0% found this document useful (0 votes)
206 views25 pages

Final Report Internship

The document outlines a six-week internship program on Cyber Security conducted by IBM SkillsBuild in collaboration with AICTE, aimed at enhancing students' skills in the field. It includes a detailed report by Tejaswini H, a student at Jawaharlal Nehru New College of Engineering, summarizing her learning experiences, skills acquired, and the methodologies employed during the internship. The program emphasizes project-based learning and covers essential topics such as steganography and risk assessment in cybersecurity.

Uploaded by

tejaswinihalesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views25 pages

Final Report Internship

The document outlines a six-week internship program on Cyber Security conducted by IBM SkillsBuild in collaboration with AICTE, aimed at enhancing students' skills in the field. It includes a detailed report by Tejaswini H, a student at Jawaharlal Nehru New College of Engineering, summarizing her learning experiences, skills acquired, and the methodologies employed during the internship. The program emphasizes project-based learning and covers essential topics such as steganography and risk assessment in cybersecurity.

Uploaded by

tejaswinihalesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Jawaharlal Nehru New College of Engineering

Department of Computer Science and Engineering


Six week Innovative/Entrepreneurship Internship on

“IBM SkillsBuild & AICTE collaborated Internship


Program-Cyber Security”

Submitted to Visvesvaraya Technological University in partial fulfillment of


the requirement for the award of degree of Bachelor of Engineering in
Computer Science and Engineering.

Submitted by:

TEJASWINI H 4JN21CS174

Under the Guidance of:

Mr. Narendra Kumar S, M.Tech.


Assistant Professor, Dept. of CS&E
JNNCE, Shivamogga

Department of Computer Science And Engineering


Jawaharlal Nehru New College of Engineering
Shivamogga - 577 204

JULY 2024

i
National Education Society ®

Department of Computer Science and Engineering

CERTIFICATE
This is to certify that the six week Innovative/Entrepreneurship Internship Report entitled.

“IBM SkillsBuild & AICTE collaborated Internship


Program-Cyber Security”
Submitted by:
TEJASWINI H 4JN21CS174

Student of 6th semester B.E under the supervision and guidance towards the partial
fulfillment of the requirement for award of degree of the Bachelor of Engineering in
Computer Science And Engineering of Visvesvaraya Technological University, Belagavi
during the year 2023– 2024.

Signature of Coordinators Signature of Guide

Mr. Vedananda D E, M.Tech., PhD. Mr. Narendra Kumar S, M.Tech.


Assistant Professor, Dept.CS&E Assistant Professor, Dept. of CS&E
JNNCE, Shivamogga. JNNCE, Shivamogga

Signature of HOD

Mr. Chakrapani D S, B.E.,M. Tech.


Dr. Jalesh Kumar,B.E, M.Tech,Ph.D
Assistant Professor, Dept. of CSE Professor and Head, Dept. of CS&E
JNNCE, Shivamogga. JNNCE, Shivamogga.

i
i
Certificate of Completion
awarded to

TEJASWINI.H
for successfully completing 6 weeks internship using IBM SkillsBuild in
Cyber Security (CS)
From October 13, 2023 to Nov 26, 2023.
This program was conducted in collaboration with All India Council for Technical

Education (AICTE) and Edunet Foundation

Internship ID: INTERNSHIP_169052765864c367aa659b3


Students ID: STU6509bc72b8cec1695136882
Nagesh Singh
Executive Director-
Edunet Foundation
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task would be
incomplete without the mention of the people who made it possible, whose constant guidance
and encouragement crowned the efforts with success.

It gives us great pleasure in placing on record a deep sense of gratitude to our guide Mr.
Narendra Kumar S, Assistant Professor, Dept. of CS&E, and Dr. Jalesh Kumar, Head of the
Department, Dept. of CS&E, for their guidance, initiative and encouragement that led us through
internship. I would extend my heartfelt thanks to Dr. Y. Vijaya Kumar the Principal, JNNCE,
Shivamogga for their kind support and encouragement.

Finally, we also would like to thank the whole teaching and non-teaching staff of Computer
Science And Engineering to our respective parents, friends, and well-wishers.

