0% found this document useful (0 votes)
130 views23 pages

Cyber Security IT Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views23 pages

Cyber Security IT Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

UNDERTAKE AT

NAPRIMA IDEAL TECHNOLOGIES LIMITED


NO. 5 MELROSE, OPP. GATE-6
UMUAHIA, ABIA STATE.

DONE BY

JUMBO IHEUKWUMERE INNOCENT


MOUAU/CME/19/107882

SUBMITED TO THE DEPARTMENT OF COMPUTER ENGINEERING


COLLEGE OF ENGINEERING AND ENGINEERING TECHNOLOGIES
MICHAEL OKPARA UNIVERSITY OF AGRICULTURE, UMUDIKE

NOVEMBER, 2024
ACKNOWLEDGEMENT
My Acknowledgement goes to the following individuals for their help, advice and support during
my attachment period: My Family, and everyone who made it possible for me to be here today.

ii
DEDICATION
This report is dedicated foremost to God Almighty for his favour, mercy and grace upon my life
especially during my four (4) months SIWES programme at NAPRIMA Ideal Technologies
Limited.
I would also like to dedicate this work to my parents, my siblings for their love and contributions
in making my SIWES training a fun and successful one.

iii
TABLE OF CONTENTS
Title Page i
Declaration ii
Dedication iii
Acknowledgement iv
Table of Content v
SECTION ONE
1.0 Introduction to SIWES 1
1.1 Background 2
1.2 Objectives of SIWES 3
SECTION TWO
2.0 Brief History of the Establishment 4
2.1 Company Profile 6
2.2 Company Organogram 7
SECTION THREE
3.0 Experience Gained 9
3.1. Introduction to Cyber Security 9
3.2. Key Concepts in Cyber Security 10
3.3. Types of Cyber Threats 10
3.3.1 Malware 11
3.3.2 Phishing 11
3.3.3 Denial-of-Service (DoS) Attacks 11
3.3.4 Man-in-the-Middle Attacks 11
3.4. Cyber Security Tools and Techniques 12
3.4.1 Firewalls and Intrusion Detection Systems 12
3.4.2 Antivirus and Anti-malware Software 13
3.4.3 Virtual Private Networks (VPNs) 13
3.4.4 Penetration Testing 13
3.5. Cyber Security Best Practices 14
3.5.1 Strong Password Policies 14
3.5.2 Regular Software Updates 15

iv
3.6. Cyber Security in Networks 16
3.6.1 Network Security Basics 17
3.6.2 Secure Network Protocols 18
3.6.3 Example: Protecting a Local Area Network (LAN) 19
SECTION FOUR
4.1. Conclusion 20
4.2. Reference 20

v
SECTION ONE

1
1.0 INTRODUCTION
The Students Industrial Work Experience Scheme (SIWES) is the accepted skills training
programme, which forms part of the approved Minimum Academic Standards in the various
programmes for all the Nigerian Tertiary Institution. It is an effort to bridge the gap existing
between theory and practical in engineering, sciences, agriculture, medical, management and
other professional programmes in the Nigerian tertiary institutions. SIWES program is aimed at
exposing the students to machines, equipments, professional work methods, and ways of
safeguarding the work area, workers in industries and other organizations. The SIWES is
founded by the Federal Government and jointly coordinated by the Industrial Training Fund
(ITF) and the National Universities Commission (NUC) in the year 1973 to solve the problem of
lack of adequate practical skill preparatory for employment in industries by Nigerian graduates
of tertiary institutions. The scheme exposes students to industry based skills necessary for a
smooth transition from the classroom to the world of work. It affords students of tertiary
institutions the opportunity of being familiarized which are usually not available in the
educational institutions.
Participation in SIWES has become a necessary pre-condition for the award of Diploma and
Degree certificates in specific discipline in most institutions of higher learning in the country, in
accordance with the education policy of government.
1.1 BRIEF HISTORY OF SIWES
The Unit was started in the Faculty of Engineering and Technology in 1979 as an Industrial
Coordinating Unit catering for engineering students on industrial attachment. The foundation
staff comprised an Industrial Coordinator, a Secretary/Typist and an Office Assistant until 1993
when an Assistant Industrial Coordinator was engaged.
As an accreditation requirement by the National Universities Commission (NUC), the unit was
formally upgraded to a Directorate in the Office of the Vice-Chancellor in August, 1999. Over
the years, the clientele student population has increased from 49 engineering students in 1979 to
over 2400 students from 26 disciplines spread across seven faculties of the university. The staff
strength has also increased to 10 members.

