Cybersecurity Internship Report Aicte: Computer Science Engineering (Kallam Haranadhareddy Institute of Technology)
Cybersecurity Internship Report Aicte: Computer Science Engineering (Kallam Haranadhareddy Institute of Technology)
Cybersecurity Internship Report Aicte: Computer Science Engineering (Kallam Haranadhareddy Institute of Technology)
Introduction To Cybersecurity
Cybersecurity is all about reducing threats when people are in the process of dealing with
technology. It encompasses the full range of protection against any online risk or
vulnerability, which comprises information security assurance and cyber law enforcement. In
other words, cybersecurity is the protection of cyber-space (which includes hardware,
software, networks, and their servers, peripheral devices, data and information, and all other
components associated with technology) and internet-connected systems from both internal
as well as external threats and cybercriminals. It also comprises sub-branches that are
specific to different security measures. These are:
• Network Security.
• System Security.
• Application Security.
• Information Security.
• Web Security.
• Mobile Security.
• Phishing.
• Man in the Middle.
• Password attack.
• DoS and DDoS.
• Malware and Virus-based attacks.
• Drive-by download.
• Malvertising.
• Stealing digital privacy etc.
1. Availability: As the name suggests, availability specifies whether the data or resource
is available when required or requested by the client. The information that has been
requested will possess the actual value only when legitimate users can access those
resources at the right time. Cybercriminals seize those data so that the request to
access those resources gets denied (leads to downtime of a working server), which is a
conventional attack.
2. Integrity: This refers to the techniques to ensure that all the data or resources that can
be accessed in real-time are legitimate, correct, and protected from unlawful user
(hackers) modification. Data integrity has become a primary and essential component
or element of information security because users have to trust online information to
use them. Non-trusted data compromises the integrity and hence will violate one of the
six elements. Data integrity is verified through techniques like checksums, change in
hash values, and data comparison.
4. Confidentiality: can be defined as permitting approved users for accessing all sensitive
as well as protected information. Confidentiality takes care of confidential
information, and other resources must be revealed to legitimate and authorized users
only. Confidentiality can be made certain by using role-based security techniques for
ensuring user or viewer's authorization and access controls on any particular data.
6. Utility: as the name suggests is used for any purpose or reason and is accessed and
then used by users. It is not entirely the type of element for security, but if any
resource's utility becomes vague or useless, then it is of no use. Cryptography is used
to preserve the efficiency of any resource sent over the internet. Various encryption
mechanisms are used for securing the message or data sent over the internet so that it
is not altered during the transmission; otherwise, the utility of that resource will not
prevail.
Access Control
Access Control is a mechanism of controlling who has the proper access to any system or
computer or server or online services where the information is stored. It is a fundamental
concept that regulates and then minimizes the risk of any business or organization.
Threat
A threat can be defined as the possible danger that might cause the exploitation of any bug or
vulnerability for breaching security, which then causes possible harm to any institute,
organization, or firm. These threats are found by cybercriminals to steal, annoy, or harm the
resources.
Backdoor
Backdoor is used by cybercriminals to gain illegal access to the target system. It is used to
secretly bypass standard authentication or encryption in a system's security mechanism.
Hackers covertly embed these backdoor programs with legitimate files or keep these
backdoors after they came out of the system, which they have hacked for gaining access in
the future. Backdoors are also known as trapdoors.
Vulnerability
The vulnerability can be defined as the flaw or weakness in the design or development of any
system. It is an error in any component of cyberspace that can lead to an unexpected or
unwanted breach in security systems.
Zero-day Attacks
lO M oARcPSD| 18269317
Zero-day Attack is a type that is not known to the creator, developer, or vendor of the
system, and cybercriminals exploit the vulnerability to gain illegitimate access to any
system, network, or server. There are no known security patches or fixes in such types of
attacks because the developers are unaware of this vulnerability.