Thanking you,

Tejaswini H (4JN21CS174)

ii
ABSTRACT
Steganography is a technique used to conceal text within an image, making the
information invisible to unintended recipients. This method involves embedding a secret
message into a digital image in such a way that it remains undetectable to the naked eye
and unsuspecting observers. The process typically involves manipulating the least
significant bits (LSBs) of the image's pixel values, which allows the text to be hidden
without significantly altering the appearance of the image. By embedding the message in
this manner, the steganography ensures that the cover image looks virtually identical to
the original image, thus protecting the confidentiality of the embedded information. The
applications of text-hiding steganography are vast, ranging from secure communication
and digital watermarking to protecting intellectual property. One of the key advantages
of this technique is that it can be applied to various types of images, such as JPEG, PNG,
and BMP formats, each offering different levels of resistance to compression and
distortion. Advanced algorithms enhance the security and robustness of the hidden
message, ensuring it can withstand common image processing operations. As a result,
steganography provides a discreet and effective way to transmit sensitive information,
making it a valuable tool in the fields of cybersecurity, digital forensics, and information
assurance.

i
Table of Contents

Abstract i
Acknowledgement ii

Table of Contents iii


List of Figures iv

Chapter 1: About the company 1-5

1.1 IBM Skill Build program 1


1.2 IBM Skill Build Ecosystem 1

1.3 IBM Skill Build Internship with AICTE 1-2

1.4 Learning Methodology 3


1.5 Program Calendar 3-4

1.6 Edunet Foundation 4

1.7 IBM Skill-Build Self Paced Curated Learning 4-5

Chapter 2: Skills Learnt 6-10

2.1 Fundamentals of Cyber Security 6 -7


2.2 Technical Proficiency 7
2.3 Essential Cyber Security Skills 7-8
2.4 Incidence Response and Management 8-9
2.5 Continuous Learning and Adaptation 9-10
Chapter 3: Learning Outcomes 11-16
3.1 Steganography 11
3.2 Text message hiding techniques in Steganography 12
3.3 Message hiding project 13
3.4 Results 14
3.5 Soft skills learnt 14-15
Chapter 4: CONCLUSIONS 16
References 17

iii
List of Figures

Figure 1.1 Various internships provided by IBM Skill Build with 2


AICTE
Figure 3.1 Output of the program 14

i
v
Innovation/ Entrepreneurship Internship Report

Chapter-1
About the Industry
1.1 IBM Skill Build Program
The IBM SkillsBuild Program for Jobseekers was designed around three pillars of Self-Paced
Learning, Project-Based Learning, and Access to Employment. It is for this purpose IBM
SkillsBuild Program for Jobseekers has leveraged its expertise, credibility and track record
across the globe to build partnerships with governments both central and state. At a grassroot
level, Edunet as the implementation partner has not only facilitated these large partnerships but
has also collaborated with over 200 educational institutions to deliver the innovative program
to students and faculty members. These institutions range from Industrial Training Institutes
(ITIs) for training semi-skilled workers all the way to degree colleges and universities.
With IBM SkillsBuild for Jobseekers, students could gain core technology and
important workplace skills like: leadership skills, communication skills, programming skills,
problem solving skills, and/or writing skills that are aligned to in-demand jobs. Also, there lies
an opportunity to earn digital credentials to show employers what they’ve achieved.
IBM SkillsBuild is a free digital platform that gives every adult the opportunity to
develop technology and professional skills regardless of your background, education, or life
experiences.

1.2 IBM Skill Build Ecosystem


It has a comprehensive ecosystem to support over 10,000 Courses. The ecosystem comprises
of an interactive and Multi-media Course Material. There is an industry recognized certification
that provides skills essential for Entry-Level Jobs. Regional language support like Hindi is also
provided in the courses. A plethora of content is available for educators as well.

1.3 IBM Skills Build Internship with AICTE


IBM Skills Build has partnered with the All-India Council for Technical Education (AICTE)
to bring Project-based Learning to students across India who are pursuing technical education.
With over 1000 State, Central and Private Universities the AICTE represents a pool of students
pursuing technical education. These students will be entering a job market where there is a
demand for skills in Industrial Revolution 4.0 technologies and the agility to adapt to an
evolving technological landscape.

