CYBER SECURITY INTERNSHIP
TASK -3
Submitted to
Supraja technologies
vijayawada
Submitted by
BATCHNO-23AV
EMPLOYEE ID-ST#IS#4471
NAME-P. V. N. JANAKI DEVI
¾ B. Tech (cyber security)
Bapatla Engineering College
ABSTRACT
Cyber security restricted to describing the criminal activity
in which the computer or network is a part of crime like
fraud, theft &black mail. cyber security includes protection
from theft, corruption or natural disaster while allowing the
information &property remain accessible.
Table of Contents
INTRODUCTION .................................................................. 1
NETWORK CONCEPTS
TYPES OF NETWORKS ............................................... 2-3
TYPES OF TOPOLOGIES ............................................ 4-5
TYPES OF NETWORK DEVICES ............................... 6-7
CLASSIFICATION OF IP ................................................ 8
TYPES OF SUBNETS…………….……………………..8
OSI LAYER…………..……………………………9-10
WINDOWS COMMANDS………………….…………11-14
KALI LINUX COMMANDS……………………...15-17
INTRODUCTION
Cybersecurity refers to the practice of protecting computer
systems, networks, and digital information from unauthorized
access, theft, damage, and other forms of malicious attacks.
With the rise of the internet and the increasing reliance on
digital technologies, cybersecurity has become an essential
component of modern-day business and society.
NETWORK CONCEPTS
First we can see types of networks
TYPES OF NETWORKS-
In networks they are several types of networks, each designed
to serve specific purposes and meet different requirements.
➢ LOCAL AREA NETWORK(LAN)- • A LAN is a
network that covers a small geographical area, typically
within a single building or campus. It connects devices
like computers, printers, and servers to facilitate resource
sharing and communication.
➢ Wide Area Network (WAN): A WAN is a network that
spans large geographical areas, connecting multiple
LANs or other networks. The Internet is an example of a
WAN. WANs utilize routers, switches, and
telecommunications links to enable communication
between geographically dispersed locations.
➢ Metropolitan Area Network (MAN): A MAN is a
network that spans a city or a metropolitan area,
connecting multiple LANs. It provides high-speed
connections for organizations within a specific region.
➢ Wireless Local Area Network (WLAN): A WLAN is a
type of LAN that uses wireless communication instead of
wired connections. It allows devices to connect to a
network using Wi-Fi technology, providing flexibility
and mobility.
➢ Campus Area Network (CAN): A CAN is a network that
connects multiple LANs within a university campus or
corporate campus. It provides seamless communication
and resource sharing for a large-scale organization.
➢ Storage Area Network (SAN): A SAN is a specialized
network that provides high-speed access to consolidated
storage resources. It enables multiple servers to access
shared storage devices, such as disk arrays or tape
libraries.
➢ Virtual Private Network (VPN): A VPN is a secure
network that extends a private network across a public
network (usually the Internet). It enables remote users to
securely access the private network's resources and
encrypts the communication to ensure confidentiality.
➢ Peer-to-Peer Network (P2P): In a P2P network, devices
are connected directly to each other without a central
server. Each device can act as both a client and a server,
allowing shared resources and decentralized
communication.
➢ Client-Server Network: In a client-server network, there
is a central server that provides resources, services, and
manages network access. Clients, such as computers or
mobile devices, connect to the server to request and
utilize these resources.
CONCLUSION-
They are specialized networks such as industrial networks,
cellular networks, and more, each designed for specific
purposes and applications.
TYPES OF TOPOLOGIES-
In computer networks, topology refers to the physical or
logical arrangement of devices and links in a network. Here
are some common types of network topologies:
➢ Bus Topology: In a bus topology, all devices are
connected to a single communication medium, typically
a cable called a bus. Each device shares the same
communication channel and can transmit or receive data.
However, if the main cable fails, the entire network may
be affected.
➢ Star Topology: In a star topology, all devices are
connected to a central device, usually a network switch
or hub. The central device acts as a central point of
communication and manages the traffic between devices.
If one device fails, it does not affect the rest of the
network, but the central device becomes a single point of
failure.
