SRR Internship-Report-sample
SRR Internship-Report-sample
SRR Internship-Report-sample
Under Supervision of
CERTIFICATE
This is to certify that the “Short – Term Internship report” on CYBER SECURITY submitted by S.
RAASHEED RABBANI (Regd. No.: 20AM1A0537) is a bonafide work done by him and submitted
during 2023 - 2024 academic year, in partial fulfillment of the requirements for the award of the degree of
BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING, at PALO
ALTO Networks.
Signature of HOD
Head of the Department
Assistant Professor & HOD, Dept. Of CSE
Virtual Internship Cybersecurity
Internship on “CYBERSECURITY”
Name of the Student : S. Raasheed Rabbani
Regd. Number : 20AM1A0537
Department : CSE
Program : BTech
Regulation : R20
Year & Semester : IV BTech – I Semester
Duration : 10/05/2023 - 25/06/2023
Domain : Cyber Security
Supported by : Palo Alto Networks, Edu Skills
Type of Internship : Virtual (Online)
Date of Submission :
Student’s Declaration
I, SYED. RAASHEED RABBANI, a student of B. Tech Program, Reg. No. 20AM1A0537 of the
Department of COMPUTER SCIENCE AND ENGINEERING, SVR ENGINEERING
COLLEGE do hereby declare that I have completed the mandatory Virtual Internship from MAY
2023 to JULY 2023 in AICTE-EDUSKILLS FOUNDATION under the Faculty Guideship of
Mrs. G. RAGA JYOTHI MTech, Department of Computer Science & Engineering, at SVR
ENGINEERING COLLEGE.
Endorsements
Faculty Guide
Principal
SVREC 0
Virtual Internship Cybersecurity
SVREC 1
Virtual Internship Cybersecurity
SVREC 2
Virtual Internship Cybersecurity
5 Modern Tool Usage Create, select, and apply appropriate techniques, resources,
and modern engineering and IT tools including prediction and
modelling to complex engineering activities with an understanding
of the limitations.
6 The Engineer and Apply reasoning informed by the contextual Knowledge to assess
Society societal, health, safety, legal and cultural issues and the consequent
responsibilities relevant to the professional engineering practice.
SVREC 3
Virtual Internship Cybersecurity
ACKNOWLEDGEMENT
An endeavor of a long period can be successful only with the advice of many well-wishers. I take
this opportunity to express my deep gratitude and appreciation to all those who encouraged for
successfully completion of the internship work.
I am thankful to my Guide Mrs. G. Raga Jyothi MTech for her valuable guidance and suggestions
in analyzing and testing throughout the period, till the end of internship work completion.
I would like to thank my Head of the Department M.N. Mallikarjuna Reddy MTech for his
constructive criticism throughout my internship.
It is indeed with a great sense of pleasure and immense sense of gratitude that I acknowledge the
help of these individuals.
I wish to express my sincere gratitude to our Managing Director S. DINESH REDDY and
o u r h o n o r a b l e Principal Dr. P. MALLIKARJUNA REDDY, for the facilities provided to
accomplish this internship.
S. Raasheed Rabbani
(20AM1A0537)
SVREC 4
Virtual Internship Cybersecurity
ABSTRACT
This abstract provides a comprehensive overview of key elements in the field of cybersecurity,
covering fundamental concepts in network security, cloud security, and Security Operations Centers
(SOC) and this course offered by Palo Alto Networks.
▪ The Introduction to cybersecurity sets the stage by emphasizing the increasing importance of
safeguarding digital assets in our interconnected world. As technology evolves, so do the
threats, making it imperative to establish robust security measures.
▪ Fundamentals of network security delve into the core principles of securing communication
channels and data exchange within a network. Topics include encryption, firewalls, and
intrusion detection systems, providing a solid foundation for building secure infrastructures.
▪ Cloud security fundamentals explore the unique challenges posed by cloud computing
environments. As organizations increasingly migrate to the cloud, understanding the
principles of data protection, identity management, and secure access becomes paramount.
▪ The fundamentals of Security Operations Centers (SOC) are crucial in maintaining a proactive
cybersecurity stance. The abstract covers the key components of a SOC, including threat
detection, incident response, and continuous monitoring. It emphasizes the role of skilled
professionals and advanced technologies in identifying and mitigating cyber threats.
