered, or removed only by authorized users; and availability means systems,
functions, and data must be available on-demand according to agreed-upon parameters.
The main element of Cyber Security is the use of authentication mechanisms. For example, a
username identifies an account that a user wants to access, while a password is a mechanism that proves the
user is who he claims to be. The Seven Layers of cyber security are:
Reg No : 20KD1A0516
Pg No : 14
1. Mission-Critical Assets:
This is data that is critical to protect. Whether businesses would like to admit it or not, they face
malicious forces daily.
The question is how are leaders dealing with this type of protection? And what measures have they
put in place to guard against breaches? An example of mission-critical assets in the Healthcare industry is
Electronic Medical Record (EMR) software. In the financial sector, its customers’ financial records.
2.Data Security:
Data security is when there are security controls put in place to protect both the transfer and the
storage of data. There must be a backup security measure in place to prevent the loss of data, this will also
require the use of encryption and archiving. Data security is an important focus for all businesses as a breach
of data can have dire consequences.
3.Endpoint Security:
This layer of security makes sure that the endpoints of user devices are not exploited by breaches.
This includes the protection of mobile devices, desktops, and laptops. Endpoint security systems enable
protection either on a network or in the cloud depending on the needs of a business.
4.Application Security:
This involves the security features that control access to an application and that application’s access
to your assets. It also includes the internal security of the app itself. Most of the time, applications are
designed with security measures that continue to provide protection when the app is in use.
5.Network Security:
This is where security controls are put in place to protect the business’s network. The goal is to
prevent unauthorized access to the network. It is crucial to regularly update all systems on the business
network with the necessary security patches, including encryption. It’s always best to disable unused
interfaces to further guard against any threats.
6.Perimeter Security:
This security layer ensures that both the physical and digital security methods protect a business. It
includes things like firewalls that protect the business network against external forces.
Despite being known as the weakest link in the security chain, the human layer is a very necessary
layer. It incorporates management controls and phishing simulations as an example.
These human management controls aim to protect what is most critical to a business in terms of security.
This includes the very real threat that humans, cyber attackers, and malicious users pose to a business.
Reg No : 20KD1A0516
Pg No : 15
Cyber threats are security incidents or circumstances that can have a negative outcome for your network or
other data management systems.
Examples of common types of security threats include phishing attacks that result in installing malware that
infects your data, failure of a staff member to follow data protection protocols that cause a data breach, or
even nature’s forces that takes down your company’s data headquarters, disrupting access.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and tempt threat actors to
exploit them.
Types of vulnerabilities in network security include but are not limited to SQL injections, server
misconfigurations, cross-site scripting, and transmitting sensitive data in a non-encrypted plain text format.
When the threat probability is multiplied by the potential loss that may result, cyber security experts refer to
this as a risk.
Just as some germs and diseases can attack the human body, numerous threats can affect hardware, software,
and the information you store. Some of the major ones include the following:
Viruses are designed so that they can be easily transmitted from one computer or system to another. Often
sent as email attachments, viruses corrupt and co-opt data, interfere with your security settings, generate
spam, and may even delete content.
Computer worms are similar; they spread from one computer to the next by sending themselves to all of
the user’s contacts and subsequently to all contacts’ contacts.
Reg No : 20KD1A0516
Pg No : 16
Trojans, these malicious pieces of software insert themselves into a legitimate program. Often, people
voluntarily let trojans into their systems in email messages from a person or an advertiser they trust. As soon
as the accompanying attachment is open, your system becomes vulnerable to the malware within.
Bogus security software that tricks users into believing that their system has been infected with a virus. The
accompanying security software that the threat actor provides to fix the problem causes it.
The adware tracks your browsing habits and causes advertisements to pop up. Although this is common and
often something you may even agree to, adware is sometimes imposed upon you without your consent.
Spyware is an intrusion that may steal sensitive data such as passwords and credit card numbers from your
internal systems.
A denial of service (DOS) attack occurs when hackers deluge a website with traffic, making it impossible
to access its content. A distributed denial of service (DDOS) attack is more forceful and aggressive since it
is initiated from several servers simultaneously. As a result, a DDOS attack makes it harder to mount
defenses against it.
Phishing attacks are social engineering infiltrations whose goal is to obtain sensitive data: passwords and
credit card numbers incorrectly. Via emails or links coming from trusted companies and financial
institutions, the hacker causes malware to be downloaded and installed.