Social Engineering
Social Engineering is a technique of stealing sensitive data from a target victim in different
ways, such as physical accessing of data or psychologically manipulate in combination with
social scenarios. Examples of social engineering are shoulder surfing, phishing, tailgating,
dumpster diving, etc.
Command, and Control Servers are also termed as C&C servers, which are machines used by
attackers for communicating with a botnet where they can control and compromise systems
within the network.
Content Spoofing
Identity Theft
Identity Theft is the scenario when the attacker gains every personal detail about the target
user and uses that personal information to impersonate the target user. Data attackers take
credit card information, bank account details, transaction details, ID and passwords, victim's
address, and phone number.
CompTIA has done extensive research on cybersecurity, and one recent study on building
security teams, shows that the primary driver for a new security approach is a change in IT
operations. Migrating to a cloud provider, adding new mobile devices or focusing on data
analytics are all common IT strategies that require new security tactics. It’s no coincidence
that these strategies also drive changes or improvements to the corporate network. Success in
these areas requires a solid understanding of best practices in network security.
lO M oARcPSD| 18269317
Network security is a smaller subset that falls under the larger umbrella of cybersecurity, and
it refers to the practice of preventing unauthorized users from accessing computer networks
and their associated devices. It involves physically protecting network servers and devices
from external threats, as well as taking steps to secure the digital network. In an age of
increasingly sophisticated and frequent cyberattacks, network security matters more now
than ever before
Network security is the key to keeping that sensitive information safe, and as more private
data is stored and shared on vulnerable devices, network security will only grow in
importance and necessity. Experts expect that more than 2,314 exabytes (or over 2 trillion
gigabytes) of data will exist by 2020; managing that amount of data is difficult enough, and
protecting it will be another issue entirely.
While each and every member of your organization can take strides to help keep things
secure, network security has become more complex in recent years. Adequately protecting
networks and their connected devices requires comprehensive network training, a thorough
understanding of how networks actually work and the skills to put that knowledge into
practice. It’s crucial for networks to be thoroughly and properly set up, secured and
monitored to fully preserve privacy.
Virtually all computer networks have vulnerabilities that leave them open to outside attacks;
further, devices and networks are still vulnerable even if no one is actively threatening or
targeting them. A vulnerability is a condition of the network or its hardware, not the result of
external action.
While a vulnerability does not guarantee that an attacker or hacker will target your network,
it does make it much easier — and possible — for them to gain access to it.
Taking precautions to maintain the physical safety of your network will ensure that it’s able
to run as smoothly and safely as possible.
Some of the most prevalent types of network security attacks any IT professional should be
aware of include the following:
• Data Theft: Also called data exfiltration, data theft occurs when an attacker uses
their unauthorized access to obtain private information from the network.
Attackers frequently use stolen login credentials to read protected files or steal
the data while it is in transit between two network devices.
• Insider Threat: As its name implies, insider threats come from employees
within an organization. These employees use their own access to infiltrate the
network and obtain sensitive or private company information.
• Malware Attacks: A malware attack occurs when a malicious code (malware)
inserts undesired, unauthorized software onto a network device. Malware can
easily spread from one device to another, making it very difficult to get rid of
entirely.
lO M oARcPSD| 18269317
• Password Attacks: Any type of attack that involves someone attempting to use a
password illegitimately is considered to be a password attack. The hacker may
obtain access either by guessing, stealing or cracking a password.
• Social Engineering: These attacks use deception and falsehoods to convince
others to give up private information, such as an account password, or to violate
security protocols. Social engineering attacks often target people who are not
tech-savvy, but they may also target technical support staff with false requests
for help.
Of course, these are only a few of the many ways that hackers may try to infiltrate network
systems, and they will continue to develop new, creative ways to do so. Always pay attention
to any unusual activity you happen to notice, and don’t hesitate to investigate the matter
further.