Dept. of CS&E, JNNCE 1


Innovation/ Entrepreneurship Internship Report

To better prepare students for the professional journey, the partnership with AICTE and
IBM SkillsBuild brings Mentor-led Project Based Learning – Deep in the form of an 8 week
Virtual Internship.
Process
• The internship is delivered virtually to all students, over an 8 week duration from the
start date
• The internship is delivered in groups of students under a pre-selected problem
statement. Each of the 15 problem statements will be assigned a mentor along with 40-
60 students
• The mentor will introduce the problem statement, help brainstorm solutions and guide
students towards the technologies and skills required to solve the problem statement
• The internship concludes with the submission of the project and the delivery of a
presentation
• Top teams are awarded for their ingenuity, along with the internship completion
certificate and the remaining teams are provided Internship certificates
Topics
Virtual Internships are currently offered in the following topics

Artificial Intelligence and Machine Learning Cloud Computing

Cyber Security Full Stack Development Frontend Web Development

Figure 1.1 Various internships provided by IBM Skill Build with AICTE

Dept. of CS&E, JNNCE 2


Innovation/ Entrepreneurship Internship Report

1.4 Learning Methodology


Each topic has a choice of 3 problem statements for students to select.
Duration: IBM Skills Build Internship Camp is 8 weeks in Duration requiring attendance
to virtual mentoring sessions every week for 2-3 hours. During the remaining time, interns
are expected to make progress on their projects using the IBM Skills Build Platform.
Mentoring sessions Should be 2-3 hours per week
Preferable time slots
Weekdays – After
Weekends – First Half
Structured Self-Learning
Completion of mentor-recommended Skills Build Courses
Progress on Project - Upon conclusion of the Virtual Internship students are expected to
have completed three tasks:
• Completion of selected self-paced learning courses on IBM Skills Build
• Submission of Project files
• Submission of a final project presentation

1.5 Program Calendar


The weekly split-up of the Internship program is as follows:
Week Milestone Submission by Student Team

Week 1-2 Understanding the Problem • Problem Scoping


Statement • Brainstorming solution options

Week 3-4 Solution • Finalize solution and approach


Development • How is it unique compared to any
existing solutions
Week 5-6 Solution Design • Wireframes / User Flow / Sitemap
Week 7-8 Final Project/ Website & • Link for the website (hosted on GitHub)
Small Presentation • Presentation (template will be shared)
• Video (optional)

Dept. of CS&E, JNNCE 3


Innovation/ Entrepreneurship Internship Report

1.6 Edunet Foundation


In the next three years, nearly 120 million workers in the world’s 10 largest economies
may need to be reskilled as businesses adopt artificial intelligence and intelligent automation
technologies. It is important that the current and future workforce are provided with relevant
opportunities to reskills and upskill themselves to keep up with the demands of the industry.
Skills Build presents a unique opportunity for all learners worldwide to meet their demands of
learning. Skills Build is an online learning platform designed to help learners to learn and acquire
technical and professional skills required to excel in Industry. The courses are being designed by
experts across the globe and present an opportunity for learners to earn certificates, work on real-
world projects and get industry mentorships.
According to a recent McKinsey Global Institute report, more than 375 million workers
may need to completely change their skill sets by the year 2030. This would happen because of
newer technologies such as digitization, AI (artificial intelligence) and automation disrupting the
world of work. As a result, a number of employees are focusing to pursue additional degrees and
certifications in these technologies, either through self-finance or by taking loan for short term
courses.
Edunet Foundation has been the IBM partner for Skills Build since the inception of the
program in India in March 2020 and has been instrumental in mobilizing learners, training and
supporting a network of NGO and government partners to enable their learners on platform.
Edunet Foundation continues to be the anchor partner for all the NGO network of Skills Build
and supports IBM to manage the partnerships and metrics in the program.

1.7 IBM Skills Build – Self-Paced Curated Learning


Curated Role Based Learning with Periodic Live Sessions – Rewards with professionally
recognized badges and certificates. IBM SkillsBuild is a free digital platform that gives every
adult the opportunity to develop technology and professional skills regardless of their
background, education, or life experiences. It has a global presence with 323k learners across
143 countries have completed over 2 million hours of training. 81% of learners stated greater
confidence and preparation for their professional future. The platform is home to over 10,000+
courses organized and delivered to learners as per their preferences and professional journey. In
India, IBM’s network of implementation partners has on-boarded 8 Lakh learners with over 9
lakh courses completed.