In conclusion, this abstract serves as a roadmap for individuals seeking a holistic understanding of
cybersecurity, addressing essential components such as network security, cloud security, and the
operations of a Security Operations Center. This foundation is crucial for building robust and adaptive
cybersecurity strategies in the face of evolving digital threats.
This abstract provides a glimpse into a comprehensive cybersecurity course from Palo Alto Networks,
offering a well-rounded education on next-generation firewall technologies, cloud security, and
proactive defense strategies.
SVREC 5
Virtual Internship Cybersecurity
INDEX
3.INTRODUCTION 12 - 19
4.INTERNSHIP PART 20 - 24
5. GALLERY/ PHOTOS 25 - 28
6.CONCLUSION 29
7.REFERENCES 30
8. EVALUATION PART 31 - 32
SVREC 6
Virtual Internship Cybersecurity
Internships are generally thought of to be reserved for college students looking to gain
experience in a particular field. However, a wide array of people can benefit from Training
Internships in order to receive real world experience and develop their skills.
An objective for this position should emphasize the skills you already possess in the area and
your interest in learning more.
Some internship is used to allow individuals to perform scientific research while others are
specifically designed to allow people to gain first-hand experience working.
Utilizing internships is a great way to build your resume and develop skills that can be
emphasized in your resume for future jobs. When you are applying for a TrainingInternship,
make sure to highlight any special skills or talents that can make you stand apart from the rest
of the applicants so that you have an improved chance of landing the position.
SVREC 7
Virtual Internship Cybersecurity
1. EXECUTIVE SUMMARY
Reporting on the performance of cyber risk and security programs is critical to avoiding
breaches, learning from prior performance, and mitigating risk. Effective communication and
decision making between different levels of an organization – from the practitioners and managers
on the ground to the C-suite and the Board – can be the difference between keeping systems secure
and suffering a massive incident.
Learning Objectives:
• Acquire the skills necessary to detect, analyze, and respond to security incidents with
precision and efficiency.
• Learn how to implement and manage virtual private networks (VPNs) for secure remote
access.
• Develop proficiency in network monitoring and traffic analysis to identify and mitigate
security threats.
• Cultivate strong communication and teamwork skills through collaboration with experts in
the field.
• Gain insights into security best practices, vulnerability management, and threat intelligence.
• Explore potential career paths in network security and cybersecurity, with guidance on
professional development.
SVREC 8
Virtual Internship Cybersecurity
Outcomes Achieved:
• Protection Against Unauthorized Access: Network security measures ensure that only
authorized individuals or devices can access the network and its resources. This prevents
unauthorized users from compromising sensitive data or systems.
• Data Confidentiality: Network security measures, such as encryption, help maintain the
confidentiality of data during transmission and storage, ensuring that sensitive information
remains private.
• Data Integrity: Network security safeguards prevent data from being tampered with during
transmission or storage, ensuring that data remains accurate and unaltered.
• Availability: A well-implemented network security strategy ensures that network resources
and services are available when needed. This reduces downtime due to cyber-attacks or
other disruptions.
• Prevention of Malware and Viruses: Network security tools, such as firewalls and
antivirus software, can detect and block malware and viruses, preventing them from
infecting devices and spreading through the network.
• Protection Against Insider Threats: Network security measures can also monitor and
detect suspicious activities by authorized users, helping to mitigate the risk of insider
threats.
• Detection and Mitigation of Cyber Threats: Network security solutions, such as intrusion
detection and prevention systems (IDPS), can identify and respond to cyber threats in real-
time, helping to minimize the impact of attacks.
• Compliance with Regulations: Effective network security measures help organizations
comply with industry-specific regulations and data protection laws, reducing legal and
financial risks.
• Business Continuity: Network security measures contribute to business continuity by
preventing disruptions caused by security incidents, ensuring that operations can continue
without major interruptions.
• Cost Savings: While investing in network security solutions can have upfront costs, the
long-term outcome is often cost savings. Preventing security breaches and data breaches
can save organizations significant financial and reputational.
SVREC 9
Virtual Internship Cybersecurity
1. Products and Services: Palo Alto Networks offers a range of cybersecurity products
and services, including next-generation firewalls, cloud security, endpoint protection, threat
intelligence, and security analytics.
2. Next-Generation Firewall (NGFW): Their NGFW technology is a key product,
providing advanced features such as application visibility and control, intrusion prevention, and
user-based policies to protect against evolving cyber threats.
