CYBERSECURITY VIRTUAL INTERNSHIP Presented by V Godwin (20121A12C2) Information Technology Under the esteemed supervision of Ms.Chengamma Chitteti,M.Tech,(Ph.D) Assistant Professor, Dept. of IT,SVEC Head of Department: Dr. K.Ramani,M.Tech.,Ph.D Professor and Head, Dept. of IT, SVEC ABSTRCT The abstract outlines the internship structure, including training modules, mentorship opportunities, and collaborative projects aimed at enhancing participants' understanding of cybersecurity concepts and their application in professional settings. As the interns navigate diverse aspects of cybersecurity, from vulnerability assessments to incident response, they gain valuable insights into the intricacies of safeguarding digital assets. This abstract emphasizes the internship's role in nurturing the next generation of cybersecurity professionals and fostering a proactive approach to cyber threats. Keywords: Cyber Defense, Vulnerability Assessments, Practical Training Introduction to Cybersecurity • Cybersecurity refers to the technologies and processes designed to protect the computer, networks data from unauthorized access delivered via the internet by cyber criminals. Though, cyber it is important for the network, data and application security. • The objective of cyber security is to establish rules and measure to use against attacks over the internet. • It steal a person’s identity or illegal imports or malicious programs. It is an activity done by using computers and the internet. What is Cybersecurity? • It is the protection of inter-connected systems, including hardware, software and data, from cyberattacks. • Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity • In computing, security comprises cybersecurity and physical security both are used to protect against unauthorized access to data centers and other computerized systems. Modules • Network Security Fundamentals • Cyber Security Fundamentals • Cloud Security Fundamentals Importance of cybersecurity 1 Protecting Critical Systems: Ensuring the security of critical systems that organizations and individuals rely on for daily operations 2 Safeguarding Sensitive Information: The role of cybersecurity in safeguarding sensitive data from unauthorized access and theft 3 Preventing Disruptions: Cybersecurity measures help prevent disruptions caused by cyberattacks, ensuring continuity in business and personal activities 4 Maintaining Trust: Building and maintaining trust by assuring users and clients that their information is secure 5 Adapting to Evolving Threats: Recognizing the dynamic nature of cyber threats and the importance of adapting security measures accordingly Types of Cyber Attacks Supply Chain Attacks Fileless attacks use vulnerabilities in legitimate software programs to inject malicious code directly into a computer's memory Spoofing is a technique through which a cybercriminal disguises themselves as a extorting money or installing malware or other harmful software on the device phishing attacks Whale Phishing is a type ofspear phishing that specifically targets high-level corporate officers Denial of Service attacks Denial-of-service and distributed denial-of-service attacks flood a system's resources with fraudulent traffic 12 The difference between DoS attacks and DDoS attacks is simply that DoS attacks use a single source to generate fraudulent traffic, while DDoS attacks use multiple sources DDoS attacks are often carried out with a botnet, a network of internetconnected, malware-infected devices under a hacker's control SQL injection attacks A Structured Query Language injection attack occurs on a database-driven website when the hacker manipulates a standard SQL query It is carried by injecting a malicious code into a vulnerable website search box, thereby making the server reveal crucial information 5 step approach in the Cyber Security strategy framework Identify: Understand what's important, what could go wrong, and how Protect: Put in place safeguards to keep what's important safe Detect: Keep an eye out for anything unusual or suspicious Respond: Act quickly and effectively if something goes wrong Recover: Learn from what happened and get back on track Protecting Your Data: Data Security and Loss Prevention Data encryption: At rest and in transit Impact of cyberattacks Data breach: Exposure of sensitive information, such as employee records, financial data, and project blueprints Operational disruption: Delay of construction projects due to system outages and data loss Financial losses: Costs associated with data recovery, remediation efforts, and potential legal claims Reputational damage: Loss of trust from customers, partners, and the public RSA Algorithm: A Cornerstone of Cybersecurity What is RSA? Versatile: RSA adapts to diverse cybersecurity needs, from securing communication to managing keys Highly Secure: With large key sizes, breaking RSA is practically impossible with current computing power Widely Adopted: It's a standardized and wellestablished technology used across various industries CASE STUDY Cybersecurity case studies often involve analyzing real-world incidents or breaches, their causes, impact, and the strategies used for resolution. One well-known case study is the Equifax data breach in 2017, where hackers gained unauthorized access to sensitive personal information of nearly 147 million people. This incident highlighted vulnerabilities in Equifax's security practices, leading to regulatory scrutiny and significant repercussions. Analyzing such cases helps identify weaknesses and improve cybersecurity measures for organizations. Safety tips for Cyber Crime • • • • • • • Use antivirus software Insert Firewalls Maintain Backup Check security settings Never give your full name or address to strangers Uninstall unnecessary software Learn more about the internet privacy CERTIFICATE Conclusion:• Cybersecurity is crucial for protecting digital assets and privacy. It’s an ongoing effort that requires constant vigilance and proactive measures to mitigate risks • Also it is locking your doors and windows to keep your digital stuff safe from online threats. References:• • • • • www.Wikipedia.org www.avtest.org www.billmullins.blogspot.com www.digit/forum.com www.antivirusnews.com THANK YOU