Professional Documents
Culture Documents
1KS17EC040 - G S Surabhi - Internship Report
1KS17EC040 - G S Surabhi - Internship Report
A
INTERNSHIP REPORT ON
“Cyber Security and Ethical Hacking”
By
G S SURABHI : 1KS17EC040
BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
Carried out at
Knowledge Solutions India
K. S. INSTITUTE OF TECHNOLOGY
#14, Raghuvanahalli, Kanakapura main road,
Bangalore – 560109
2020-2021
K. S. INSTITUTE OF TECHNOLOGY
#14, Raghuvanahalli, Kanakapura Main road,
Bangalore – 560062
Certificate
Carried out by
G S SURABHI: 1KS17EC040
is a bonafide work done at Knowledge Solutions India in partial fulfillment for the award of
Bachelor of Engineering Degree in Electronics and Communication from Visvesvaraya
Technological University, Belgaum during the year 2020-2021. It is certified that all
corrections and suggestions indicated during internal assessment have been incorporated in the
report deposited in the department library. The Internship report has been approved as it
satisfies the academic requirements in respect of Work prescribed for Bachelor of
Engineering Degree.
EXTERNAL VIVA:
1.
2.
ACKNOWLEDGEMENT
Any internship requires guidance, hard work and co-ordinators help. It gives great
pleasure to acknowledge with thanks to the assistance and contribution of many
individual who had been actively involved at stages of this internship.
I am thankful to our Head of the Department Prof Dr. P. N. Sudha, B.E, M.Tech,
Ph.D, Department of Electronics and Communication Engineering for providing
all guidance, which were vital for this internship.
G S SURABHI
ABSTRACT
The objective of this briefing is to present an overview of cyber security and ethical hacking
techniques. Cyber security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It's also known as information
technology security or electronic information security. The term applies in a variety of
contexts, from business to mobile computing, and can be divided into a few common
categories.Ethical hacking is a process of detecting vulnerabilities in an application, system,
or organization’s infrastructure that an attacker can use to exploit an individual or
organization. They use this process to prevent cyberattacks and security breaches by lawfully
hacking into the systems and looking for weak points.
The evolution of cyber security and some of history’s most notable cyber-attacks. Changes in
cyber security have rapidly advanced. The Morris Worm in 1988 crashed about 10% of the
70,000 internet-connected computers and cost $96 million worth of damage.
With the continued evolution of cyber security, there were viruses that took down major
systems such as the Melissa Virus. Then cyber threats moved on to credit cards and
infiltrating personal information causing great concern for identity theft. As advances in
cyber security protection improved so did advances in cyber-attacks as evidenced by the 2013
Target and 2014 SONY data breaches.
TABLE OF CONTENTS
CHAPTER 1
ABOUT THE COMPANY
1.1 Brief History
Knowledge Solution India is a certification and training company. Being Microsoft
Authorized Education Partners as well as Certiport CATC they offer International
Certifications by Microsoft, Apple, Adobe, EC Council, Autodesk, Quick books etc. and
work closely with Universities and Colleges across the country. KSI has a well-qualified
team of subject matter experts. These professionals have an abundance of experience in
their subjective fields and are also certified themselves. They are passionate about the
subjects they teach and bring this enthusiasm into their webinars and courses. They trained
for information gathering, vulnerability assessment, recognizance, digital forensics, use of
various tools, malware; they have the best technical training delivered across the country.
All their courses start from scratch assuming no prerequisite and their team puts full efforts
to ensure that a candidate completed the program only after acquiring relevant skills.
CHAPTER 2
ABOUT THE DEPARTMENT
2.1 Introduction
The workshop introduces students to cyber security and ethical hacking. They trained for
information gathering, vulnerability assessment, recognizance, digital forensics, use of
various tools, malware. They are passionate about the subjects they teach and bring this
enthusiasm into their webinars and courses. These professionals have an abundance of
experience in their subjective fields and are also certified themselves.
2.1.1 Chronicle:
The evolution of cyber security and some of history’s most notable cyber-attacks. Changes
in cyber security have rapidly advanced. The Morris Worm in 1988 crashed about 10% of
the 70,000 internet-connected computers and cost $96 million worth of damage.
With the continued evolution of cyber security, there were viruses that took down major
systems such as the Melissa Virus. Then cyber threats moved on to credit cards and
infiltrating personal information causing great concern for identity theft. As advanc es in
cyber security protection improved so did advances in cyber-attacks as evidenced by the 2013
Target and 2014 SONY data breaches.