2
The scheme is funded by the federal Government of Nigeria. Beneficiaries are undergraduates of
the following disciplines: Agriculture, Engineering Technology, Environmental science,
Education, Medical Science and those in Pure and Applied Sciences. The duration is four months
for polytechnics and colleges of education, and six months for the Universities.

1.2 AIMS AND OBJECTIVES OF SIWES

The objectives of the student’s industrial work experience scheme [SIWES] are as follows:

i. To provide students an avenue to acquire industrial skills and experience in their course
of study.

ii. To prepare students for the work situation they are likely to meet after graduation.

iii. To expose students to work methods and technique in handling equipment and machinery
that may not be available in their various institutions.

iv. To give students the opportunity to understand more of the theoretical aspect of their
course of study and its applications in the real world.

v. It helps to teach student on the ethics involved in working or services and also increases
student opportunity for later job placement.

1.3 FUNCTIONS OF THE SIWES UNIT

By the directive of National Universities Commission (NUC) and Industrial Training Fund
(ITF), the Unit is mandated to carry out the following functions.

(i) Seeking of industrial placement for undergraduate students enrolled in disciplines scheduled
for participation in SIWES.

3
(ii) Supervision of the students placed in the industries located within our ITF zone.

(iii) Processing of students’ logbooks, ITF forms and industrial attachment reports upon which
is based on the Federal Government funding of supervision and students’ allowances.

(iv) Fostering of close links between the university and industries participating in SIWES
programme.

(v) Provision of advisory guidance to participating students on career employment opportunities.

(vi) Monitoring of compliance with the requirements of SIWES on the part of students in eligible
disciplines as a condition for graduation.

(vii) Facilitation of the disbursement of the students’ allowance to deserving students through e-
payment.

4
SECTION TWO

2.0 INDUSTRY ATTACHED

FIG 2.0: NAPRIMA IDEAL TECHNOLOGIES LIMITED

I did my industrial attachment at Naprima Ideal Technologies Limited. No 5 Melrose Umuariaga


off Ikot Ekepene Road

5
2.1 BRIEF HISTORY OF NAPRIMA IDEAL TECHNOLOGIES LIMITED

Naprima Ideal Technologies Limited is a registered ICT organization which was incorporated on
the 20th day of December, 2017. The organization is located at No 5 Melrose Umuariaga off
Ikot Ekepene Road. This location is close to Michael Okpara University of Agriculture and Abia
State University Extension (Umuahia Campus). We are a reputable information communication
technology organization, we develop ICT centers and laboratory, install ICT equipment and have
been training students on ICT programs for over three years. As the world is becoming more ICT
inclined, we are a firm basically dedicated to help people emphasize the use of computer in
business applications and transactions, skillfully impart ICT knowledge on our students to enable
them become more resourceful in their fields and careers, we have experienced
instructors/trainers who are well exposed in the world of ICT with several years of experience,
we partner with reputable ICT organizations in developing ICT centers and have dedicated and
committed ICT experts.

Naprima Ideal Technologies Limited was established by Mr. Ukaegbu Prince Mayor (Managing
Director). The organization was established to provide assistance and solution to various
computer software, hardware, security and other related ICT challenges. They also provide the
necessary assistance to IT students from computer science and computer engineering
departments by collaborating with the Federal Government in giving them required practical
knowledge in their course of study.

This organization over the years has recruited and trained world class professionals in the
information, communication and security unit.

6
ORGANIZATIONAL STRUCTURE

Figure 2.2 Organizational Chart

2.2 VARIOUS DEPARTMENTS/OFFICES AND THEIR FUNCTIONS:

Managing Director:

He is the general overseer that supervises the entire departments and also the sole owner of the
establishment.

Supervisors / Departmental Heads:

Their function is to supervise or direct the activities going on in their respective departments as
well as giving report of the day to day activities, income and expenditures made in their various
departments to the Managing Director.

Programming Department:

7
This department is concerned with the development of computer program using JAVA, VB.Net
and PYTHON programming languages.

Web designing Department:

This sub-department is concerned with development and maintenance of websites, both the one
of the establishment and the one of their client.

Video Editing Department:

This department is concerned with video editing and copying/ publication of videos i.e. mass
video production.

Software Production Department:

This department focuses on the burning and mass production of software for sale.

Solar system and Security Device Installation and Sale Department:

Deals with car tracking services, sale of car Tracking devices and installation of CCTV cameras
and other related security devices.

8
SECTION THREE

3.0 EXPERIENCE GAINED

1. Introduction to Cyber Security


Cyber security refers to the practice of protecting systems, networks, and data from digital
attacks. Its importance has grown as cyber threats become more sophisticated, and organizations
are increasingly reliant on secure IT infrastructure to protect sensitive information.