Dept. of CS&E, JNNCE 4


Innovation/ Entrepreneurship Internship Report

1.7.1 Project Based Learning


Hands-on experiential learning camps with two levels of intensity. Blended teaching sessions
with industry experts and an opportunity to work in teams to solve real-world challenges. The
application of skills is an essential part of skill acquisition. The project-based learning Boot
Camps and innovation camps are designed to allow learners to demonstrate their learnings
from the e-learning platform.
The Boot Camp is a Two-Day workshop on core Skills Build topics on new age
technologies. The expert-led session is an excellent opportunity for students to explore emerging
technologies, clear doubts and learn about career opportunities. The Innovation Camp
Internship is a four to six week program, providing students the opportunity to demonstrate
and create solutions to real-world problems using the technologies explored via Skills Build, that
too in groups and teams. Top projects are recognized and the teams are rewarded.

Dept. of CS&E, JNNCE 5


Innovation/ Entrepreneurship Internship Report

Chapter-2
Skills Learnt
In the digital era, where nearly every aspect of our lives relies on interconnected systems,
cyber security skills have become indispensable. The ability to protect sensitive data, mitigate
cyber threats, and ensure the integrity of digital infrastructure is crucial for businesses,
governments, and individuals alike. This paper delves into the essential cyber security skills
across technical and non-technical domains, highlighting their significance and application in
today's complex cyber landscape. The scope of this report encompasses an in-depth
examination of cyber security skills, their practical application in an internship setting, and the
challenges faced by interns in developing these competencies. The objectives are to provide
interns with a comprehensive understanding of the skills necessary for a career in cyber security
and to offer insights into their application within organizational contexts.

2.1 Fundamentals of Cyber Security


Cyber security fundamentals encompass a broad range of foundational knowledge and
principles essential for understanding and implementing effective security measures:

Threat Landscapes: Cyber threats are diverse and constantly evolving. Understanding
the current threat landscape involves knowing the types of threats organizations face
(e.g., malware, social engineering, insider threats) and the tactics, techniques, and
procedures (TTPs) employed by attackers. This knowledge allows cyber security
professionals to prioritize defenses and allocate resources effectively.
Encryption Techniques: Encryption is crucial for protecting sensitive data in transit
and at rest. Knowledge of encryption algorithms (e.g., AES, RSA), cryptographic
protocols (e.g., TLS/SSL), and key management practices ensures that data remains
confidential and integrity is maintained.
Risk Assessment Methodologies: Risk assessment involves identifying and analyzing
vulnerabilities, threats, and potential impacts on organizational assets. Skills in risk
assessment methodologies (e.g., qualitative vs. quantitative risk assessment, risk
scoring models) enable professionals to prioritize security measures based on risk levels
and organizational priorities.

Dept. of CS&E, JNNCE 6


Innovation/ Entrepreneurship Internship Report

A solid understanding of these fundamentals forms the basis for developing and
implementing comprehensive cyber security strategies tailored to organizational needs.

2.2 Technical Proficiency


Technical skills are essential for implementing and managing security controls,
conducting assessments, and responding to incidents effectively:
Network Security: Proficiency in network security includes configuring firewalls,
intrusion detection/prevention systems (IDS/IPS), VPNs, and secure network protocols
(e.g., IPsec, SSH) to protect against unauthorized access, data exfiltration, and network-
based attacks.
Operating Systems Knowledge: Understanding the security features and vulnerabilities
of operating systems (e.g., Linux, Windows, macOS) is critical for configuring secure
system settings, applying patches and updates, and implementing access controls to
mitigate security risks.
Ethical Hacking and Penetration Testing: Ethical hackers (also known as penetration
testers) simulate cyber attacks to identify and exploit vulnerabilities in systems,
networks, and applications. Skills in using penetration testing tools and techniques (e.g.,
Metasploit, Burp Suite) enable professionals to assess security posture and recommend
remediation actions.

2.3 Essential Cyber Security Skills


The following are the technical Skills:
Network Security: Proficiency in network security involves understanding network
architecture, protocols, and security measures such as firewalls, intrusion detection
systems (IDS), and virtual private networks (VPNs). It also includes the ability to
configure and monitor network defences to detect and prevent unauthorized access and
breaches.
Incident Response: The ability to detect, analyze, and respond to cyber security
incidents is crucial for minimizing the impact of security breaches and preventing their
recurrence. Incident response skills involve promptly identifying the source and nature
of an attack, containing its spread, and implementing remediation measures to restore
system integrity and functionality.