SQL injections are network threats that involve using malicious code to infiltrate cyber vulnerabilities in
data systems. As a result, data can be stolen, changed, or destroyed.
Man-in-the-middle attacks involve a third-party intercepting and exploiting communications between two
entities that should remain private. Eavesdropping occurs, but information can be changed or misrepresented
by the intruder, causing inaccuracy and even security breaches.
Root kit tools gain remote access to systems without permission and can lead to the installation of malware
and the stealing of passwords and other data.
Reg No : 20KD1A0516
Pg No : 17
Ransom ware is a type of malware that involves an attacker locking the victim's computer system files
typically through encryption and demanding a payment to decrypt and unlock them.
Cyber security professionals should have an in-depth understanding of the following types of cyber security
threats.
Malware Attack:
Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated
when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco
reports that malware, once activated, can:
Covertly obtain information by transmitting data from the hard drive (spyware)
Reg No : 20KD1A0516
Pg No : 18
Emotet:
The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular
banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet
continues to be among the most costly and destructive malware.”
Password Attacks:
With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type
of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human
interaction and often involves tricking people into breaking standard security practices.” Other types of
password attacks include accessing a password database or outright guessing.
Reg No : 20KD1A0516
Pg No : 19
SQL Injection:
A Structured Query Language (SQL) injection is a type of cyber-attack that results from inserting malicious
code into a server that uses SQL. When infected, the server releases information. Submitting the malicious
code can be as simple as entering it into a vulnerable website search box
Cyber warfare is usually defined as a cyber-attack or series of attacks that target a country. It has the
potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in
damage to the state and even loss of life.
There is, however, a debate among cyber security experts as to what kind of activity constitutes cyber
warfare. The US Department of Defense (DoD) recognizes the threat to national security posed by the
malicious use of the Internet but doesn’t provide a clearer definition of cyber warfare. Some consider cyber
warfare to be a cyber-attack that can result in death.
Cyber warfare typically involves a nation-state perpetrating cyber-attacks on another, but in some cases, the
attacks are carried out by terrorist organizations or non-state actors seeking to further the goal of a hostile
nation. There are several examples of alleged cyber warfare in recent history, but there is no universal,
formal, definition for how a cyber-attack may constitute an act of war.
Reg No : 20KD1A0516
Pg No : 20
1. Espionage
Refers to monitoring other countries to steal secrets. In cyber warfare, this can involve using botnets or spear
phishing attacks to compromise sensitive computer systems before exfiltrating sensitive information.
2.Sabotage
Government organizations must determine sensitive information and the risks if it is compromised. Hostile
governments or terrorists may steal information, destroy it, or leverage insider threats such as dissatisfied or
careless employees, or government employees with affiliation to the attacking country.
DoS attacks prevent legitimate users from accessing a website by flooding it with fake requests and forcing
the website to handle these requests. This type of attack can be used to disrupt critical operations and
systems and block access to sensitive websites by civilians, military and security personnel, or research
bodies.
Attacking the power grid allows attackers to disable critical systems, disrupt infrastructure, and potentially
result in bodily harm. Attacks on the power grid can also disrupt communications and render services such
as text messages and communications unusable.
5.Propaganda Attacks
Attempts to control the minds and thoughts of people living in or fighting for a target country. Propaganda
can be used to expose embarrassing truths, spread lies to make people lose trust in their country, or side with
their enemies.
6.Economic Disruption
Most modern economic systems operate using computers. Attackers can target computer networks of
economic establishments such as stock markets, payment systems, and banks to steal money or block people
from accessing the funds they need.
7.Surprise Attacks
These are the cyber equivalent of attacks like Pearl Harbor and 9/11. The point is to carry out a massive
attack that the enemy isn’t expecting, enabling the attacker to weaken their defenses. This can be done to
prepare the ground for a physical attack in the context of hybrid warfare
Reg No : 20KD1A0516
Pg No : 21
1.Stuxnet Virus
Stuxnet was a worm that attacked the Iranian nuclear program. It is among the most sophisticated
cyber-attacks in history. The malware spread via infected Universal Serial Bus devices and targeted data
acquisition and supervisory control systems. According to most reports, the attack seriously damaged Iran’s
ability to manufacture nuclear weapons.