1.2 Overview of Cyber Threats


Cyber threats include various forms of attacks like malware, phishing, ransomware, and denial-
of-service attacks. These attacks target systems to steal, alter, or destroy data, disrupting normal
operations.

1.3 The Role of Cyber Security in IT


In the IT landscape, cyber security ensures that data is protected from unauthorized access and
that systems remain operational in the face of attacks. It involves continuous monitoring,
updating security protocols, and responding to incidents swiftly.

2. Key Concepts in Cyber Security

2.1 Confidentiality, Integrity, and Availability (CIA Triad)


The CIA Triad is a fundamental model in cyber security. Confidentiality ensures that data is
accessible only to those with permission, integrity guarantees the accuracy and trustworthiness of
data, and availability ensures that data is accessible to authorized users whenever needed.

9
7. Projects and Classwork During IT

7.1 Network Security Project: Implementing Firewalls


In this project, we focused on network security by implementing firewalls to protect a network
from unauthorized access. Using firewall configurations, we filtered traffic and monitored
suspicious activities.

7.2 Ethical Hacking: Vulnerability Scanning


We conducted a vulnerability scan to identify potential weaknesses in a system. Using tools such
as Nmap and OpenVAS, we scanned the network for open ports and known vulnerabilities,
simulating how an attacker might exploit weaknesses.

7.3 Data Encryption and Decryption: A Python-Based Project


This project involved encrypting and decrypting sensitive information using Python's
cryptography libraries. By implementing encryption algorithms like AES, we ensured data
confidentiality, demonstrating the role of cryptography in securing communications.

7.4 Cyber Awareness Training Program


As part of our IT training, we developed a cyber awareness program aimed at educating
employees about potential cyber threats and the best practices to avoid falling victim to cyber
attacks. The training covered phishing, safe browsing habits, and password security.
3. Types of Cyber Threats
3.1 Malware:
Malware (malicious software) refers to any program or file that is intentionally designed to harm
or exploit any computer or network. It includes viruses, worms, Trojans, ransomware, spyware,
adware, and other types of harmful software. Malware often steals sensitive data, corrupts files,
or disrupts operations.

3.2 Phishing:
Phishing is a cyber attack that involves tricking individuals into disclosing sensitive information
like usernames, passwords, and credit card numbers by pretending to be a trustworthy entity in
electronic communication. It commonly happens via email, fake websites, or social media.

10
3.3 Denial-of-Service (DoS) Attacks:
DoS attacks aim to overwhelm a system's resources, making it unavailable to legitimate users.
Attackers flood the target with a massive volume of traffic, causing the system to crash or slow
down. A Distributed Denial-of-Service (DDoS) attack involves multiple systems to amplify the
attack.

3.4 Man-in-the-Middle Attacks:


A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts and alters
communication between two parties without their knowledge. This can happen in unsecured
networks, allowing attackers to steal or manipulate data, such as login credentials or financial
transactions.

4. Cyber Security Tools and Techniques


4.1 Firewalls and Intrusion Detection Systems:
Firewalls monitor and control incoming and outgoing network traffic based on predetermined
security rules. They act as a barrier between trusted internal networks and untrusted external
networks. Intrusion Detection Systems (IDS) detect and respond to malicious activity within a
network.

4.2 Antivirus and Anti-malware Software:


These software tools are designed to detect, prevent, and remove malicious software (malware)
from a computer. Antivirus programs typically focus on preventing virus infections, while anti-
malware covers a broader range of malicious software, including spyware, ransomware, and
Trojans.

4.3 Virtual Private Networks (VPNs):


A VPN encrypts internet traffic and routes it through a secure server, masking the user's IP
address and location. It provides anonymity and secures communications, especially on public
networks, by protecting sensitive data from hackers and eavesdroppers.

4.4 Penetration Testing:

11
Penetration testing, or ethical hacking, involves simulating cyberattacks on a system to identify
vulnerabilities. It is conducted to assess the security posture of a system or network, helping
organizations discover weaknesses before malicious attackers can exploit them.

5. Cyber Security Best Practices


5.1 Strong Password Policies:
Using complex and unique passwords for each account is crucial in preventing unauthorized
access. Strong passwords combine letters, numbers, and symbols, making them harder to crack.
Password policies should enforce regular changes and multi-factor authentication (MFA) for
added security.

5.2 Regular Software Updates:


Software updates often include patches for security vulnerabilities that hackers may exploit.
Regularly updating operating systems, applications, and security software is critical in
maintaining a secure environment and protecting against new threats.