➢ Ring Topology: In a ring topology, devices are
connected in a closed loop, where each device is
connected to its adjacent devices. Data travels around the
ring in one direction, and each device acts as a repeater
to amplify and forward the signal. If one device or link
fails, it can disrupt the entire network.
➢ Mesh Topology: In a mesh topology, each device is
connected to every other device in the network, creating
multiple paths for data transmission. Mesh networks
provide high reliability and fault tolerance since multiple
paths ensure that data can still reach its destination even
if one or more devices or links fail. However, mesh
topologies require a significant amount of cabling and
can be complex to implement.
➢ Tree Topology: A tree topology combines characteristics
of bus and star topologies. It uses a hierarchical structure
where multiple star topologies are connected in a bus
configuration. Devices are connected to intermediate
devices, such as switches or routers, which further
connect to a root device. This topology allows for
scalability and easier network management.
➢ Hybrid Topology: A hybrid topology is a combination of
two or more different topologies. It can be a mix of any
of the mentioned topologies to suit specific network
requirements. For example, a network may have a star
topology at the core and use a mesh or bus topology for
certain segments.
CONCLUSION-
These topologies can be implemented in both wired and
wireless networks, with appropriate physical or virtual
connections. The choice of topology depends on factors such
as network size, scalability, reliability, cost, and the specific
needs of the network.
TYPES OF NETWORK DEVICES-
There are various types of network devices that are used to
facilitate communication, provide connectivity, and manage
network operations. They are
➢ Network Switch: A network switch is a device that
connects multiple devices within a local area network
(LAN). It receives incoming data packets and forwards
them to the appropriate destination based on the
destination MAC address. Switches operate at the data
link layer (Layer 2) of the OSI model.
➢ Router: A router is a device that connects multiple
networks together and directs network traffic between
them. Routers use routing tables to determine the best
path for forwarding data packets based on network
addresses. They operate at the network layer (Layer 3) of
the OSI model and can provide functions such as IP
address assignment and network security.
➢ Wireless Access Point (WAP): A wireless access point
is a device that allows wireless devices to connect to a
wired network using Wi-Fi technology. It acts as a bridge
between wireless devices and the wired network
infrastructure, providing wireless connectivity.
➢ Network Firewall: A network firewall is a security
device that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. It
helps protect the network from unauthorized access and
potential threats by filtering and blocking certain types of
traffic.
➢ Network Hub: A network hub is a basic networking
device that connects multiple devices together in a LAN.
However, unlike switches, hubs operate at the physical
layer (Layer 1) of the OSI model and simply broadcast
incoming data to all connected devices. They do not
analyse or manage network traffic.
➢ Modem: A modem (modulator-demodulator) is a device
used to connect a computer or network to an Internet
service provider (ISP). It converts digital data from a
computer into analog signals for transmission over
telephone lines or other communication mediums, and
vice versa.
➢ Network Bridge: A network bridge is a device that
connects two separate LANs or network segments
together. It operates at the data link layer (Layer 2) and
forwards data packets between the connected networks
based on MAC addresses.
➢ Network Repeater: A network repeater is a device used
to regenerate or amplify network signals to extend the
reach of a network. It receives weak signals, strengthens
them, and forwards them to the next segment of the
network.
➢ Network Load Balancer: A network load balancer
distributes network traffic across multiple servers or
network resources to optimize performance, improve
reliability, and avoid overloading any single resource.
➢ Network Proxy Server: A proxy server acts as an
intermediary between clients and servers, handling
requests on behalf of the clients and forwarding them to
the appropriate servers. It can provide functions such as
caching, filtering, and improved security.
CLASSIFICATION OF IP
In ip we can have five classes, they are
Class A nid.hid.hid.hid 0-126
Class B nid.nid.hid.hid 128-191
Class C nid.nid.nid.hid 192-223
Class D Multicast address 224-239
Class E reserved 240-255
TYPES OF SUBNETS-
There are several types of subnets they are
➢ Default subnets
➢ Custom subnets
➢ Private subnets
➢ Public subnets
➢ Hybrid subnets
CONCLUSION- The specific types and configurations of
subnets in a network depend on factors such as the network
design, addressing requirements, and the organization's
specific needs.