Dept. of CS&E, JNNCE 7


Innovation/ Entrepreneurship Internship Report

Cryptography: Knowledge of cryptographic principles, algorithms, and protocols is


essential for securing sensitive data, communications, and transactions. Cryptography
skills enable cyber security professionals to encrypt data to protect its confidentiality,
integrity, and authenticity, thereby thwarting unauthorized access and tampering
attempts.
Penetration Testing: Proficiency in penetration testing, or ethical hacking, involves
conducting controlled assessments to identify vulnerabilities in systems, networks, and
applications. Penetration testers simulate real-world cyber attacks to evaluate the
effectiveness of existing security controls and recommend remediation measures to
strengthen defences against potential threats.

Following are the additional skills


Problem-Solving: Effective problem-solving skills are critical for cyber security
professionals to analyze complex issues, identify root causes of security incidents, and
devise innovative solutions to mitigate risks and vulnerabilities. Strong problem-
solving abilities enable professionals to respond swiftly to emerging cyber threats and
adapt security measures to changing threat landscapes.
Communication: Clear and concise communication skills are essential for effectively
conveying technical information, security risks, and mitigation strategies to diverse
stakeholders, including non-technical personnel, executives, and clients. Effective
communication fosters collaboration within cross-functional teams and facilitates
informed decision-making regarding cyber security initiatives and investments.
Analytical Thinking: Analytical thinking skills enable cyber security professionals to
evaluate data, trends, and patterns to anticipate potential threats, identify emerging
risks, and proactively implement preventive measures. Critical analysis of cyber
security incidents and vulnerabilities enables professionals to develop strategic security
plans and enhance organizational resilience against evolving cyber threats

2.4 Incident Response and Management


Incident response and management skills are crucial for minimizing the impact of
security incidents and ensuring swift recovery:

Dept. of CS&E, JNNCE 8


Innovation/ Entrepreneurship Internship Report

Detection and Analysis: Detecting security incidents involves monitoring network


traffic, logs, and system alerts for signs of unauthorized access or malicious activity.
Skills in security monitoring tools (e.g., SIEM platforms, network analyzers) and threat
intelligence enable timely detection and analysis of security incidents.
Containment and Eradication: Once an incident is detected, containment measures
are implemented to prevent further spread of the attack. This may involve isolating
affected systems, disabling compromised accounts, or blocking malicious IP addresses.
Eradication involves removing malicious code, backdoors, or unauthorized access
points from systems.
Recovery and Remediation: Recovery plans are executed to restore affected systems
and data to normal operations. This includes restoring from backups, rebuilding
compromised systems, and applying patches or updates to prevent recurrence.
Remediation actions address underlying vulnerabilities to strengthen defenses and
prevent similar incidents in the future.
Communication and Reporting: Effective communication during incident response
involves notifying stakeholders (e.g., executives, legal counsel, customers) about the
incident, its impact, and ongoing mitigation efforts. Incident reports document the
incident timeline, response actions taken, lessons learned, and recommendations for
improving security posture.
Proficiency in incident response and management ensures organizations can mitigate the
impact of security incidents efficiently, minimize downtime, and preserve the integrity
and confidentiality of data.

2.5 Continuous Learning and Adaptation


Cybersecurity professionals must continuously update their knowledge and skills to
keep pace with evolving threats and technologies:
Professional Development: Pursuing industry certifications (e.g., CISSP, CISM, CEH)
demonstrates expertise and commitment to maintaining high standards of cyber
security. Continuous education and training programs (e.g., workshops, webinars,
online courses) keep professionals informed about new threats, technologies, and best
practices.
Research and Awareness: Staying abreast of emerging threats, vulnerabilities, and
attack vectors through industry publications, threat intelligence reports, and research

Dept. of CS&E, JNNCE 9


Innovation/ Entrepreneurship Internship Report

papers enables proactive defense strategies. Participating in cyber security


communities, forums, and conferences facilitates knowledge sharing and collaboration
with peers.
Adaptability: Adapting security strategies and controls to address new threats and
technologies requires agility and flexibility. Regularly updating security policies,
conducting security assessments, and implementing emerging technologies (e.g.,
artificial intelligence, machine learning) enhance defense capabilities against evolving
cyber threats.
Collaboration and Community Engagement: Engaging with the broader cyber
security community fosters collaboration, information sharing, and collective defense
efforts. Contributing to open-source projects, participating in bug bounty programs, and
sharing insights through blogs or presentations enriches the community and enhances
individual expertise.