• Data protection – The primary role of Cybersecurity is to protect the confidential data
that is supposed to be accessed by the authorized user only.
• Enforcing CIA – The three features of Cybersecurity: Confidentiality, Integrity, and
Availability, could be enforced by the mean of internet security.
• Mitigate breach risk – The very secure and updated system is very less biased towards
security breaches. It helps the users to protect their data from getting exposed to any of
malicious user or attacker.
• Ensures business continuity – It offers some plan that ensures sustainable business
processes, which could keep the organization’s reputation and ensure that business
should continue without any obstacle.
For implementation of project, I have used virtual machine. I have used Linux system.
Installed ebowla master to create the malware. Ebowla master works only for python 2.
Genetic configure file was used encrypt the virus and then the encrypted malware file was
uploaded in virus total website, where most of the prominent anti malware software’s could
not detect the virus.
Then this encrypted malware file was uploaded in windows machine where it acted as a
spyware, remote control of windows machine through Linux system.
CHAPTER 3
TASK PERFORMED
3.1 Work Plan
In the week 1, this course introduces the Information Security Program. provided with a
basic understanding of the legal and regulatory basis for the program, Information
Security is basically the practice of preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or destruction of information. Computer
network is an interconnection between two or more hosts/computers. The connectivity
can be physical by using cables or virtual using wireless network. Different types
of networks include LAN, WAN, MAN, etc.
In the week 2, Information Gathering in this section, we will discuss various techniques
to gather information about the client using the Whois Lookup, Netcraft, and Robtex.
Then we will see how we can attack a server by targeting websites that are hosted on
that server. Back to website hacking, there are three approaches that one can take when
planning to perform a hack on a website/web app. These approaches include:-Server-side
Attack, Client-side Attack, Web Application Pen testing.As mentioned earlier, every
attack begins with information gathering. There is a couple of information that one can
gather during the process. These include but are not limited to:
1. Victim IP addresses
5. DNS records
This information could help you perform a successful hack on a website/ web app. I will
be showing you how to use some tools to gather information about a target website/web
app. We will start with:-
Whois is an online tool that helps one to lookup information of the target website/web
app such as Domain name, IP address block or an autonomous system but it is also used
to query for a wider range of information. The information that is provided in the Whois
lookup is publicly available unless the website is using domain privacy.
You can either visit the whois site here (https://whois.domaintools.com/) and type in the
domain name of the target website then it’s going to give you the website information or
if you are a terminal fun you can type this on the terminal whois
<domain_name_of_target)
• Registrant Contact
• Administrative Contact
• Technical Contact
Domain information
This type of information contains the general details about the domain. It will consist of
the following fields: Domain: This field will give you the domain name which we are
querying the WHOIS details. Registrar: This is the details of the registrar with whom the
domain name is registered. Registration Date: This is the date when the domain name
was first registered. Expiration Date: This is the date when the domain will expire.
Updated Date: This is the date when the WHOIS details last updated. Status: This is the
registrar status of the domain. This will be “OK” if there is no restriction and the domain
is free to transfer from one registrar to another. Name Servers: This field will provide
the details of the nameservers used by the domain.
Registrant Contact
As the name indicates, this area will provide you with details of the registrant of a
domain. As you can see the Whois Query returns a bunch of information. Which could be
relevant depending on what type of attack you are trying to carry out. For instance, the
information about the registrar company. You can hack into the registrar company to get
information about a certain domain.
2. Netcraft
If you are gathering in-depth information on the technologies used in a website/web app,
you could use the following website: netcraft.com The information that netcraft provides
includes: Background — This includes basic domain information .Network — This
includes information from IP Address to Domain names to nameservers. SSL/TLS —
This gives the ssl/tls status of the target. Hosting History -This gives the information on
the hosting history of the target. Sender Policy Framework (SPF) — This describes who
can send mail on the domains behalf.
Cloud & PaaS: Cloud computing is the use of computing resources (hardware and
software) that are delivered as a service over a network (typically the Internet). Platform
as a service (PaaS) is a category of cloud computing services that provide a computing
platform and a solution stack as a service.
Server-Side: Includes all the main technologies that Netcraft detects as running on the
server such as PHP.
Client-Side Includes all the main technologies that run on the browser (such as
JavaScript and Adobe Flash).
Mobile Technologies: Mobile technology is the technology used for hand held mobile
devices.
Web Stats: Web analytics is the measurement, collection, analysis and reporting of
internet data for purposes of understanding and optimizing web usage.