One security strategy won’t be enough to fully and effectively protect a network. A
combination of different techniques will ensure that your network is as secure as possible
and will help to meet the unique needs of your organization.
lO M oARcPSD| 18269317
In addition, if you do not already have a data recovery plan in place, now is the time to create
one. Even the best-secured networks are compromised and infiltrated, and though no one
wants or necessarily expects that to happen, being prepared for the worst will make solving
the problem significantly easier.
Computer networking is constantly evolving, and what was once considered a network
security best practice may soon be a thing of the past. IT professionals need continual
education and training to keep up on the latest security issues and threats, so they can more
effectively implement promising network security solutions.
lO M oARcPSD| 18269317
To get started in a computer networking career, check out CompTIA Network+ and the
related training materials.
• Packet Sniffer: Provides a comprehensive view of a given network. You can use
this application to analyze traffic on the network, figure out which ports are open
and identify network vulnerabilities.
• Port Scanner: Looks for open ports on the target device and gathers
information, including whether the port is open or closed, what services are
running on a given port and information about the operating system on that
machine. This application can be used to figure out which ports are in use and
identify points in a network that could be vulnerable to outside attacks.
• Protocol Analyzer: Integrates diagnostic and reporting capabilities to provide a
comprehensive view of an organization's network. You can use analyzers to
troubleshoot network problems and detect intrusions into your network.
• Wi-Fi Analyzer: Detects devices and points of interference in a Wi-Fi signal.
This tool can help you to troubleshoot issues in network connectivity over a
wireless network.
• Bandwidth Speed Tester: Tests the bandwidth and latency of a user’s internet
connection. This application is typically accessed through a third-party website
and can be used to confirm user reports about slow connections or download
speeds.
Hardware Tools
Command-line tools and applications are software tools for troubleshooting, but some
network problems have hardware causes and solutions.
Here are some hardware tools that can help you diagnose and solve network issues:
• Wire Crimpers: A wire crimper (sometimes called a cable crimper) is a tool that
attaches media connectors to the ends of cables. You can use it to make or
modify network cables.
• Cable Testers: A cable tester (sometimes called a line tester) is a tool that
verifies if a signal is transmitted by a given cable. You can use one to find out
whether the cables in your network are functioning properly when diagnosing
connectivity issues.
• Punch Down Tool: A punch down tool is used in a wiring closet to connect
cable wires directly to a patch panel or punch-down block. This tool makes it
easier to connect wires than it would be to do it by hand.
lO M oARcPSD| 18269317
However, if you want a job working on computer networks, you’ll need to develop your
troubleshooting skills to match. Network troubleshooting is an essential skill to have when
looking for a job as a network engineer or network administrator, since companies are
primarily concerned with minimizing their network downtime.
In order to really develop your skills that will land you the job, it’s important to combine
training and certifications with real-world network troubleshooting experience. This
experience doesn’t have to come from a job – you can practice your IT skills by tinkering
with your own equipment or volunteering with local nonprofits to improve their networks
and resolve any issues they’re having.
lO M oARcPSD| 18269317
Cloud security refers to protecting data stored online via cloud computing
environments (instead of data centers) from theft, deletion, and leakage. There are many
protective methods that help secure the cloud; these measures include access control,
firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and
not using public internet connections.
When it comes to network security concerns, the cloud itself is not the issue – rather,
the challenge lies within the policies and technologies for security and control of that
technology. Put simply? Human error is one of the top reasons for data breaches in the cloud.
In fact, Gartner estimates that by 2022, at least 95 percent of cloud security failures will be
the customer’s fault due to misconfigurations and mismanagement.
Therefore, it is not an issue of whether or not the cloud is secure but if the customer is using
the cloud securely.
Too often, misconfigured cloud-based systems lead to data breaches. For instance, in
2019, Capital One was hacked by a malicious actor who stole the sensitive data of more than
100 million people while not following traditional hacker patterns.
