Professional Documents
Culture Documents
Anuradha Final 1
Anuradha Final 1
Anuradha Final 1
Cyber Security
Internship
Prepared By: Guided by: External Guide:
Anuradha kumari kharwar Prof.Sibaram raut Mr. Kishor Chaudhary
200860131009 (CSE Dept.) NIELIT Daman
Outline
• Introduction
• Abstract
• Company Profile
• Internship Role
Outline
• Implementation
• Conclusion
• Acknowledgements
• References
Introduction
• I had the opportunity to intern at NIELIT Daman , National Institute of Electronics & Information
Technology (NIELIT), an Autonomous Scientific Society under the administrative control of Ministry of
Electronics & Information Technology (MoE&IT), Government of India, was set up to carry out Human
Resource Development and related activities in the area of Information, Electronics & Communications
Technology (IECT).
• I was excited to contribute to , National Institute of Electronics & Information Technology (NIELIT).
• Through this internship, I aimed to develop a strong foundation in Cyber security , gain exposure to
real-world industry challenges, and expand my professional network in the IT industry.
Abstract
• During my internship at Nielit , I had the opportunity to work as Cyber Security Intern . Throughout the
internship, my main focus was to learn more security and privacy with the help of cyber security . I utilized my
skills in Elk stack etc
• As a cyber security intern , I worked on the Client- Server configuration ,Squid proxy server, GNS3.General
Working within a team environment allowed me to further develop my communication, teamwork, and time
management skills. Overall, this internship provided me with invaluable practical experience and the
opportunity to enhance my technical skills.
Company Profile
Company Profile
• NIELIT To be the leader in the development of industry oriented quality education and training and be the
country's premier Institution for examination and certification in the field of Information, Electronics and
Communications Technology (IECT).
• NIELIT has acquired very good expertise in IT training. The basket of activities of NIELIT is further
augmented by the wide range of projects that it undertakes. NIELIT has demonstrated its capability and
capacity to undertake R&D projects, consultancy services, turnkey projects in office automation, software
development, website development etc
• At present, NIELIT is also successfully executing the Agriculture Census and Input Survey project under
which tabulation of about 10 crore data records have to be done. NIELIT has planned a roadmap for adopting
PuTTy:
PuTTY is most commonly used: as a File Transfer Protocol PuTTY can
connect to a remote machine through SSH. SSH (Secure shell) is a protocol
that allows a secure connection. In this way, a PC can securely send and
receive data from a remote server.
Overview of the Domain and Application
• The domain that the company strives to uplift is the Elastic and the freight forwarding domain.
• Cyber security is the domain on my internship and there are many applications like squid proxy
server , Snort and Gns3 during my internship
Internship Role
• As a Cyber security Intern , my primary responsibilities included Learning and Training,
Assisting with Security Audits and Assessment, Incident Response and Analysis , Security
Awareness and Training.
Domain Training
Installation of VirtualBox
Setup of Ubuntu In VB
About Linux Operation system
Squid Proxy Server
WEEK 1
Introduction To Ubuntu
Ubuntu is a Linux distro based on Debian. It is suitable for cloud
computing, servers, desktops, and internet of things (IoT) devices.
The main difference between Linux and Ubuntu is that the former is
an operating system family based on Unix, while Ubuntu is a Linux
distribution.
Ubuntu has been dedicated to open-source principles, making its
software available for free and promoting global developer
cooperation. It immediately became well-liked because of its. This
makes it an excellent option for both newbies and seasoned users
WEEK 1
SQUID PROXY SERVER
Proxy servers are a type of server application that functions as a gateway between an end user
and an internet resource. Through a proxy server, an end user is able to control and monitor their
web traffic for a wide variety of purposes, including privacy, security, and caching. For example,
you can use a proxy server to make web requests from a different IP address than your own. You
can also use a proxy server to research how the web is served differently from one jurisdiction to
the next,or avoid some methods of surveillance or web traffic throttling .
Once the update is finished installing Squid Proxy server on Ubuntu and Debian computers is
very easy. All you have to do is run the following command .
Depending on the version installed on your system you have to look for a specific
path. Try to look for /etc/squid3/squid.conf or /etc/squid/squid.conf. Once you know
where your squid.conf configuration file is located then use your favorite text editor to
edit it.
vim /etc/squid3/squid.conf
WEEK 3
Once you have opened the squid.conf file you will see
something similar to the following.
WEEK 4
NEXT STEP
Look for http_access. Nobody can access the Squid Proxy server by default as http_access is set
to deny all.
http_access allow
WEEK 4
NEXT STEP
Save the file but do not close it yet. We need to setup a hostname for our proxy server. You can
use any name you like as Squid Proxy server allows to do that. The default one is localhost.
Go to Preferences -> Advanced -> Network and click on Settings under Connection. And click
on Manual Proxy Configuration like shown below.
WEEK 5
Introduction to ELK stake
The Elastic Stack — formerly known as the ELK Stack — is a collection
of open-source software produced by Elastic which allows you to search,
analyze, and visualize logs generated from any source in any format, a
practice known as centralized logging. Centralized logging can be useful
when attempting to identify problems with your servers or applications as
it allows you to search through all of your logs in a single place. It’s also
useful because it allows you to identify issues that span multiple servers
by correlating their logs during a specific time frame.
WEEK 5
The Elastic Stack has four main
components
The Elastic Stack has four main components:
•Elasticsearch: a distributed RESTful search engine which stores all of the collected data.
•Logstash: the data processing component of the Elastic Stack which sends incoming data to
Elasticsearch.
•Kibana: a web interface for searching and visualizing logs.
•Beats: lightweight, single-purpose data shippers that can send data from hundreds or thousands of
machines to either Logstash or Elasticsearch.
WEEK 6
IMPLENTATION:
Step 1: Installing and configure Elastic search
WEEK 6
WEEK 7
We are going to design dashboard of Elastic Search this week
For designing dashboard we have to first install and setup of Elastic Search in ubuntu .Which we
have already done in last week.
But most important step for degining dashboard is to do some important changes in Elastic nano
file.
WEEK 7
WEEK 7
Elastic search dashboard
WEEK 8
WEEK 9
WEEK 10
WEEK 10
WEEK 11
WEEK 12
Implemented the Authentication Service
WEEK 12
Link to Dashboard
http://192.168.0.173:5601/app/home#/
Conclusion
• During the course of my Internship, I faced and overcame many problems and difficulties
mainly in understanding the huge code base and the flow, adapting to the company’s coding
styles and principles, incorporating certain coding aspects.