OSI LAYER
The OSI (Open Systems Interconnection) model is a
conceptual framework that defines the functions and
interactions of a communication system. It consists of seven
layers, each responsible for specific tasks and functions. Here
are the seven layers of the OSI model:
1. Physical Layer: The physical layer is the lowest layer of
the OSI model. It deals with the physical transmission of
data over a communication channel. It defines the
electrical, mechanical, and procedural aspects of the
physical medium, such as cables, connectors, and signal.
2. Data Link Layer: The data link layer provides reliable
and error-free transmission of data frames between
adjacent network nodes. It ensures the integrity of data
transmission by adding error detection and correction
mechanisms. It also manages access to the physical
medium and handles the framing of data.
3. Network Layer: The network layer is responsible for
logical addressing and routing of data across multiple
networks. It establishes, maintains, and terminates
connections between source and destination hosts. IP
(Internet Protocol) is a commonly used protocol at this
layer.
4. Transport Layer: The transport layer ensures reliable
end-to-end communication between hosts. It segments
and reassembles data from upper layers into smaller units
(segments) for transmission. It also handles flow control,
error recovery, and congestion control. TCP
(Transmission Control Protocol) and UDP (User
Datagram Protocol) are prominent protocols at this layer.
5. Session Layer: The session layer establishes, maintains,
and terminates sessions between applications running on
different network devices. It manages the coordination
and synchronization of communication between these
applications.
6. Presentation Layer: The presentation layer is responsible
for data representation and transformation. It formats,
encrypts, and compresses data to ensure compatibility
between different systems. It also handles tasks such as
data encryption and decryption.
7. Application Layer: The application layer is the highest
layer of the OSI model. It provides services directly to
end-user applications. This layer includes protocols such
as HTTP (Hypertext Transfer Protocol), SMTP (Simple
Mail Transfer Protocol), FTP (File Transfer Protocol),
and DNS (Domain Name System).
CONCLUSION-
The OSI model provides a structured approach to understand
and discuss the various functions and protocols involved in
network communication. However, it's important to note that
in practice, many modern networking protocols do not strictly
adhere to the OSI model and may have different architectural
designs.
WINDOWS COMMANDS
Windows operating system provides a wide range of built-in
commands that can be executed via the Command Prompt or
PowerShell. Here are some commonly used Windows
commands:
➢ Ipconfig- Displays IP configuration information,
including IP address, subnet mask, and default gateway.
➢ ping: Sends ICMP echo requests to a specified IP address
or domain to test network connectivity.
➢ mkdir: Creates a new directory.
➢ cd: Changes the current directory.
➢ dir: Lists files and directories in the current directory.
➢ rmdir: Deletes a directory.
➢ systeminfo: Displays detailed information about the
computer's hardware and software configuration.
➢ 14 netstat: Displays active network connections, listening
ports, and network statistics.
➢ tasklist: Lists running processes.
KALI LINUX COMMANDS
➢ ifconfig: Displays network interface information, such as
IP addresses, MAC addresses, and network
configuration.
➢ ping: Sends ICMP echo requests to a specified IP address
or domain to check network connectivity.
➢ ls: Lists files and directories in the current directory.
➢ pwd: Prints the current working directory (the directory
you are currently in).
➢ cd: Changes the current directory. For example, cd
/path/to/directory moves to the specified directory, and
cd .. moves up one directory.
➢ mkdir: Creates a new directory. For example, mkdir
new_directory creates a directory named
"new_directory" in the current location.
➢ rm: Removes files and directories. For example, rm
file.txt deletes a file, and rm -r directory deletes a
directory and its contents recursively.
➢ cp: Copies files and directories. For example, cp file.txt
destination copies "file.txt" to the specified destination.
➢ echo-it can write the text.for example echo “hi kali”.
➢ history: Displays a list of previously executed
commands.
➢ ps: Lists the currently running processes.