An attack on Sony Pictures followed the release of the film “The Interview”, which presented a negative
portrayal of Kim Jong Un. The attack is attributed to North Korean government hackers. The FBI found
similarities to previous malware attacks by North Koreans, including code, encryption algorithms, and data
deletion mechanisms.
Bronze Soldier
In 2007, Estonia relocated a statue associated with the Soviet Union, the Bronze Soldier, from the center of
its capital Tallinn to a military cemetery near the city. Estonia suffered a number of significant cyber-attacks
in the following months. Estonian government websites, media outlets, and banks were overloaded with
traffic in massive denial of service (DoS) attacks and consequently were taken offline.
2.Fancy Bear
CrowdStrike claims that the Russian organized cybercrime group Fancy Bear targeted Ukrainian rocket
forces and artillery between 2014 and 2016. The malware was spread via an infected Android application
used by the D-30 Howitzer artillery unit to manage targeting data.
Ukrainian officers made wide use of the app, which contained the X-Agent spyware. This is a highly
successful attack, resulting in the destruction of over 80% of Ukraine’s D30 Howitzers.
Reg No : 20KD1A0516
Pg No : 22
Enemies of Qatar
Elliott Broidy, an American Republican fundraiser, sued the government of Qatar in 2018, accusing it of
stealing and leaking his emails to discredit him. According to the lawsuit, the brother of the Qatari Emir was
alleged to have orchestrated a cyber warfare campaign, along with others in Qatari leadership. 1,200 people
were targeted by the same attackers, with many of these being known “enemies of Qatar”, including senior
officials from Egypt, Saudi Arabia, the United Arab Emirates, and Bahrain.
3.5.1 Smishing
Smishing has become common now as smart phones are widely used. Smishing uses Short Message Service
(SMS) to send fraud text messages or links. The criminals cheat the user by calling. Victims may provide
sensitive information such as credit card information, account information, etc. Accessing a website might
result in the user unknowingly downloading malware that infects the device.
Reg No : 20KD1A0516
Pg No : 23
3.5.2 Wardriving
War driving is a way used by attackers to find access points wherever they can be. With the availability of
free Wi-Fi connection, they can drive around and obtain a very huge amount of information over a very
short period.
Reg No : 20KD1A0516
Pg No : 24
3.5.6 Phishing
Phishing is when attackers attempt to trick users into doing the wrong thing, such as clicking a bad link that
will download malware or direct them to a dodgy website.
Reg No : 20KD1A0516
Pg No : 25
4.CYBER FORENSICS
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic devices)
while following proper investigation rules to nab the culprit by presenting the evidence to the court.
1. The surge of technological advances has seemed to challenge the archaic ways of collecting and
generating evidence. The intangible nature of digital evidence coupled with the fragile and vulnerable
structure of the internet has posed inherent obstacles in collecting and preserving digital evidence.
The dearth of adequate techno-legal skills coupled with lack of expertise in collecting such evidence has
undisputedly led to a rise in cyber-crimes in the nation.
2. Preserved in a certain form, the admissibility of storage devices imbibing the media content from the
crime scene is also an important factor to consider. Reading Section 3 and Section 65-B, The Evidence Act,
1872 cumulatively, it can be inferred that certain computer outputs of the original electronic record, are now
made admissible as evidence “without proof or production of the original record.
Thus, the matter on computer printouts and floppy disks and CDs become admissible as evidence.”
3. The other most crucial question in cybercrime investigation regarding the reliability of digital evidence
has also been clarified by Section 79A of the IT (Amendment) Act, 2008, which empowers the Central
government to appoint any department or agency of Central or State government as Examiner of Electronic
Evidence.
Reg No : 20KD1A0516
Pg No : 26
For combating such crimes, CBI has certain specialized structures, namely, Cyber Crimes Research and
Development Unit (CCRDU), Cyber Crime Investigation Cell (CCIC), Cyber Forensics Laboratory; and
Network Monitoring Centre.
The CCRDU is mainly entrusted with the task of collecting information on cyber-crime cases reported for
further investigation in liaison with the State Police Forces. On a larger parlance, it plays a pivotal role in the
collection and dissemination of information on cyber-crimes in consonance with the Ministry of IT,
Government of India and other organizations/Institutions and Interpol Headquarters.