Dept. of CS&E, JNNCE 10


Innovation/ Entrepreneurship Internship Report

Chapter-3
Learning Outcomes
3.1 Steganography

Steganogrphy is the art and science of concealing information within other, seemingly
innocuous data or media to ensure its secrecy and confidentiality. Unlike cryptography, which
focuses on making the content of a message unintelligible to unauthorized parties,
steganography aims to hide the very existence of the message.

Techniques and Methods: Steganography employs various techniques to embed secret


information into cover objects, which can be images, audio files, video files, or even text. The
goal is to make alterations to the cover object that are imperceptible to human senses or
statistical tests, ensuring that the embedded information remains hidden.

Image Steganography: In image steganography, secret data is embedded into digital images
by subtly modifying the color values of pixels. Techniques such as Least Significant Bit (LSB)
insertion involve replacing the least significant bits of pixels with secret data bits without
noticeably altering the image's appearance. Other methods include masking and filtering
approaches that embed data in the frequency domain of the image, further concealing the
embedded information.

Audio and Video Steganography: Steganographic techniques can also be applied to audio and
video files. In audio steganography, imperceptible modifications can be made to audio samples
or frequencies to embed hidden messages. Video steganography involves manipulating video
frames or frames' attributes to hide information, utilizing similar principles of imperceptibility
to maintain the covertness of the embedded data.

Text Steganography: Even text can serve as a cover for steganographic messages. Techniques
may involve subtly altering spacing, punctuation, or word choice to encode hidden information.
For instance, using invisible ink or embedding messages within seemingly innocuous
documents through carefully selected fonts or formatting changes can effectively hide
information in plain sight.

Dept. of CS&E, JNNCE 11


Innovation/ Entrepreneurship Internship Report

3.2 Text message hiding techniques in Steganography


Steganography, the art of concealing messages within seemingly innocuous data or
communication, offers various techniques for hiding text messages effectively. One prevalent
method involves embedding messages within text documents by utilizing whitespace or
formatting. In this technique, the secret message is encoded within spaces, tabs, or even within
the arrangement of paragraphs and lines. By carefully manipulating these elements,
steganographers can embed information without altering the visible content's readability or
appearance. This approach leverages the natural variability and flexibility in text formatting,
making detection challenging without knowledge of where and how the message is hidden.
Another method in text steganography utilizes subtle alterations in fonts or characters.
For instance, slight adjustments in font size, kerning (spacing between characters), or even the
choice of font itself can encode bits of information. These changes are often imperceptible to
the naked eye but can be decoded using specific algorithms or knowledge of the encoding
scheme. This technique capitalizes on the vast array of typographical nuances available,
ensuring that the hidden message remains deeply embedded within the visual structure of the
text.
In the realm of digital images, steganography involves hiding text messages within the
pixels of an image. One common approach is to modify the least significant bits (LSBs) of the
color values in the image. Since changes in LSBs have minimal impact on the image's visual
quality, they can be used to encode binary data representing text messages. By strategically
altering these LSBs across multiple pixels or specific regions of the image, steganographers
can embed substantial amounts of text while preserving the image's overall appearance.
Additionally, steganography extends beyond textual formats to include hiding messages
in the metadata of files. Metadata, such as timestamps, author information, or other descriptive
tags, can be subtly modified to encode additional information. This method exploits the often-
overlooked data associated with files, providing another layer of concealment that can evade
detection by conventional means.

Dept. of CS&E, JNNCE 12


Innovation/ Entrepreneurship Internship Report

3.3 Message hiding project

Encryption Algorithm:
Step 1: Import Libraries
Step 2: Function Definition
Step 3: Load Image
Step 4: Get Pixel Data
Step 5: Convert Message and Password to Binary
Step 6: Concatenate Password and Message
Step 7: Check Message Length
Step 8: Embedding Process
Step 9: Create Encrypted Image
Step 10: Save Encrypted Image

Decryption Algorithm:
Step 1: Function Definition
Step 2: Load Encrypted Image
Step 3: Get Encrypted Pixels
Step 4: Extract Password from Image
Step 5: Extract Message from Image
Step 6: Convert Binary Message to Text
Step 7: Return Decrypted Password and Message
Step 8: Print the message

