Asma 1
Asma 1
CYBER SECURITY
A Internship Report Submitted at the end of seventh semester
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Submitted By
SYED ASMATH
(21981A05F9)
2024-2025
RAGHU ENGINEERING COLLEGE
(AUTONOMOUS)
CERTIFICATE
This is to certify that this project entitled “CYBER SECURITY” done by “SYED ASMATH
(21981A05F9)” is a student of B.Tech in the Department of Computer Science and Engineering, Raghu
Engineering College, during the period 2021-2025, in partial fulfillment for the award of the Degree of
Bachelor of Technology in Computer Science and Engineering to the Jawaharlal Nehru Technological
University, Gurajada Vizianagaram is a record of bonafide work carried out under my guidance and
supervision. The results embodied in this internship report have not been submitted to any other
University or Institute for the award of any Degree.
EXTERNAL EXAMINER
DISSERTATION APPROVAL SHEET
This is to certify that the dissertation titled
CYBER SECURITY
BY
SYED ASMATH (21981A05F9)
Mr. A A Narasimham
PROJECT GUIDE
Assistant professor
Internal Examiner
External Examiner
Dr. R. Sivaranjani
HOD
Date:
DECLARATION
This is to certify that this internship titled “CYBER SECURITY” is bonafide work
done by me, impartial fulfillment of the requirements for the award of the degree B.Tech and
submitted to the Department of Computer Science and Engineering, Raghu Engineering
College, Dakamarri.
I also declare that this internship is a result of my own effort and that has not been
copied from anyone and I have taken only citations from the sources which are mentioned in the
references.
This work was not submitted earlier at any other University or Institute for the reward of
any degree.
I take this opportunity with great pleasure to put on record our ineffable personal
indebtedness to Mr. Raghu Kalidindi, Chairman of Raghu Engineering College for
providing necessary departmental facilities.
I would like to thank the Principal Dr. CH. Srinivasu of “Raghu Engineering
College”, for providing the requisite facilities to carry out projects on campus. Your
expertise in the subject matter and dedication towards our project have been a source of
inspiration for all of us.
I sincerely express our deep sense of gratitude to Dr. R.Sivaranjani, Professor,
Head of Department, Computer Science and Engineering, Raghu Engineering College,
for her perspicacity, wisdom and sagacity coupled with compassion and patience. It is my
great pleasure to submit this work under her wing. I thank her for guiding us for the
successful completion of this project work.
I would like to thank SkillDzire professionals for providing the technical guidance
to carry out the module assigned. Your expertise in the subject matter and dedication
towards our project have been a source of inspiration for all of us.
I extend my deep hearted thanks to all faculty members of the Computer Science
department for their value based imparting of theory and practical subjects, which were
used in the project.
I thank the non-teaching staff of the Department of Computer Science and
Engineering, Raghu Engineering College, for their inexpressible support.
Regards
Syed Asmath
21981A05F9
TABLE OF CONTENTS
9. Conclusion
1.Introduction to Cyber Security
The Introduction to Cyber Security module serves as a foundational entry point into the
vast and complex world of cyber security. It begins by defining what cyber security
encompasses, including the protection of systems, networks, and programs from digital attacks.
This section emphasizes the growing importance of cyber security in our increasingly digital
world, where sensitive data is routinely collected, processed, and stored. Students will explore
various Cybersecurity Streams, which include network security, application security, and
information security, each addressing different aspects of securing digital assets. This
differentiation helps students understand the specific challenges and strategies associated with
each stream.
In this module, the focus on Common Threats Against Passwords is crucial, as passwords
are often the first line of defense against unauthorized access. Students will learn about various
attack vectors, such as brute-force attacks, phishing, and credential stuffing, which can
compromise user accounts and organizational systems. Furthermore, the Importance of Securely
Managing Passwords is highlighted, teaching students best practices such as creating complex
passwords, regularly updating them, and utilizing password managers to enhance security.
The module aims to foster an awareness of the critical need for strong security measures,
especially as cyber threats evolve. By the end of this section, students will not only understand
the basic concepts of cyber security but also be prepared to implement foundational security
practices in their personal and professional lives.
Overall, this introductory module is designed to instill a strong foundational knowledge of cyber
security principles, laying the groundwork for more advanced studies in subsequent sections of
the curriculum.
The Cryptography module delves into the essential field of securing information through
encryption techniques. It begins with an Introduction to Cryptography, where students learn the
core principles behind cryptographic methods used to protect data confidentiality, integrity, and
authenticity. This section covers the historical development of cryptography, explaining how it
evolved from classical ciphers to modern cryptographic algorithms that are widely used today.
Students will explore both symmetric and asymmetric encryption, understanding the differences,
advantages, and disadvantages of each method.