The breach was the result of a misconfigured open-source web application firewall (WAF),
which Capital One used in its operations hosted on Amazon Web Services. The
lO M oARcPSD| 18269317
misconfigured WAF was permitted to list all the files in any AWS data buckets and read the
contents of each file. The misconfiguration allowed the intruder to trick the firewall into
relaying requests to a key back-end resource on AWS.
Once the breach happened, 100 million U.S. citizens were impacted and 140,000 Social
Security numbers and 80,000 bank account numbers were compromised. In total, the breach
cost Capital One roughly $150 million.
From April to May 2020, the Cloud Security Alliance (CSA) conducted a survey of
experienced cloud security architects, designers, and operators from large organizations to, in
part, determine the challenges of public cloud workloads in 2020. After surveying 200
respondents, they found that anticipated security challenges included:
• Visibility
• Data Privacy
• IAM Procedures
• Configuration Management
• Compliance Requirements
At the same time, the diversity of production workloads in the public cloud were also
expected to increase in 2021, including the use of container platforms, function-as-a-
service/serverless approach, and cloud provider services. Use of virtual machines is also
expected to increase.
Don’t just migrate to the cloud – prevent security threats by following these tips:
1. Understand what you’re responsible for – different cloud services require varying
levels of responsibility. For instance, while software-as-a-service (SaaS) providers ensure
lO M oARcPSD| 18269317
that applications are protected and that data security is guaranteed, IaaS environments may
not have the same controls. To ensure security, cloud customers need to double check with
their IaaS providers to understand who’s in charge of each security control.
2. Control user access – a huge challenge for enterprises has been controlling who has
access to their cloud services. Too often, organizations accidently publically expose their
cloud storage service despite warnings from cloud providers to avoid allowing storage drive
contents to be accessible to anyone with an internet connection. CSO advises that only load
balancers and bastion hosts should be exposed to the internet. Further, do not allow Secure
Shell (SSH) connections directly from the internet as this will allow anyone who finds the
server location to bypass the firewall and directly access the data. Instead, use your cloud
provider’s identity and access control tools while also knowing who has access to what data
and when. Identity and access control policies should grant the minimum set of privileges
needed and only grant other permissions as needed. Configure security groups to have the
narrowest focus possible and where possible, use reference security group IDs. Finally,
consider tools that let you set access controls based on user activity data.
4. Secure credentials – AWS access keys can be exposed on public websites, source code
repositories, unprotected Kubernetes dashboards, and other such platforms. Therefore, you
should create and regularly rotate keys for each external service while also restricting access
on the basis of IAM roles. Never use root user accounts – these accounts should only be used
for specific account and service management tasks. Further, disable any user accounts that
aren’t being used to further limit potential paths that hackers can compromise.
5. Implement MFA – your security controls should be so rigorous that if one control fails,
other features keep the application, network, and data in the cloud safe. By tying MFA
(multi-factor authentication) to usernames and passwords, attackers have an even harder time
breaking in. Use MFA to limit access to management consoles, dashboards, and privileged
accounts.
6. Increase visibility – to see issues like unauthorized access attempts, turn on security
logging and monitoring once your cloud has been set up. Major cloud providers supply some
level of logging tools that can be used for change tracking, resource management, security
analysis, and compliance audits.
auditing and correction process by choosing security solutions that integrate with Jenkins,
Kubernetes, and others. Just remember to check that workloads are compliant
In-house SOC: As the term suggests, these SOCs are within an organization. They typically
comprise of diverse security and IT experts that are committed to the security needs of the
organization and work together in a designated facility.
In-house Virtual SOC: Unlike an In-house SOC, In-house Virtual SOC does not have a
dedicated team of security personnel. Rather, it is comprised of employees that are
geographically distributed and respond to security alerts and events.
Co-Managed SOC: Co-Managed SOC is made up of In-house SOC personnel that work
with an external Managed Security Service Provider (MSSP). Each share responsibilities and
coordinate the management and maintenance of the organization’s security operations.