The CCIC has the power to investigate the criminal offences envisaged under the Information Technology
(Amendment)Act, 2008 and is also the point of contact for Interpol to report the cyber- crimes in India.
The third organ, i.e., CFL, is the one which provides consultations and conducts criminal investigation for
various law enforcement agencies. It not only provides on-site assistance for computer search and seizure
upon request, but also is the one which provides expert testimony in the court of law.
It is pertinent to note that the CFL must also adhere to all the legal formalities during the seizure of the
media for making the media analysis admissible. Keeping the possibility of remote access from an isolated
location across the globe into consideration, the data storage in another jurisdiction cannot be ruled out
al-together.
In situations involving the storage location of the data in another country, Interpol ought to be informed and
Section 166, Cr PC needs to be complied with. The Network Monitoring Centre is entrusted to monitor the
Internet through the usage of various tools.
Recently, CBI has signed a memorandum of understanding (MoU) with Data Security Council of India
(DSCI) with a view to seek expert services from the latter in managing the new challenges in cybercrimes
and updating officials with the latest technology. This shows a novel collaborative approach between the law
enforcement agencies and IT Industry for strengthening the security measures.
Reg No : 20KD1A0516
Pg No : 27
This Policy has been drafted in consultation with all the stakeholders. In order to digitize the economy and
promote more digital transactions, the government must be able to generate trust in people in the
Information and Communications Technology systems that govern financial transactions. A strong
integrated and coherent policy on cyber security is also needed to curb the menace of cyber terrorism.
Reg No : 20KD1A0516
Pg No : 28
1. Encouraging the adoption of IT in all sectors of the economy by creating adequate trust in IT systems by
the creation of a secure cyber ecosystem.
2. Creating an assurance framework for the design of security policies and for the promotion and enabling
actions for compliance with global security standards and best practices through conformity assessment.
4. Enhancing and developing national and sectoral level 24 x 7 mechanisms for obtaining strategic
information concerning threats to ICT infrastructure, creating scenarios for response, resolution and crisis
management through effective predictive, preventive, protective, response and recovery actions.
5. Operating a 24×7 National Critical Information Infrastructure Protection Centre (NCIIPC) to improve the
protection and resilience of the country’s critical infrastructure information.
7. Improving the visibility of the ICT (Information and Communication Technology) products/services’
integrity by having testing and validation infrastructure.
9. Providing businesses with fiscal benefits for adopting standard security practices and processes.
10. Safeguarding the privacy of citizen’s data and reducing economic losses due to cybercrime or data theft.
11. Enabling effective prevention, investigation and prosecution of cybercrime and enhancement of law
enforcement capabilities through legislative intervention.
13. Developing effective public-private partnerships and collaborative engagements by means of technical
and operational cooperation. Promoting global cooperation by encouraging shared understanding and
leveraging relationships for furthering the cause of security of cyberspace.
Reg No : 20KD1A0516
Pg No : 29
CONCLUSION
From this report, it is concluded that the internship “Cyber Security by Palo Alto Networks” has
provided us with an immense knowledge on different aspects of cyber security in a simple and
understandable way.
Cyber security is one of the most important aspects of the fast-paced growing digital world and this
internship helped us to understand these emerging technologies. The Internship covered the topics like:
These fundamental courses cover all the basic information and create awareness in the students
regarding security issues. The different cyber-attacks and crimes were broadly discussed and the necessary
steps to avoid such attacks and crimes were mentioned in an easy way.
New emerging technologies like Cloud Computing, Network Security, and Security operations were
discussed briefly with pictorial representations which helped the students to understand and analyze them.
The purpose of the internship is to help students pursue a career in cybersecurity, as there are not enough
professionals in the field at present.
Palo Alto Networks Cyber Security Virtual Internship 2021 helped students to understand and
analyze the latest technologies in the Cyber Security sector and it enhances the knowledge of a student on
the Cyber Security world.
Reg No : 20KD1A0516
Pg No : 30
Textbooks
1.Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
2.B.B. Gupta, D. P. Agarwal, Haoxiang Wang, Computer and Cyber Security: Principles, Algorithm,
Applications and Perspectives, CRC Press, ISBN 9780815371335, 2018
References
1.Cyber Security Essentials, James Graham, Richard Howard and CRC Press Introduction to Cyber
Security, Chwan-Hwa(john) Wu, J.David Irwin, CRC Press T&F Group
Reg No : 20KD1A0516