3. Cloud Security: Palo Alto Networks has expanded its offerings to address cloud
security challenges. Their Prisma Cloud platform provides security for cloud-native
applications, ensuring the protection of data and workloads in cloud environments.
4. Global Reach: The company has a global presence and serves organizations of all
sizes, from small businesses to large enterprises, across various industries.
5. Threat Intelligence: Palo Alto Networks operates a threat intelligence platform called
Unit 42, which conducts research on emerging threats and provides insights to the cybersecurity
community.
6. Cybersecurity Ecosystem: Palo Alto Networks actively engages in building a holistic
cybersecurity ecosystem. This involves integration with other cybersecurity tools and
technologies to create a unified defense strategy. Their focus on interoperability allows
organizations to enhance their overall security posture.
SVREC 10
Virtual Internship Cybersecurity
SVREC 11
Virtual Internship Cybersecurity
3.INTRODUCTION
AI and machine learning are two related technologies that enable systems to understand and
act on information in much the same way that a human might use information. AI acquires
and applies knowledge to find the most optimal solution, decision, or course of action.
Machine learning is a subset of AI that applies algorithms to large datasets to discover
common patterns in the data that can then be used to improve the performance the system.
SVREC 12
Virtual Internship Cybersecurity
To effectively protect their networks and cloud environments, enterprise security teams must
manage the risks associated with a relatively limited, known set of core applications, as well
as the risks associated with an ever-increasing number of known and unknown cloud-based
applications. The cloud-based application consumption model has revolutionized the way
organizations do business, and applications such as Microsoft Office365 and Salesforce.
Data is located everywhere in today’s enterprise networks, including in many locations that
are not under the organization’s control. New data security challenges emerge for
organizations that permit SaaS use in their networks. With SaaS applications, data is often
stored where the application resides – in the cloud.
SVREC 13
Virtual Internship Cybersecurity
Thus, the data is no longer under the organization’s control, and visibility is often lost. SaaS
vendors do their best to protect the in their applications, but it is ultimately not their
responsibility. Just as in any other part data of the network, the IT team is responsible for
protecting and controlling the data, regardless of the location.
The cyberattack lifecycle illustrates the sequence of events that an attacker goes through to
infiltrate a network and exfiltrate (or steal) valuable data. Blocking just one step breaks the
chain and can effectively defend an organization’s network and data against an attack.
Malicious Outsiders
The most common source of breaches for networks overall is also a critical concern for SaaS
security. The SaaS application becomes a new threat vector and distribution point for
malware used by external adversaries. Some malware will even target the SaaS applications
themselves, for example, retrieved by anyone.
Cyberattack Types
Attackers use a variety of techniques and attack types to achieve their objectives. Malware
and exploits are integral to the modern cyberattack strategy. This lesson describes the
different malware types and properties, the relationship between vulnerabilities and exploits,
and how modern malware plays a central role in a coordinated attack against a target. This
lesson also explains the timeline of eliminate vulnerability.
SVREC 14
Virtual Internship Cybersecurity
Modern malware can be updated—just like any other software application—so that an
attacker can change course and dig deeper into the network or make changes and enact
countermeasures. This is a fundamental shift compared to earlier types of malwares, which
were generally independent agents that simply infected and replicated themselves.
Patching Vulnerabilities:
Security patches are developed by software vendors as quickly as possible after a
vulnerability has been discovered in their software.
1. Discovery
An attacker may learn of a vulnerability and begin exploiting it before the software vendor
is aware of the vulnerability or has an opportunity to develop a patch.
SVREC 15
Virtual Internship Cybersecurity
7. Watering Hole
Watering hole attacks compromise websites that are likely to be visited by a targeted victim-
for example, an insurance company website that may be frequently visited by healthcare
providers. The compromised website will typically infect unsuspecting visitors with
malware.
SVREC 16
Virtual Internship Cybersecurity
Example: Lazarus
Attacks against nation-states and corporations are common, and the group of cybercriminals
that may have done the most damage is Lazarus. The Lazarus group is known as an APT.
They were initially known for launching numerous attacks against government and financial
institutions in South Korea & Asia. In more recent years, the Lazarus group has been
targeting banks, casinos, financial investment software developers, & crypto-currency
businesses.
