Anuradha Final 1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 40

Laxmi Institute of Technology, Sarigam

Academic Year - 2023-2024


Department of Computer Science & Engineering

Cyber Security
Internship
Prepared By: Guided by: External Guide:
Anuradha kumari kharwar Prof.Sibaram raut Mr. Kishor Chaudhary
200860131009 (CSE Dept.) NIELIT Daman
Outline
• Introduction

• Abstract

• Company Profile

• Technology/Tools studied during internship

• Overview of the Domain and Application

• Internship Role
Outline
• Implementation
• Conclusion

• Conclusion and Future work

• Acknowledgements

• References
Introduction
• I had the opportunity to intern at NIELIT Daman , National Institute of Electronics & Information
Technology (NIELIT), an Autonomous Scientific Society under the administrative control of Ministry of
Electronics & Information Technology (MoE&IT), Government of India, was set up to carry out Human
Resource Development and related activities in the area of Information, Electronics & Communications
Technology (IECT).

• I was excited to contribute to , National Institute of Electronics & Information Technology (NIELIT).

• Through this internship, I aimed to develop a strong foundation in Cyber security , gain exposure to
real-world industry challenges, and expand my professional network in the IT industry.
Abstract
• During my internship at Nielit , I had the opportunity to work as Cyber Security Intern . Throughout the
internship, my main focus was to learn more security and privacy with the help of cyber security . I utilized my
skills in Elk stack etc

• As a cyber security intern , I worked on the Client- Server configuration ,Squid proxy server, GNS3.General
Working within a team environment allowed me to further develop my communication, teamwork, and time
management skills. Overall, this internship provided me with invaluable practical experience and the
opportunity to enhance my technical skills.
Company Profile
Company Profile
• NIELIT To be the leader in the development of industry oriented quality education and training and be the
country's premier Institution for examination and certification in the field of Information, Electronics and
Communications Technology (IECT).
• NIELIT has acquired very good expertise in IT training. The basket of activities of NIELIT is further
augmented by the wide range of projects that it undertakes. NIELIT has demonstrated its capability and
capacity to undertake R&D projects, consultancy services, turnkey projects in office automation, software
development, website development etc

• At present, NIELIT is also successfully executing the Agriculture Census and Input Survey project under
which tabulation of about 10 crore data records have to be done. NIELIT has planned a roadmap for adopting

appropriate pedagogy for metamorphosing NIELIT into an Institute of National Importance .


Technology and Tools Studied During Internship
• As a cyber security intern , I gained hands-on and proficiency in the following
experience
technologies and tools:
Linux :
I utilized Linux operating System to perform task related cyber
security , enabling interactive user interfaces and seamless user
experiences.
Ubuntu:
I used Ubuntu to make project of cyber security to make more interactive and
functional.I added dynamic features and made sure that user inputs were validated
on the client and Server side.
Technology and Tools Studied During Internship
SQUID:
I also gained proficiency in Squid , a data access technology in Squid,
which allowed me to configure client server , User authentication and
how to block any website.

PuTTy:
PuTTY is most commonly used: as a File Transfer Protocol PuTTY can
connect to a remote machine through SSH. SSH (Secure shell) is a protocol
that allows a secure connection. In this way, a PC can securely send and
receive data from a remote server.
Overview of the Domain and Application
• The domain that the company strives to uplift is the Elastic and the freight forwarding domain.

• Cyber security is the domain on my internship and there are many applications like squid proxy
server , Snort and Gns3 during my internship
Internship Role
• As a Cyber security Intern , my primary responsibilities included Learning and Training,
Assisting with Security Audits and Assessment, Incident Response and Analysis , Security
Awareness and Training.

• During the initial weeks, we underwent several training sessions including

 Domain Training

 Cyber security Training

 Squid proxy server Training

 Maintaining Security Training


Week 1
 In the first week of internship ,We have introduced to the company and work environment of the
company ..
 This week is all for learning and we learn some basic fundamental of the cyber security

 This week we learn Topic:

 Installation of VirtualBox
 Setup of Ubuntu In VB
 About Linux Operation system
 Squid Proxy Server
WEEK 1
Introduction To Ubuntu
Ubuntu is a Linux distro based on Debian. It is suitable for cloud
computing, servers, desktops, and internet of things (IoT) devices.
The main difference between Linux and Ubuntu is that the former is
an operating system family based on Unix, while Ubuntu is a Linux
distribution.
Ubuntu has been dedicated to open-source principles, making its
software available for free and promoting global developer
cooperation. It immediately became well-liked because of its. This
makes it an excellent option for both newbies and seasoned users
WEEK 1
SQUID PROXY SERVER
 Proxy servers are a type of server application that functions as a gateway between an end user
and an internet resource. Through a proxy server, an end user is able to control and monitor their
web traffic for a wide variety of purposes, including privacy, security, and caching. For example,
you can use a proxy server to make web requests from a different IP address than your own. You
can also use a proxy server to research how the web is served differently from one jurisdiction to
the next,or avoid some methods of surveillance or web traffic throttling .

