0% found this document useful (0 votes)
16 views12 pages

Cyber Security Intern Ship

The document outlines a series of cybersecurity tasks performed by B. Keerthi during an internship at SkillDzire, including network security assessments, firewall optimization, IDS setup, and employee training. Each task includes objectives, activities, and outcomes, highlighting improvements in security measures and employee awareness. Recommendations for future work emphasize the need for automated threat detection and continuous employee training on emerging cyber threats.

Uploaded by

Keerthi bolimera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views12 pages

Cyber Security Intern Ship

The document outlines a series of cybersecurity tasks performed by B. Keerthi during an internship at SkillDzire, including network security assessments, firewall optimization, IDS setup, and employee training. Each task includes objectives, activities, and outcomes, highlighting improvements in security measures and employee awareness. Recommendations for future work emphasize the need for automated threat detection and continuous employee training on emerging cyber threats.

Uploaded by

Keerthi bolimera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber Security Tools and Methods

Name: B. Keerthi(21F01A4605)
Company Name: SkillDzire
Date:18-11-2024
Cyber Security Tasks:

Task 1 – Network Security Assessment

Objective: Conducting a security assessment of the company’s


internal network.

Activities:
Scanned network for vulnerabilities using tools like Nmap and
Nessus.
Analyzed network traffic to identify potential security gaps.

Outcome: Identified critical vulnerabilities in network configuration


and made recommendations
Task 2 – Firewall Configuration and Optimization

Objective: Configuring and optimizing firewalls to improve network


security.

Activities:
Configured firewall rules to block unauthorized traffic.
Fine-tuned existing firewall settings based on traffic analysis.

Outcome: Reduced unauthorized access attempts by 30% an


Task 3 – Intrusion Detection System (IDS) Setup

Objective: Setting up an IDS to monitor network traffic and detect threats.

Activities:
Installed and configured Snort IDS to monitor suspicious activities.
Fine-tuned alerts to avoid false positives.

Outcome:
Successfully detected and blocked several intrusion attempts during testing.
Task 4 – Vulnerability Assessment and Penetration Testing

Objective:
Identifying security weaknesses in systems and applications.

Activities:
Performed vulnerability scanning using OpenVAS.
Conducted penetration tests on internal systems and web applications.

Outcome:
Discovered critical vulnerabilities that were addressed before production deployment.
Task 5 – Security Awareness Training

Objective:
Educating employees on best practices for cybersecurity.

Activities:
Created and delivered a cybersecurity awareness training session.
Focused on phishing prevention, password policies, and secure browsing.

Outcome:
Increased employee awareness, with phishing attacks decreasing by 40%.
Task 6 – Incident Response Simulation

Objective: Simulating a cybersecurity incident and developing response strategies.

Activities:
Participated in an incident response drill involving a ransomware attack scenario.
Collaborated with the team to identify affected systems and contain the threat.

Outcome:
Developed and implemented an improved incident response plan for the company.
Task 7 – Security Patch Management

Objective:
Ensuring all company systems are up-to-date with the latest security patches.

Activities:
Reviewed software versions and applied security patches for operating systems and applications.
Automated patch management process using WSUS and custom scripts.

Outcome:
Reduced security risks by ensuring all systems were patched regularly.
Task 8 – Malware Analysis and Prevention

Objective:
Analyzing and mitigating malware threats.

Activities:
Analyzed malware samples in a controlled environment using tools like Cuckoo Sandbox.
Developed prevention strategies to detect and block similar malware in the future

Outcome:
Improved company malware detection systems, reducing malware-related incidents by 50%.
Task 9 – Security Audit and Reporting

Objective:
Conducting a comprehensive security audit of the organization.

Activities:
Audited security policies, user access controls, and network configurations.
Prepared a detailed security audit report with actionable recommendations.

Outcome:
Identified and corrected policy gaps that improved overall system security.
Conclusion
Summary:
During my internship, I gained hands-on experience in various aspects of cybersecurity, from network security and vulnerability assessments to incident response and security patch management.

Future Work:
Moving forward, I recommend further improvements in automated threat detection, multi-factor authentication, and a more robust disaster recovery plan.

Recommendations:
Continuous employee training to stay updated on emerging cyber threats.
.
References
•Books:
•"The Web Application Hacker's Handbook" by Dafydd Stuttard and
Marcus Pinto.
•"Network Security Essentials" by William Stallings.
•Tools:
•Nmap: https://nmap.org
•Snort IDS: https://snort.org
•Nessus: https://www.tenable.com/products/nessus
•Websites:
•OWASP: https://www.owasp.org
•SANS Institute: https://www.sans.org

You might also like