Figure 1: Cryptography
Following the theoretical foundation, the Cryptography Practical segment offers hands-
on experience with various encryption algorithms. Students will learn to implement and test
algorithms such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman),
gaining insight into their operational mechanics and real-world applications. This practical
exposure is crucial for understanding how cryptographic techniques are applied to secure
communications, protect sensitive data in storage and transit, and authenticate user identities
through digital signatures.
Additionally, the module addresses the importance of key management, which is critical
for maintaining the security of cryptographic systems. Students will learn about the risks
associated with improper key management practices and how to mitigate those risks through
secure key generation, distribution, and storage techniques. By the end of the module, students
will not only have a solid theoretical understanding of cryptographic concepts but also the
practical skills needed to apply these techniques effectively in securing information systems and
communications.
The Cyber Security Practices module emphasizes the operational methodologies and
techniques essential for maintaining robust security protocols within organizations. It begins with
an in-depth examination of conducting a Security Audit, which involves a systematic evaluation
of an organization's security posture, policies, and practices to identify vulnerabilities and
compliance gaps. Students will learn how to assess existing security measures against industry
standards and best practices, providing them with the tools to recommend necessary
improvements.
Following the security audit, the module explores Scanning & Patching, which is a
critical aspect of vulnerability management. Students will gain an understanding of the
importance of regularly scanning systems for vulnerabilities and the timely application of patches
to fix security flaws. This section includes training on various tools used for vulnerability
assessment, as well as strategies for prioritizing and implementing patches based on risk levels.
The module also covers Sniffing, a technique used to intercept and analyze network
traffic, enabling students to understand how attackers can exploit unencrypted data. The
implications of Denial-of-Service (DOS) attacks are examined, including their potential to
disrupt services by overwhelming systems with traffic. Students will learn how to implement
countermeasures to mitigate the impact of such attacks.
Finally, the Vendor Risk Management segment highlights the importance of assessing
and managing the security risks associated with third-party vendors. Students will learn how to
conduct vendor assessments, develop security policies for third-party relationships, and monitor
vendor compliance. By the end of this module, students will be equipped with the knowledge and
skills to implement effective security practices, ensuring the protection of organizational assets
against evolving cyber threats.
Regular scanning for vulnerabilities and applying patches are critical practices for maintaining
security.
Simple Example of Checking for Open Ports in Python: pythonimport socket def
check_ports(host):
for port in range(1, 6):
The Security Architecture module explores the principles and practices involved in designing
and implementing secure systems. It begins with Security Architecture Practice, introducing students
to industry-standard frameworks and methodologies for constructing secure infrastructures. Students
will learn about concepts such as defense in depth, which advocates for multiple layers of security to
protect against a variety of threats. This foundational knowledge is essential for understanding how
to design systems that can withstand attacks from different vectors.
The module also addresses Cyber Threats and Response, where students will study various
types of cyber threats, including malware, social engineering attacks, and advanced persistent threats
(APTs). This section emphasizes the importance of threat intelligence and proactive threat hunting to
identify and respond to emerging threats effectively. Students will explore real-world case studies to
analyze how organizations have successfully mitigated threats and improved their security postures.
In the Malware Threats segment, students will delve deeper into the different types of
malware, such as viruses, worms, ransomware, and spyware. They will learn how these malicious
programs operate, their methods of propagation, and the potential impacts they can have on
organizations. Understanding malware is crucial for developing effective defensive strategies and
response plans.
Throughout the module, students will engage in practical exercises that allow them to apply
their theoretical knowledge to real-world scenarios. By the end of this module, students will have a
comprehensive understanding of how to architect secure systems, respond effectively to cyber
threats, and implement best practices in security design. This knowledge is essential for anyone
aspiring to work in cyber security, as it equips them with the skills necessary to protect sensitive
information and maintain robust security in various environments.
The Cyber Security Governance module addresses the organizational frameworks, policies,
and processes necessary for managing cyber security risks effectively. It begins with an exploration
of Social Engineering, where students learn about the psychological manipulation techniques used by
attackers to deceive individuals into divulging confidential information. Understanding these tactics
is crucial for developing effective training programs that educate employees about recognizing and
resisting social engineering attempts.
The module then transitions to Cyber Security Forensics, emphasizing the importance of
forensic investigation in identifying, analyzing, and recovering from security incidents. Students will
learn about the methodologies used in digital forensics, including evidence collection, preservation,
and analysis. This knowledge is vital for understanding how to respond to incidents and ensure that
legal and regulatory requirements are met during investigations.
The Phishing Email Simulator component allows students to design and implement simulated
phishing campaigns to assess employee awareness and readiness. This practical exercise reinforces
the importance of employee training and helps organizations identify vulnerabilities in their defenses
against phishing attacks.
In the Investigation, Certification & Attestation section, students learn about the processes
involved in verifying and certifying compliance with security standards and regulations. This
knowledge is essential for organizations seeking to demonstrate their commitment to cyber security
and build trust with stakeholders.