SVREC 17
Virtual Internship Cybersecurity
12. WPA3
WPA3 security enhancements include more robust brute force attack
protection, improved hotspot and guest access security, simpler
integration with devices that have limited or no user interface, and a 192-
bit security suite. Newer Wi- Fi routers and client devices will support
both WPA2 & WPA3 to ensure backward compatibility.
There are different types of Wi-Fi attacks that hackers use to eavesdrop on
wireless network connections to obtain credentials and spread malware.
14. Mainframe Computers
Mainframe computers predate the internet. In fact, mainframe computers predate ARPANET,
which predates the internet. Today, an attacker uses the internet to remotely gain access,
instead of physically breaching the data cent perimeter.
15. Processing Power
The primary value of the mainframe computer was its processing power. The relatively
limited data that was produced was typically stored on near-line media, such as tape.
16. Data Center
Data centers today are remotely accessed by millions of remote endpoint devices from
anywhere and at any time. Unlike the RJEs of the mainframe era, modern endpoints
(including mobile devices) are far more powerful than many of the early mainframe
computers and are themselves targets.
17. Conceptual Architecture
With the protect surface identified, security teams can identify
how traffic moves across the organization in relation to the protect
surface. Understanding who the users are, which applications they
are using, and how they are connecting is the only way to
determine and enforce policy that ensures secure access to data.
SVREC 18
Virtual Internship Cybersecurity
Routing protocols are defined at the Network layer of the OSI model and specify how routers
communicate with one another on a network. Routing protocols can either be static or
dynamic.
19. Static Routing
A static routing protocol requires that routes be created and updated manually on a router or
other network device. If a static route is down, traffic can’t be automatically rerouted unless
an alternate route has been configured. Also, if the route is congested, traffic can’t be
automatically rerouted over the less congested alternate route.
22. LANs
A LAN is a computer network that connects end-user devices such as
laptop and desktop computers, servers, printers, and other devices so that applications,
databases, files, etc., can be shared among authorized users on the LAN. A LAN can be
wired, wireless, or a combination of wired and wireless. Examples of networking equipment
commonly used in LANs include bridges, hubs, repeaters, switches, and wireless APs. Two
basic network topologies are commonly used in LANs are Star topology and Mesh topology.
SVREC 19
Virtual Internship Cybersecurity
4. INTERNSHIP PART
This Internship consists of 4 Modules:
1.Introduction to Cyber security
And each module consists of lessons which provides in details of each module explain.
Cybersecurity can be divided into several categories such as network security, application security,
information security, operational security, disaster recovery and business continuity, and end-user
education.
• Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
• Application security focuses on keeping software and devices free of threats. A compromised
application could provide access to the data it’s designed to protect. Successful security begins
in the design stage, well before a program or device is deployed.
• Information security protects the integrity and privacy of data, both in storage and in transit.
• Operational security includes the processes and decisions for handling and protecting data
assets. The permissions users have when accessed a network and the procedures that determine
how and where data may be stored or shared all fall under this umbrella.
• Disaster recovery and business continuity define how an organization responds to a cyber-
security incident or any other event that causes the loss of operations or data. Disaster recovery
policies dictate how the organization restores its operations and information to return to the same
operating capacity as before the event. Business continuity is the plan the organization falls back
on while trying to operate without certain resources.
SVREC 20
Virtual Internship Cybersecurity
• End-user education addresses the most unpredictable cyber-security factor: people. Anyone
can accidentally introduce a virus to an otherwise secure system by failing to follow good security
practices.
4.2: Fundamentals of Network Security
Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware. It involves taking preventative measures to protect the
underlying networking infrastructure from unauthorized access, misuse, malfunction, modification,
destruction or improper disclosure .The fundamentals of network security include detection,
protection, and response .Here are some key concepts:
1.Data Protection: Network security safeguards sensitive data from unauthorized access, ensuring
confidentiality and integrity of information.
2.Preventing Unauthorized Access: It prevents unauthorized users from accessing private networks
and systems, keeping malicious actors at bay.
3.Business Continuity: Network security measures prevent disruptions in business operations caused
by cyberattacks, ensuring smooth functioning.
4.Maintaining Customer Trust: Strong network security builds trust among customers, assuring
them that their data is safe and protected.
5.Compliance: Many industries have regulatory requirements regarding data protection. Network
security helps in complying with these regulations, avoiding legal consequences.