 Squid is a stable, popular, open-source HTTP proxy.


WEEK 2
How to Install Squid Proxy in ubuntu
 There are many ways to install Squid Proxy on Ubunu and Debian systems, one of
them is to use the command apt-get install since there is a package of this proxy
available in the default repo. First open a new terminal emulator (CTRL+ALT+T) and
update the package index like shown below.

 sudo apt update

 Once the update is finished installing Squid Proxy server on Ubuntu and Debian computers is
very easy. All you have to do is run the following command .

 sudo apt install squid


WEEK 2
Then you will be asked if you want to continue
with the installation. Type Y
WEEK 2
Wait for the download and installation to
finish.
WEEK 3
Squid Configuration
 Before playing with this proxy there is something we need to do. Open
the configuration file of Squid Proxy which is located under the directory /etc.

 Depending on the version installed on your system you have to look for a specific
path. Try to look for /etc/squid3/squid.conf or /etc/squid/squid.conf. Once you know
where your squid.conf configuration file is located then use your favorite text editor to
edit it.

 I use vim for text editing.

 vim /etc/squid3/squid.conf
WEEK 3
Once you have opened the squid.conf file you will see
something similar to the following.
WEEK 4
NEXT STEP
 Look for http_access. Nobody can access the Squid Proxy server by default as http_access is set
to deny all.

 The line will look like shown below.

 http_access deny all

 In order to start using the Squid Proxy change http_access to allow.

 http_access allow
WEEK 4
NEXT STEP
 Save the file but do not close it yet. We need to setup a hostname for our proxy server. You can
use any name you like as Squid Proxy server allows to do that. The default one is localhost.

 Find visible_hostname and give the name you want.

 Now use the following command to restart the Squid Proxy.

 sudo service squid3 restart


WEEK 4
Client Side Configuration
• For Firefox:

 Go to Preferences -> Advanced -> Network and click on Settings under Connection. And click
on Manual Proxy Configuration like shown below.
WEEK 5
Introduction to ELK stake
The Elastic Stack — formerly known as the ELK Stack — is a collection
of open-source software produced by Elastic which allows you to search,
analyze, and visualize logs generated from any source in any format, a
practice known as centralized logging. Centralized logging can be useful
when attempting to identify problems with your servers or applications as
it allows you to search through all of your logs in a single place. It’s also
useful because it allows you to identify issues that span multiple servers
by correlating their logs during a specific time frame.
WEEK 5
The Elastic Stack has four main
components
The Elastic Stack has four main components:
•Elasticsearch: a distributed RESTful search engine which stores all of the collected data.
•Logstash: the data processing component of the Elastic Stack which sends incoming data to
Elasticsearch.
•Kibana: a web interface for searching and visualizing logs.
•Beats: lightweight, single-purpose data shippers that can send data from hundreds or thousands of
machines to either Logstash or Elasticsearch.
WEEK 6
IMPLENTATION:
Step 1: Installing and configure Elastic search
WEEK 6
WEEK 7
 We are going to design dashboard of Elastic Search this week

 For designing dashboard we have to first install and setup of Elastic Search in ubuntu .Which we
have already done in last week.

 But most important step for degining dashboard is to do some important changes in Elastic nano
file.
WEEK 7
WEEK 7
Elastic search dashboard
WEEK 8
WEEK 9
WEEK 10
WEEK 10
WEEK 11
WEEK 12
Implemented the Authentication Service
WEEK 12
Link to Dashboard
http://192.168.0.173:5601/app/home#/
Conclusion
• During the course of my Internship, I faced and overcame many problems and difficulties
mainly in understanding the huge code base and the flow, adapting to the company’s coding
styles and principles, incorporating certain coding aspects.

• In conclusion, my internship experience has been invaluable in terms of personal growth,


skill development, and practical application of knowledge in the Information and
Technology.
Conclusion and Future Work
• Moving forward, there are several areas of future work and potential opportunities for further
exploration
 Future Work 1: Continuously update my skills and stay up-to-date with emerging trends
and
technologies in the field
 Future Work 2: Apply the knowledge and experience gained during the internship to tackle
more complex challenges and projects

You might also like