Character Encoding: A character encoding system consists of a code that pairs each
character from a given repertoire with something else such as a bit pattern, sequence of
natural numbers, octets, or electrical pulses in order to facilitate the transmissio n of data
(generally numbers or text) through telecommunication networks or for data storage.
Web Browser Targeting: Web browser targeting enables software applications to make
use of specific functions of the browser as well as optimizing the application for specific
browser versions.3. Robotext (https://www.robtex.com/)
This will help gather comprehensive Domain Name Server (DNS) information on the
target victim.Robtex uses various sources to gather public information about IP numbers,
domain names, host names, Autonomous systems, routes etc. It then indexes the data in a
big database and provides free access to the data.
How to use it is simple. You just go to the website and type the domain name and press
go.
4. Bing(https://bing.com)
Gaining access to one website on a server can help you gain access to another on the
same server.
You can use bing to find out what other domains are on the same server as the target
domain. You can do this by typing the IP: [IP address] on the bing search bar.
It’s going to list for you all the domain names with the same IP address.
5. Knockpy
Sub domains can be useful when it comes to website hacking, noting that some
subdomains are not public. You can test the security of the subdomains and see if you can
use them to break into the website/web app.
2. Navigate to knock.py
6. Dirb
Dirb is a web content scanner. This will help you discover sensitive and hidden files and
directories of a website or web application.It looks for existing (and/or hidden) Web
Objects. It basically works by launching a dictionary based attack against a web server
and analyzing the response.DIRB comes with a set of preconfigured attack wordlists for
easy usage but you can use your custom wordlists. Also, DIRB sometimes can be used as
a classic Common Gateway Interface [CGI] scanner, but remember it is a content scanner
not a vulnerability scanner.
Robots.txt — This is a file that contains the files that we don’t want the website or
Google to read.
The figure above shows some of the files that robots.txt has. Some of the important ones
that we see are the passwords file and the config.inc.
The figure below shows the results that we get when we navigate to passwords.
For now we do not know where they can be used but we can store them in a word list
and use them to brute force the login credentials that are required in that website.
The other interesting file is the config.inc. The figure below shows the results that I got
when I navigated to it.
In the week 3, I has full control over the client and the data it submits and can bypass any
client-side controls that are not replicated on the server. With intercept turned off in the
Proxy "Intercept" tab, visit the web application you are testing in your browser. Access the
page of the web application you wish to test. In this example we are using the
"Bypass Client Side JavaScript Validation" page of the "WebGoat" training tool.
Insecure direct object references (IDOR) are a type of access control vulnerability that
arises when an application uses user-supplied input to access objects directly.
As the name suggests Arbitrary File Upload Vulnerabilities is a type of vulnerability
which occurs in web applications if the file type uploaded is not checked, filtered or
sanitized. The main danger of these kind of vulnerabilities is that the attacker can upload a
malicious PHP, ASP etc. script and execute it.
In the week 4, I was taught on the concepts that Automating VAPT and secure code
development Automated tools are widely used in analyzing large codebase, having millions
of codes line enhancing the throughput of the code review process. They can identify all
the insecure packets of code in the database which can further be evaluated by the
developer or any security analyst. MANUAL CODE REVIEW.
Vulnerability assessment and penetration testing is the most comprehensive technical park
for cybersecurity auditing. It includes assessing for vulnerabilities, penetration testing,
reporting, and parching of your company’s web/mobile applications and networking
infrastructure. Whereas the vulnerability assessment aims at finding the security gaps in the
application, penetration testing exploits the gaps discovered to generate a PoC (Proof of
Concept). Vulnerability assessment and penetration testing are crucial activities in web
application security assessment. They constitute a part of secure code development and are
of utmost importance in today’s date of complex cyber-attacks. A website that has not been
sufficiently assessed for common vulnerabilities may prove a treasure for hackers as they
might attack such insecure websites to gain access to underlying databases leading to data
breaches. Not just this, hackers may even add hidden malicious code in your website code
that may lead anyone to visit your website, being unconsciously infected. VAPT is a step in
the right direction from the perspective of website security and with advanced automated
off-the-shelf tools available the time for vulnerability discovery is slowly converging. Know
the type of VAPT is best for your environment and secure your website today. VAPT is an
extremely significant exercise in web application security assessment. VAPT establishes a
piece of secure code development and is of integral significance in today’s day and age of
complicated cyber assaults. Here are some of the key benefits of Vulnerability assessment
and penetration testing. Vulnerability assessment and penetration testing are the most far-
reaching technical park for digital security reviewing. It is inclusive of the incorporation of
surveying for vulnerabilities, penetration testing, announcing and parching organization’s
web/portable applications systems administration framework. Vulnerability assessment
aims for finding the security gaps in the application, on the other hand, penetration testing
really exploits the security holes found to create a PoC.