• Access control: This is the practice of restricting access to a cloud or specific resources within
a cloud to authorized users only. Access control can be implemented using various methods such
as passwords, biometric authentication, and smart cards .
• Firewalls: A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules hardware based.
SVREC 21
Virtual Internship Cybersecurity
• Virtual Private Networks (VPNs): A VPN is a secure connection between two networks
over the internet. VPNs are used to provide secure remote access to an organization’s network
resources .
• Intrusion Detection System (IDS): An IDS is a network security system that monitors
network traffic for signs of malicious activity and alerts the system administrator when it detects
such activity. IDSs can be hardware-based or software-based .
A Security Operations Center (SOC) is a centralized function within an organization that employs
people, processes, and technology to continuously monitor and improve an organization’s security
posture while preventing, detecting, analyzing, and responding to cybersecurity incidents .
It is an environment or physical facility where various security experts monitor and control enterprise
systems and networks, prevent security breaches and identify and mitigate security threats
proactively. SOC activities and responsibilities fall into three general categories: asset inventory,
routine maintenance and preparation, and incident response planning .
Here are some key concepts:
• Asset inventory: An SOC needs to maintain an exhaustive inventory of everything that needs
to be protected, inside or outside the data center (e.g. applications, databases, servers, cloud
services, endpoints, etc.) and all the tools used to protect them (firewalls, antivirus/, monitoring
software, etc.). Many SOCs will use an asset discovery solution for this task.
• Routine maintenance and preparation: To maximize the effectiveness of security tools and
measures in place, the SOC performs preventative maintenance such as applying software patches
and upgrades, and continually updating firewalls, security policies and procedures. The SOC may
also create system back-ups to ensure business continuity in the event of a data breach, ransomware
attack or other cybersecurity incident.
SVREC 22
Virtual Internship Cybersecurity
SVREC 23
Virtual Internship Cybersecurity
SVREC 24
Virtual Internship Cybersecurity
5. GALLERY /PHOTOS
SVREC 25
Virtual Internship Cybersecurity
SVREC 26
Virtual Internship Cybersecurity
6.CONCLUSION
Cybersecurity is the practice of protecting computer systems, networks, and data from theft,
damage, or unauthorized access. It involves a range of measures and technologies to safeguard
digital assets, including:
Cyber security is the critical practice of protecting the vast and interconnected digital ecosystem
that powers our modern world. In an era defined by rapid technological advancements and
increasing digital reliance, the importance of cyber security cannot be overstated.
• The Future of Cyber security: Looking ahead, cyber security will continue to evolve to
meet emerging challenges. Artificial intelligence and machine learning will enhance threat
detection and response. Zero-trust models will become more prevalent, emphasizing a
"never trust, always verify" approach to security. International collaboration and
regulations will play a crucial role in addressing global cyber threats.
SVREC Pg.27
Virtual Internship Cybersecurity
7. REFERENCES
The following books are referred during the analysis and execution phase of the project
• Kaspersky : https://www.kaspersky.co.in/resource-center/
SVREC Pg.28
Virtual Internship Cybersecurity
o Please note that your evaluation shall be done independent of the student’s self-evaluation
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Proactiveness 1 2 3 4 5
4) Interaction ability with community 1 2 3 4 5
5) Positive Attitude 1 2 3 4 5
6) Self-Confidence 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
8) Work plan and Organization 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
11) Quality of work done 1 2 3 4 5
12) Time management 1 2 3 4 5
13) Understanding the Community 1 2 3 4 5
14) Achievement of Desired Outcomes 1 2 3 4 5
15) Overall Performance 1 2 3 4 5
SVREC Pg.29
Virtual Internship Cybersecurity
o Please note that your evaluation shall be done independent of the student’s self-evaluation
1) Oral Communication 1 2 3 4 5
2) Written Communication 1 2 3 4 5
3) Proactiveness 1 2 3 4 5
4) Interaction ability with community 1 2 3 4 5
5) Positive Attitude 1 2 3 4 5
6) Self-Confidence 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
8) Work plan and Organization 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
11) Quality of work done 1 2 3 4 5
12) Time management 1 2 3 4 5
13) Understanding the Community 1 2 3 4 5
14) Achievement of Desired Outcomes 1 2 3 4 5
15) Overall Performance 1 2 3 4 5
SVREC Pg.30