Internship Presentation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

INTERNSHIP

Presentation

Presented by :
Preetam (2AB21EC014)
Rohit Naik (2AB22EC402)
Rohit Patgar (2AB21EC015)
Salik Ahmed (2AB21EC016)
Somashekhar (2AB21EC020)
01 Introduction

Company overview Task overiew


04
02

03 Internship role and Conclusion


05
responsibilities

Table of contents
Introduction
INTRODUCTION

Cybersecurity is the practice of protecting systems, networks, and data from


cyber attacks.

In today's interconnected world, where organizations and individuals rely


heavily on digital infrastructure, cybersecurity plays a crucial role in
safeguarding sensitive information and maintaining trust.
Types of Cyber Attacks

1. MALWARE 4. SQL INJECTION

2. PHISHING 5. MITM

3. DoS and DDoS 6. INSIDER THREAT


ABOUT
MAHE-ISAC COE for CYBESECURITY
MAHE, Manipal has signed an MoA with the Information Sharing and Analysis
Center(ISAC) which is a public-private-partner of the Ministry of Education.

This collaboration leads to an establishment of a MAHE-ISAC Center of


Excellence(CoE) at MIT, MAHE.

The aim is to providing students with a comprehensive education in cybersecurity,


equipping them with the knowledge, skills, and tools needed to tackle the complex
challenges posed by today's rapidly evolving threat landscape.
Penetration Tester :
Conducting penetration testing activities
to identify vulnerabilities in systems and
networks

Security Analyst :
Assisting in the monitoring and analysis
of security logs and doing vulnerability
scans

Internship
roles and responsibilities
Roles and Responsibilities

1 Planning and Preparations


Collaborating with team to define the scope
2 Execution of Attacks
Conducting the simulated attack according to the
predefined plan.
and objectives of the attack simulation.
Leveraging various tools and methodologies to
Researching known vulnerabilities and attack
exploit vulnerabilities and gain unauthorized
vectors relevant to the target model or system.
access.

4 Reporting and Documentation

3 Analysis of Attack
Identifying weaknesses, vulnerabilities, and
Compiling a comprehensive report
documenting the details of the attack
areas for improvement in the cybersecurity simulation, including Attack types and
defenses. name.
Task Overview
The project aimed to evaluate the
cybersecurity preparedness and
resilience of a smart city model
through simulated attacks, including
Denial of Service (DoS) and Man-in-
the-Middle (MitM) attacks.

By conducting these attacks, the


objective was to identify vulnerabilities
in the smart city infrastructure and
assess the effectiveness of existing
security measures in mitigating such
threats.
Attack Simulation

1. MAN-IN-THE-MIDDLE (MITM)
2. DENIAL OF SERICE (DoS)
MAN-IN-THE-MIDDLE

In the world of cybersecurity, a Man-in-the-Middle (MitM) attack


is a deceptive technique where an attacker intercepts
communication between two parties, secretly relaying and
possibly altering the messages exchanged.

This type of attack can compromise the confidentiality, integrity,


and authenticity of the communication without the knowledge of
the communicating parties.
MAN-IN-THE-MIDDLE
Denial of Service

A Denial of Service (DoS) attack is like a traffic jam on the


internet. Just as a traffic jam prevents cars from reaching their
destinations, a DoS attack floods a website or online service with
too much traffic. This overwhelms the system, making it slow or
completely unavailable to regular users.
Denial of Service
RECOMMENDATIONS

• Strengthening network security measures, such as implementing


intrusion detection and prevention systems (IDPS) or deploying
firewalls.

• Enhancing authentication and encryption mechanisms to secure


communication channels between IoT devices and backend systems.

• Improving incident response procedures to mitigate the impact of


cyberattacks and minimize downtime.
Conclusion
Throughout this internship at MAHE-ISAC Centre of
Excellence for Cybersecurity, we delved into critical
aspects of cybersecurity, focusing particularly on
attacks such as Denial of Service (DoS) and Man-in-
the-Middle (MitM).

These experiences have provided valuable insights


into the complexities and challenges of defending
against evolving cyber threats.

You might also like