5.3 Data Encryption:


Encryption is the process of converting data into a secure format to prevent unauthorized access.
It ensures that sensitive data, such as financial information or personal identifiers, is unreadable
without the proper decryption key, providing protection during storage and transmission.

5.4 User Awareness and Training:


Educating users on cybersecurity risks and safe online behavior is crucial for protecting systems.
Regular training on identifying phishing emails, using strong passwords, and following security
protocols helps reduce human error, which is often the weakest link in security.

6. Cyber Security in Networks


6.1 Network Security Basics:
Network security involves protecting a computer network from malicious activities, data
breaches, and unauthorized access. This includes implementing measures such as firewalls,

12
encryption, access controls, and secure protocols to safeguard the integrity, confidentiality, and
availability of the network.

6.2 Secure Network Protocols:


Network protocols like HTTPS, TLS, and IPsec are designed to secure communications over a
network. These protocols encrypt data, ensuring privacy and protection against interception and
tampering. Secure protocols are essential for safe online transactions and secure
communications.

6.3 Example: Protecting a Local Area Network (LAN):


To secure a LAN, administrators can use firewalls to block unauthorized access, implement
network segmentation to limit the impact of a breach, and use secure protocols like WPA2 for
Wi-Fi encryption. Regular monitoring, strong authentication, and user access controls are also
important.

7. Projects and Classwork During IT


7.1 Network Security Project: Implementing Firewalls:
This project involves configuring and managing firewalls to protect networks from external and
internal threats. It teaches how to filter traffic, block malicious connections, and ensure only
authorized users can access sensitive network resources.

7.2 Ethical Hacking: Vulnerability Scanning:


Vulnerability scanning identifies security flaws in systems or networks that could be exploited
by hackers. In this project, students conduct scans to find weaknesses, understand how hackers
could exploit them, and suggest solutions to fix the vulnerabilities.

7.3 Data Encryption and Decryption: A Python-Based Project:


This project demonstrates how to implement encryption algorithms in Python, such as AES or
RSA, to protect sensitive data. It involves encoding data into unreadable formats and then
decrypting it back into its original form using the correct key.

13
7.4 Cyber Awareness Training Program:
This project focuses on developing and delivering a training program to raise awareness about
cybersecurity risks, best practices, and preventive measures. The goal is to educate users on how
to protect themselves and the organization's data from cyber threats.

Figure 3.1: Introduction to Ethical Hacking

14
Figure 3.2: Practical on Computer Virus and Troubleshooting

Figure 3.3: Network detection and Password Cracking

15
Figure 3.4: Mobile Network Detection and Analysis

16
SECTION FOUR

SUMMARY, RECOMMENDATION AND CONCLUSION

4.1 SUMMARY

Student industrial work experience scheme (SIWES) is a very good program, which exposes

Nigerian students to industry based skills necessary for a smooth transition from the classroom to

the world of work. It affords students of tertiary institutions the opportunity of being familiarized

and exposed to the needed experience in handling machinery and equipment which are usually

not available in the educational institutions. The industrial training program was a successful

one, despite the challenge I faced in getting a place for my IT, yet I really enjoyed embarking on

it.

SIWES provided an avenue for me to acquire industrial skills and experience. It also

availed me the opportunity to apply the knowledge I have acquired so far in real world situation.

24 weeks of attachment with Research Institution availed me the opportunity to be exposed to

the practical aspects of my course of study.

I believe my transition/shift from school environment for acquisition of more practical

knowledge in my field of study at Research Institution during this Industrial Training period

will give me an opportunity for better job placement.

4.2 RECOMMENDATION

I recommend that SIWES should continue because of its numerous benefits to the

students, institutions and the nation at large. Industries and private organizations that accepts or

that takes IT students should also encourage the IT Students by giving them stipend / pocket

money at least for their transportation fair.

17
The duration of six months could seem good for the Industrial Training, but is not enough

to get all or cover most of the training involved in some packages.

Secondly, the institution should please, provide all the necessary support in assisting the students

to secure a place of industrial Training with their influence and also regularize their supervisory

visit to the place of attachment to make the program, a continuous and flowing one with respect

to communication of problems and solution to them.

4.3 CONCLUSION

SIWES should continue in Nigeria because of its important role of exposing students to the

world of work/ practical experience; preparing us the students, ahead of the common challenges

of labor market in Nigeria. SIWES also encourages some unserious students to sit up in their

academics, knowing that life outside the university walls is not a bed of roses.

I want to use this medium to advice future participants of SIWES program from this great

institution and beyond to ensure that they attend students’ orientation on SIWES program and

also to be fully committed with their IT training. For no student can afford to miss out of this

golden opportunity, of been exposed to the core practical aspect of their course of study.

18

You might also like