Outsourced Virtual SOC: With the shift to cloud computing, MSSPs are providing SOC-
as-a-Service. Security operations are completely outsourced to a third-party service provider
eliminating the need to have an in-house security facility.
SOC Positions
There are many roles in a Security Operations Center depending on the objectives an
organization wants to accomplish. Most positions shoulder numerous responsibilities and
work in collaboration to achieve security objectives. Depending on their accountability and
expertise, following are some SOC team roles with a generic description of how they
contribute to the SOC.
lO M oARcPSD| 18269317
Conclusion
The increasing threat landscape has made organizations take information security more
seriously. However, a crucial question that most businesses face is whether to build an in-
house Security Operations Center or outsource to an MSSP. Additionally, some
organizations may want to go the hybrid way with both an in-house and outsource approach.
Cost, time, effort and talent availability are factors to keep in mind when developing an
effective SOC strategy.
SOC is evolving and Cyber Chasse security consultants can help you achieve the right
balance in executing your security strategies. To learn more about how we can provide you
with the best solution customized to your unique needs, contact us today.
Typically the SOC's responsibility is to detect threats in the environment and stop them from
developing into expensive problems.
lO M oARcPSD| 18269317
An event is simply observations we can determine from logs and information from the
network, for example:
• Users logging in
• Attacks observed in the network
• Transactions within applications
The SIEM processes alerts based on logs from different sensors and monitors in the network,
each which might produce alerts that are important for the SOC to respond to. The SIEM can
also try to correlate multiple events to determine an alerts.
• Network
• Host
• Applications
Events from the network is the most typical, but least valuable as they don't hold the entire
context of what has happened. The network typically reveals who is communicating where,
over which protocols, and when, but not the intricate details about what happened, to whom
and why.
Host events give more information in regards to what actually happened and to whom.
Challenges such as encryption is no longer blurred and more visibility is gained into what is
taking place. Many SIEM's are enriched with great details about what happens on the hosts
themselves, instead of only from the network.
Events from application is where the SOC typically can best understand what is going on.
These events give information about the Triple A, AAA ("Authentication, Authorization and
Account"), including detailed information about how the application is performing and what
the users are doing.
For a SIEM to understand events from applications it typically requires work from the SOC
Team to make the SIEM understand these events, as support is often not included "out-of-
the-box". Many applications are proprietary to an organization and the SIEM does not
already have an understanding of the data the applications forward.
lO M oARcPSD| 18269317
SOC Staffing
How a SOC is staffed greatly varies based on the requirements and structure of an
organization. In this section we take a quick look at typical roles involved in operating a
SOC. An overview of potential roles:
As in most organized teams, a role is appointed to lead the department. The SOC Chief
determines the strategy and tactics involved to counter threats against the organization.
The SOC Architect is responsible for ensuring the systems, platforms and overall
architecture is capable of delivering what the team members require to perform their duties.
A SOC Architect will help build correlation rules across multiple points of data and ensures
incoming data conforms to the platform requirements.
Analyst Lead is responsible that processes, or playbooks, are developed and maintained to
ensure analysts are capable to find the information necessary to conclude alerts and potential
incidents.
Level 1 Analysts serve as the first responders to alerts. Their duty is, within their
capabilities, to conclude alerts and forward any troubles to a higher level analyst.
Level 2 Analysts are distinguished by having more experience and technical knowledge.
They should also ensure any troubles in resolving alerts are forwarded to the Analyst Lead to
aid the continuous improvement of the SOC. The Level 2, together with the Analyst Lead,
escalates incidents to the Incident Response Team.
The IRT ("Incident Response Team") is a natural extension to the SOC Team. The IRT team
is deployed to remediate and solve the issues impacting the organization.
Penetration Testers ideally also support the defense. Penetration Testers have intricate
knowledge of how attackers operate and can help in root cause analysis and understanding
how break-ins occur. Merging attack and defense teams is often referred to as Purple
Teaming and is considered a best-practice operation.