The main aspect of reporting to keep in mind is that it must be easy to read and logically
set up so that the sequence of testing makes sense to everyone. The list of remedial
actions should be clearly defined. The report should also suggest which parties are
responsible for gaps in the app’s security; the task of repairing the issue can then be
delegated accordingly. Obviously the pentester cannot know all of the internal
responsibilities for each of the departments, so in some instances the stakeholders will
have to meet after the pentesting has been completed and the report has been finalized
and issued.
Brief Description of the Work (with supportive diagrams / data tables / tool
descriptions etc.)
In the week 6, after all the concepts were taught, I was assigned to work a project given
by the external guide. The project assigned is to Create ebowla malware and analyze the
malware, and create an SOP on java vulnerable lab.
CHAPTER 4
For implementation of project, I have used virtual machine. I have used Linux system.
Installed ebowla master to create the malware. Ebowla master works only for python 2.
Genetic configure file was used encrypt the virus and then the encrypted malware file was
uploaded in virus total website, where most of the prominent anti malware software’s could
not detect the virus.
Then this encrypted malware file was uploaded in windows machine where it acted as a
spyware, remote control of windows machine through Linux system
4.2 Methodology:
Two fundamental approaches for malware analysis are.
Static analysis:
It is a method of malware analysis which done without running the malware.
Dynamic analysis
dynamic analysis is a method of malware analysis which the malware is running in a secure
system
MALWARE:
Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for “malicious software.”
1. Spyware
2. Spyware is often used by people wishing to test their loved ones ‘computer activities. Of
course, hackers can use spyware in targeted attacks to record victims’ keystrokes and access
passwords or intellectual property. Adware and spyware are typically the simplest to uninstall
because they are not nearly as nasty as other malware programs. Check and stop the malicious
executable –you’re finished.
3. The method used for using the device or client, whether it’s social engineering, unpatched
code or a dozen other root causes, is much more important than actual adware or spyware.
This is because while the purposes of a spyware or adware program are not that malicious,
as a trojan with remote backdoor access, all of them use the same breakdown methods. The
existence of a spyware program should be a warning against a kind of vulnerability in the
system or client before really bad things occur.
2. Adware
• Adware a type of software to view advertisements on your computer, forward search requests
to websites for ads, and collect marketing data on your computer. For example, adware
normally gathers information about the types of websites you visit to display custom ads.
• Some feel that adware collecting information is malicious adware without your permission.
Another example of malicious adware is intrusive pop-up advertising for pretended fixes
for computer viruses or bad results.
3. Computer Virus
4. Worm
• Worms were even longer than computer viruses before mainframe days. Email took them
into the model in the late 1990s, and computer security practitioners were hit by malicious
worms that came as email attachments for almost a decade. One individual would open a
wormed e-mail, and the whole company would be easily contaminated. The odd
characteristic of the worm is that it replicates itself.
• Take Iloveyou’s infamous worm: When it left, almost every email client in the world was
hit, telephone systems overwhelmed (with the text being fraudulently sent), TV networks
downed, and even the daily paper I had for half a day was postponed. Several other worms,
including SQL Slammer and MS Blaster, provided the worm with its place in the history of
software security. The successful worm makes its capacity to propagate without end-user
interference so devastating. In comparison, viruses need an end -user to begin it, at least,
5. Trojan
• A Trojan is a malicious program that seems useful to itself. Cybercriminals supply trojans
with regular code, which persuades a victim to download it. The word comes from the ancient
Greek history of the wooden horse used by ambush to conquer the city of Troy. Trojan
horses on machines are just as attacking. The payload may be anything other than a backdoor
that allows attackers to access the affected device unauthorized. Trojans often give
cybercriminals access to IP addresses, passwords and bank details to personal information
from a client. It is often used by keyloggers to quickly capture account and password names
or credit card information and divulge the malware actor’s details.
• Many ransomware attacks are performed with a Trojan horse by inside a seemly harmless
piece of data the malicious software is stored. Security experts consider that Trojans today
are among the most dangerous malware types, particularly Trojans intended to rob users of
financial data. Some insidious forms of trojans claim to kill viruses but add viruses instead.
