0% found this document useful (0 votes)
85 views

Internship Presentation

Uploaded by

ddscraft123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Internship Presentation

Uploaded by

ddscraft123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

INTERNSHIP

Presentation

Presented by :
Preetam (2AB21EC014)
Rohit Naik (2AB22EC402)
Rohit Patgar (2AB21EC015)
Salik Ahmed (2AB21EC016)
Somashekhar (2AB21EC020)
01 Introduction

Company 04 Task overiew


02 overview

03 Internship role 05 Conclusion


and
responsibilities

Table of contents
Introduction
INTRODUCTION

Cybersecurity is the practice of protecting systems, networks, and data from


cyber attacks.

In today's interconnected world, where organizations and individuals rely


heavily on digital infrastructure, cybersecurity plays a crucial role in
safeguarding sensitive information and maintaining trust.
Types of Cyber Attacks

1. MALWARE 4. SQL INJECTION

2. PHISHING 5. MITM

3. DoS and DDoS 6. INSIDER THREAT


ABOUT
MAHE-ISAC COE for CYBESECURITY
MAHE, Manipal has signed an MoA with the Information Sharing and Analysis
Center(ISAC) which is a public-private-partner of the Ministry of Education.

This collaboration leads to an establishment of a MAHE-ISAC Center of


Excellence(CoE) at MIT, MAHE.

The aim is to providing students with a comprehensive education in cybersecurity,


equipping them with the knowledge, skills, and tools needed to tackle the complex
challenges posed by today's rapidly evolving threat landscape.
Penetration Tester :
Conducting penetration testing activities
to identify vulnerabilities in systems and
networks

Security Analyst :
Assisting in the monitoring and analysis
of security logs and doing vulnerability

Internship
scans

roles and responsibilities


Roles and Responsibilities

1 Planning and Preparations


Collaborating with team to define
2 Execution of Attacks
Conducting the simulated attack
the scope and objectives of the attack according to the predefined plan.
simulation.
Leveraging various tools and
Researching known vulnerabilities methodologies to exploit vulnerabilities
and attack vectors relevant to the and gain unauthorized access.

4
target model or system.

Reporting and Documentation

3 Analysis of Attack
Identifying weaknesses,
Compiling a comprehensive report
documenting the details of the
vulnerabilities, and areas for attack simulation, including Attack
improvement in the cybersecurity types and name.
defenses.
Task Overview
The project aimed to evaluate the
c ybe rse c ur i t y p re p a re d n e s s a n d
re s i l i e n c e o f a s m a r t c i t y m o d e l
through simulated attacks, including
Denial of Service (DoS) and Man-in-
the-Middle (MitM) attacks.

By conducting these attacks, the


objective was to identify vulnerabilities
in the smart city infrastructure and
assess the effectiveness of existing
security measures in mitigating such
threats.
Attack
Simulation
1. MAN-IN-THE-MIDDLE (MITM)
2. DENIAL OF SERICE (DoS)
MAN-IN-THE-MIDDLE

In the world of cybersecurity, a Man-in-the-Middle (MitM) attack


is a deceptive technique where an attacker intercepts
communication between two parties, secretly relaying and
possibly altering the messages exchanged.

This type of attack can compromise the confidentiality, integrity,


and authenticity of the communication without the knowledge of
the communicating parties.
MAN-IN-THE-MIDDLE
Denial of Service

A Denial of Service (DoS) attack is like a traffic jam on the internet.


Just as a traffic jam prevents cars from reaching their destinations,
a DoS attack floods a website or online service with too much
traffic. This overwhelms the system, making it slow or completely
unavailable to regular users.
Denial of Service
RECOMMENDATIONS

• Strengthening network security measures, such as implementing


intrusion detection and prevention systems (IDPS) or deploying
firewalls.

• Enhancing authentication and encryption mechanisms to secure


communication channels between IoT devices and backend systems.

• Improving incident response procedures to mitigate the impact of


cyberattacks and minimize downtime.
Conclusion
Throughout this internship at MAHE-ISAC Centre of
Excellence for Cybersecurity, we delved into critical
aspects of cybersecurity, focusing particularly on
attacks such as Denial of Service (DoS) and Man-in-
the-Middle (MitM).

These experiences have provided valuable insights


into the complexities and challenges of defending
against evolving cyber threats.

You might also like