By the end of this module, students will have a thorough understanding of the governance
structures necessary for effective cyber security management. They will be equipped with the skills
to develop and implement security policies, assess compliance, and create a culture of security
awareness within organizations, ensuring that cyber security is integrated into the overall governance
framework.
1. Risk Management: Identifying, assessing, and mitigating cyber risks to minimize their impact on
the organization.
2. Compliance and Legal Frameworks: Ensuring adherence to regulations like GDPR, HIPAA, or
NIST to avoid legal penalties and maintain trust.
3. Roles and Responsibilities: Clearly defining who is responsible for cybersecurity at every
organizational level, from IT teams to top executives.
4. Policies and Procedures: Developing guidelines on how to protect data, respond to incidents, and
handle security breaches.
5. Continuous Monitoring: Regularly reviewing and improving security measures through audits,
vulnerability assessments, and incident reporting.
The Linux and Penetration Testing module provides an in-depth exploration of Linux
operating systems and their role in the cyber security landscape, particularly in penetration
testing. It begins with a study of the Basic Linux Kernel, where students learn about the
architecture of Linux, its file systems, and the command-line interface. This foundational
knowledge is essential for understanding how to navigate and utilize Linux-based systems
effectively.
Figure 2: The Four Layers of the TCP/IP Model and their Functions
print(f"{ip} is offline")
Example usage
ping_sweep(["192.168.1.1", "192.168.1.2", "192.168.1.3"])
8. Python for Cyber Security
The Python for Cyber Security module emphasizes the importance of programming
skills in the cyber security domain. It begins with an exploration of IDPS (Intrusion
Detection and Prevention System), where students learn about the role of Python in
developing and managing systems that monitor network traffic for suspicious activities.
Students will understand how to leverage Python libraries to build custom scripts that can
analyze logs and detect anomalies in real time.
The module also introduces students to the Red Team concept, which involves
simulating real-world attacks to assess an organization’s security posture. Python is a
powerful tool for red team operations, and students will learn how to use it to create scripts
for automating attack simulations, allowing them to better understand the tactics used by
malicious actors.
In the Real-Time Tasks section, students will engage in practical exercises designed to
reinforce their learning. This includes developing a Phishing Email Simulator that mimics a
phishing attempt, enabling organizations to test their employees' awareness without
exposing them to real threats. Additionally, students will implement a Password
Manager in both Linux and Windows environments using Bitwarden, enhancing their
understanding of secure password storage.
The module also covers the creation of a Penetration Test Report, where students learn
to document their findings and recommendations effectively. This is crucial for
communicating results to stakeholders and ensuring that identified vulnerabilities are
addressed promptly.
Moreover, students will engage in advanced topics such as Basic Intrusion Detection
Systems for ARP Spoofing Detection, Mobile App Security Assessment, and Vulnerability
Scanning and Reporting with OpenVAS. The use of tools like Metasploit for penetration
testing, Reverse Engineering using Ghidra, and OSINT (Open Source Intelligence) using
Spiderfoot will round out their skill set.
Python for Cybersecurity is a vital aspect of modern cybersecurity practices. Python is
widely used for writing scripts to automate tasks, such as network scanning, penetration
testing, malware analysis, and data encryption. It supports various libraries like Scapy for
packet manipulation, Nmap for network scanning, and Pycryptodome for cryptography.
Python’s simplicity and versatility allow cybersecurity professionals to develop custom tools
for vulnerability detection, network traffic analysis, and security auditing. Additionally, it can
be used in ethical hacking and incident response to streamline the process of identifying and
mitigating security risks.
Python's ease of use and powerful libraries make it ideal for cybersecurity tasks. For
instance, it allows quick development of scripts to automate tedious processes like log
analysis, password cracking, and brute-force attacks. Cybersecurity analysts often use Python
to build intrusion detection systems (IDS), identify potential data breaches, and analyze
security loopholes in applications. Libraries like Paramiko assist in SSH communication, while
Requests and BeautifulSoup enable web scraping for threat intelligence gathering. Python can
also integrate with cybersecurity frameworks such as Metasploit and automate security tools
like Wireshark. Its adaptability makes Python a top choice for enhancing cybersecurity
operations.
9.Conclusion
From the core principles of network security and cryptography to the practical
application of penetration testing and ethical hacking, the report has covered a wide range of
topics. By understanding these concepts and acquiring the necessary skills, individuals and
organizations can effectively protect their digital assets and mitigate the risks associated with
cyberattacks.
The practical applications of penetration testing and ethical hacking in identifying and
mitigating vulnerabilities. The need for continuous learning and adaptation to stay ahead of
emerging cyber threats.
By applying the knowledge and skills gained from this report, individuals and
organizations can take proactive steps to enhance their cybersecurity posture and protect
themselves from the ever-growing risks posed by cyberattacks.