6. Ransomware
• Malware programs that encrypt the information and retain it as a recovery waiting for a
payoff in the cryptocurrency have been a large percentage of malware in recent years, and
the percentage is still that. Additionally, Ransomware has crippled businesses, hospitals,
police, and even whole cities. Most freelance systems are Trojans, which means that some
kind of social engineering must expand them. After it’s executed, the majority of users are
checking and encrypting files within several minutes.
• If the client is searching for a few hours before the encryption routine is set up, the malware
manager will determine exactly how much the victim can afford and also ensure that other
supposedly safe backups are removed or encrypted. Like any other malware type,
Ransomware can be avoided, but once executed, the damage may be difficult to reverse
without a strong, checked backup. Several reports have shown that around a third of the
victims are still paying their ransoms, and around 30% of the victims are still not disclosing
their records. Whatever the case, it needs other devices, decryption keys and more than a
little chance to open the encrypted files, if possible.
7. Rootkit
• A rootkit is a usually malicious collection of software tools, which offers unauthorized access
to a computer by unauthorized users. After installing the rootkit, the rootkit controller can
execute files remotely and change system settings on the host machine.
• Most malware programs today are known as rootkits or rootkits. Malware programs simply
try to change the underlying operating system to monitor the software effectively and conceal
it from antimalware.
• Phishing is one of the cybercrimes that occurs when an e-mail, telephone or text message is
contacted to entice a victim to provide sensitive data, such as personal identification, bank
and credit card details and passwords, by someone posing as a legitimate entity. Phishing is
not a malware type, technologically speaking, but a delivery method that criminals use to
spread other malware forms. Because of its importance and how it operates, we have included
it here in malware forms.
Department of ECE, KSIT, 2020-2021 Page 17
Cyber Security and Ethical Hacking
• An attack sometimes lures a person to click on a malicious URL to fool the user to believe
that he or she visits an online payment gateway or another online service. The malic ious site
then records the name and password of the user and any other personal or financial
information. Spear Phishing is a type of attack targeted at a particular person or group of
people like a corporation’s CFO to access confidential financial information.
• Sadly it can be a fool’s mistake to find and uninstall individual malware components. It is
easy to make a mistake and skip a part. Therefore, you don’t know if the malware has changed
the system in a way that it’s not completely reliable again.
• If malware removal and forensics are not properly trained, back up data (without it, if
necessary), format the drive, and reinstall the programs and data if the malware is identified.
Symptoms of Malware
Below are some of the common symptoms and signs of a malware infection:
Software Description:
4.2.1 Sandboxie:
When sandboxed programs create (or modify) objects, such as files, some object must in fact be
created. Sandboxie creates these objects out of the way, to protect the system from harmful
changes. But these objects must reside somewhere in the system. This page describes where various
types of sandboxed objects are placed. Beginning with version 2.80 of Sandboxie, the layout of the
sandbox is not tied to computer-specific device names and account names. See Portable Sandbox for
more information.
Sandboxie may be your first line of defense, but it should certainly be complemented by the more
traditional anti-virus and anti-malware solutions. These solutions can let you know if your system
does become infected in any way.
Typically, those other solutions employ various forms of pattern matching to discover malicious
software and other threats. Sandboxie, on the other hand, quite simply does not trust any software
code enough to let it out of the sandbox.
The combination of the two approaches should keep malicious software – which is serving the
interest of other unknown parties – out of your computer.
Payload used to create virus is msfvenom. The virus created works only on windows operating
system.
Here test.exe is the malware file name.
Here ebowla.py file is downloaded. Where ebowla works only for python 2 version and then file test.exe is
genetic configured using symmetric encryption to encrypt the file. Go payload is used and the file is converted
to go_symetric_test.exe. go. Encrypted file is given name adobe_activatoe.exe.
The encrypted malware file named adobe_activator.exe is uploaded in virus total website to check
whether anti malware software’s can detect the virus.
After uploading the malware file in virus total out of 71 anti malware softwares only 3 softwares could detect
the malware. The prominent anti malware softwares such as kaspersky, McAfee,quick heal could not detect
the malicious file.
After creating the encrypted malware. This file is downloaded in the windows OS to analyze the
working of the malware. The malware downloaded in the windows system in right side of the above
figure we can notice the remote access of this system through Linux system.
Here this malware acts as a spyware where the important credentials entered by windows user is
displayed on the Linux system.