Dept. of CS&E, JNNCE 13


Innovation/ Entrepreneurship Internship Report

3.4 The Program

Dept. of CS&E, JNNCE 14


Innovation/ Entrepreneurship Internship Report

3.5 Results

a. Original image: b. Encrypted image:


Size: 367 KB (3,76,278 bytes) Size: 75.6 KB (77,434 bytes)

Figure 3.1 Output of the program

3.6 Soft skills learnt


Cyber security professionals rely not only on technical expertise but also on a range of
essential soft skills that are critical for success in the field. These skills enhance their ability to
communicate effectively, collaborate with others, manage crises, and navigate complex
situations. Here are several key soft skills that are particularly valuable in cybersecurity:
Communication: Clear and effective communication is crucial in cybersecurity.
Professionals must explain complex technical concepts to non-technical stakeholders,
articulate security risks and strategies to decision-makers, and collaborate with team
members effectively. Good communication skills also aid in writing comprehensive
reports, documenting incidents, and presenting findings to various audiences.

Dept. of CS&E, JNNCE 15


Innovation/ Entrepreneurship Internship Report

Problem-Solving: Cyber security often involves encountering novel challenges and


threats that require creative problem-solving skills. Professionals need to analyze
incidents, identify vulnerabilities, and develop innovative solutions to protect systems
and data. Strong problem-solving skills help in troubleshooting technical issues and
devising robust security measures.

Critical Thinking: The ability to think critically is essential for cybersecurity


professionals to evaluate information, assess risks, and make informed decisions. They
must analyze complex situations, weigh different factors, and anticipate potential
consequences of security measures or actions taken.

Adaptability: The cyber security landscape is constantly evolving with new threats,
technologies, and regulations. Professionals must adapt quickly to changes, update their
skills and knowledge, and implement new security protocols effectively. Being
adaptable allows them to respond promptly to emerging threats and protect against
evolving cybersecurity risks.

Teamwork and Collaboration: Cybersecurity is rarely a solo endeavor; it often


requires collaboration across teams and departments. Professionals must work
effectively in teams, share information, coordinate responses to incidents, and
collaborate with colleagues who may have different areas of expertise. Strong teamwork
skills help in fostering a cohesive cybersecurity strategy within organizations.

Attention to Detail: In cybersecurity, meticulous attention to detail is critical to


identifying vulnerabilities, detecting suspicious activities, and analyzing security logs.
Professionals must meticulously review code, configurations, and security policies to
ensure comprehensive protection against potential threats.

Time Management and Prioritization: The ability to manage time effectively and
prioritize tasks is essential in cybersecurity, where incidents and threats require prompt
attention. Professionals must balance ongoing monitoring and maintenance tasks with
responding to urgent incidents and implementing proactive security measures.

Dept. of CS&E, JNNCE 16


Innovation/ Entrepreneurship Internship Report

Chapter-4
Conclusion

Steganography, the practice of concealing information within other non-secret data, stands as
a testament to the ingenuity of human communication across centuries and into the digital age.
Originally employed for covert communication in ancient Greece and during wartime, modern
steganography has found renewed relevance in digital media. By embedding messages within
images, audio files, or even text, steganography provides a subtle yet powerful means to
safeguard sensitive information from unauthorized access. However, this technique also raises
ethical concerns regarding its potential misuse for malicious purposes, such as cybercrime or
espionage. As technologies evolve, so do steganographic methods, challenging cyber security
professionals and law enforcement agencies alike to stay ahead in detecting and countering
such covert communications. Despite these challenges, steganography remains a vital tool in
digital forensics and data protection, highlighting its dual role in both safeguarding privacy and
posing challenges to security in the interconnected world of today.

Dept. of CS&E, JNNCE 17


Innovation/ Entrepreneurship Internship Report

References

[1]. Johnson, Neil F. "Steganography."


Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web.
[2]. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in
Computer Science and Software Engineering. "Http://www.ijarcsse.com/. N.p., Sept.
2014. Web.
[3]. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to
Steganography.” IEEE Security & Privacy Magazine, May-June 2013. Web.
[4]. Nick Nabavian. “Image steganography” Nov. 28, 2007.

http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganography.pdf
[5]. Deepak Singla, and Rupali Syal. "International Journal of Computational
Engineering
Research." Citeseerx.ist.psu.edu. N.p., Mar-Apr. 2012. Web.

Dept. of CS&E, JNNCE 18

You might also like