Escalation Chains
Some alerts require immediate actions. It is important for the SOC to have defined a process
of whom to contact when different incidents occur. Incidents can occur across many different
business units, the SOC should know who to contact, when and on which communication
mediums.
Classification of Incidents
• Category
• Criticality
• Sensitivity
Depending on the incidents classification and how it is attributed, the SOC might take
different measures to solve the issue at hand.
The category of incident will determine how to respond. There exists many kinds of incident
and it is important for the SOC to understand what each incident type means for the
organization. Example incidents are listed below:
• Inside Hacking
• Malware on Client workstation
• Worm spreading across the network
• Distributed Denial of Service Attack
• Leaked Credentials
The criticality of an incident is determined based on how many systems is impacted, the
potential impact of not stopping the incident, the systems involved and many other things. It
is important for the SOC to be able to accurately determine the criticality so the incident can
be closed accordingly. Criticality is what determines how fast an incident should be
responded to.
Should the incident be responded to immediately or can the team wait until tomorrow?
Sensitivity determines who should be notified about the incident. Some incidents require
extreme discretion.
To counter the advancements of threat actors, automation is key for a modern SOC to
respond fast enough. To facilitate fast response to incidents, the SOC should have tools
available to automatically orchestrate solutions to respond to threats in the environment.
lO M oARcPSD| 18269317
The SOAR strategy means ensuring the SOC can use actionable data to help mitigate and
stop threats which are developing more real-time than before. In traditional environments it
takes attackers very short time from the time of compromise until they have spread to
neighboring systems. Contrary to this it takes organizations typically a very long time to
detect threats that have entered their environment. SOAR tries to help solve this.
SOAR includes concepts such as IAC "Infrastructure as Code" to help rebuild and remediate
threats. SDN ("Software Defined Networking") to control accesses more fluently and easily,
and much more.
What to monitor?
Events can be collected across many different devices, but how do we determine what to
collect and monitor? We want the logs to have the highest quality. High fidelity logs that are
relevant and identifying to quickly stop the threat actors in our networks. We also want to
make it hard for attackers to circumvent the alerts we configure.
If we look at different ways to catch attackers, it becomes evident where we should focus.
Here is a list of possible indicators we can use to detect attackers, and how hard it is
considered for attackers to change.
IP Addresses Easy
Tools Challenging
lO M oARcPSD| 18269317
File checksums and hashes can be used to identify known pieces of malware or tools used by
attackers. Changing these signatures are considered to be trivial for attackers as their code
can be encoded and changed in multiple different ways, making the checksums and hashes
change.
IP Addresses are also easy to change. Attackers can use IP addresses from other
compromised hosts or simply use IP addresses within the jungle of different cloud and VPS
("Virtual Private Server") providers.
Domain Names can also be reconfigured quite easily by attackers. An attacker can configure
a compromised system to use a DGA ("Domain Generation Algorithm") to continuously use
a new DNS name as time passes. One week the compromised system uses one name, but the
next week the name has changed automatically.
Network and Host Artifacts are more annoying to change, as this involves more changes for
the attackers. Their utilities will have signatures, like a user-agent or the lack of thereof, that
can be picked up by the SOC.
Tools become increasingly harder to change for attackers. Not the hashes of the tools, but
how the tools behave and operate when attacking. Tools will be leaving traces in logs,
loading libraries and other things which we can monitor to detect these anomalies.
If the defenders are capable of identifying Tactics, Techniques and Procedures threat actors
use, it becomes even harder for attackers to get to their objectives. For example, if we know
the threat actor likes to use Spear-Phishing and then Pivoting peer-to-peer via to other victim
systems, defenders can use this to their advantage. Defenders can focus training to staff at
risk for spear-phishing and start implementing barriers to deny peer-to-peer networking.