Chapter 5
REFLECTION NOTES
1.1 Experience
My internship experience at Knowledge Solution India has taught me not only the technical
concepts but also to work as a team. My External Guide, Mr Rajkumar B is a continuous
source of inspiration. His guidance has helped me to learn new concepts and complete my
project in this internship at ease. I gained valuable work experience and the internship also
made me realize how to work and execute the given tasks within the deadline.
1.2 Technical Outcomes
1. Learned new concepts and technologies: During the course of the internship, I had to
constantly learn new concepts and technologies such as information gathering,
vulnerability assessment, recognizance, digital forensics, use of various tools, malware.
2. Understood the importance of cyber security: As the world is starting to depend more
on the internet by the day, the global cyber threat continues to evolve at a rapid pace.
The number of data breaches rising each year. How might one avoid this, you may
wonder. This is where cyber security comes in. Cyber security is the practice of
defending computers, servers, mobile devices, electronic systems, networks, and data
from malicious attacks. The term applies in a variety of contexts, from business to
mobile computing, and can be divided into a few common categories. Cyber threats can
arrive from any level of association. Cyber security is no longer something any company
can ignore. Security regularly affects businesses of all sizes and makes them cause
reversible reputational damage to the companies involved. Let us break down into
factors as to why cyber security is important .
4. Team Work: During this internship, after the concepts were taught, I was assigned to
work on a project within a team. So, we divided the whole project assigning tasks to
each member in the team to work on it within the deadline.
5. Work Ethics: The internship helped me develop work ethics i.e., submitting weekly
assignments on time, attending all the sessions and completing all the project works
within the deadline.
6. Adaptability Skills: During this internship, we had a lot of tasks which had to be
completed within the week itself. So, managing both the assignments and session, I
finally adapted to the work environment.
Overall, those are the main points I learned. Nevertheless, that content may become quickly
outdated, with new best practices, new job skills requirements. Still, the most important
things after 6 weeks as an intern were the personal reflections, I had on myself. It was a very
open-minded experience that made me definitely different and even more enthusiast about
cyber security and ethical hacking.
Chapter 6
CONCLUSION
More highly skilled workers in cybersecurity roles would help the nation respond more
robustly to the cybersecurity problems it faces.
All organizations need to understand their threat environment and the risks they face,
address their cybersecurity problems.
Backup and safeguard all important data and information.
Install and update firewalls and antivirus protection on every computer
Although the need for cybersecurity workers is likely to continue to be high, it is difficult
to forecast with certainty the number of workers required or the needed mix of
cybersecurity knowledge and skills.
There are many indications today that demand for cybersecurity workers will continue to
be high, but it is notoriously difficult to measure or forecast labor supply and demand for
any field, especially one that is as dynamic and fast moving as cybersecurity. Moreover,
there are several factors that may affect future need. These include the following:
• How the cybersecurity challenge will evolve as technologies and threats evolve, and how
this may alter workforce capability and capacity requirements.
• How advances—such as better-quality, more-secure software; more productive
cybersecurity tools; better training of the workers that operate and manage IT systems; or
more robust law enforcement—might change the number of workers needed in certain
roles and change the skills needed for others.
• How much responsibility for cybersecurity might shift from organizations at large to
more specialist information technology (IT) or cybersecurity firms, which may reduce the
number or change the mix of cybersecurity workers needed by organizations.
REFERENCES
[1 ] A Cybersecurity Agenda for the 45th President. (2017, January 5). Retrieved
from https://www.csis.org/news/cybersecurity-agenda-45th-president
[3 ] Applications Now Available for City Colleges of Chicago’s New Cyber Security “Boot
Camp”. (2017, March 18). Retrieved from http://www.ccc.edu/news/Pages/Applications-
Now-Available-for-City-Colleges-of-Chicagos-New-Cyber-Security-Boot-Camp-.aspx
[5 ] Assante, M., Tobey, D. (2011, February 4). Enhancing the Cybersecurity Work force.
Retrieved from http://ieeexplore.ieee.org/document/5708280/
[8 ] ATE Centers and National Science Foundation. (n.d.). ATE Centers Impact Report.
Retrieved from http://www.atecenters.org/wp-content/uploads/PDF/ATEIMPACT_2016-
17.pdf
[9 ] ATE Centers and National Science Foundation. (n.d.). ATE Programs and Overview.
Retrieved from http://www.atecenters.org/wp-
content/uploads/2016/07/ATE_Overview_2016.pdf