Sample Internship Report
Sample Internship Report
BACHELOR OF TECHNOLOGY
in
Computer Science Department
by
Roshan Kumar
Regd. No.: ABC13A51
1
CERTIFICATE OF AUTHENTICIY
2
INTERNSHIP CERTIFICATE
3
TABLE OF CONTENTS
1. Acknowledgement -------------------------------------------------------- 4
2. Abstract -------------------------------------------------------- 5
4
ACKNOWLEDGEMENT
First of all, I would like to express my sincere gratitude to the platform that helped me to do the
online internship, InternshipWala.com, for their support, availability and insightful comments,
and for steering me to the right direction whenever I needed it. I also would like to thank all the
people who helped me complete this Internship/Training with their patience and openness and
the enjoyable learning environment they created.
It is indeed with a great sense of pleasure and immense sense of gratitude that I acknowledge the
help of these individuals. I would like to thank my Head of the Department Mr.
_________________, for his constructive criticism throughout my internship.
I would also like to thank InternshipWALA for their support and advices to complete internship
in above said organization. I am extremely grateful to my department staff members, friends and
my family who helped me in successful completion of this internship.
I would like to thank all those who I had the pleasure to learn with for making this demanding
time joyful yet efficient, and for taking the time to answer any of my questions.
Finally, I must express my very profound gratitude to my parents for providing me with unfailing
support and continuous encouragement throughout my years of study leading to this very
moment, and particularly for their sacrifices this year that allowed me to study abroad.
ROSHAN KUMAR
INTERN
5
ABSTRACT
This report describes the work I have done as part of my ____ week internship from a dynamic
online platform named, InternshipWala.com. The first task of this internship was the
development of the idea of online crime which is called cybercrime in reference to the variety of
loop holes of dark web.
In the current era of online processing, maximum of the information is online and prone to cyber
threats. There are a huge number of cyber threats and their behavior is difficult to early
understanding hence difficult to restrict in the early phases of the cyber-attacks. Cyber-attacks
may have some motivation behind it or may be processed unknowingly. The attacks those are
processed knowingly can be considered as the cyber-crime and they have serious impacts over
the society in the form of economic disrupt, psychological disorder, threat to national defense
etc. Restriction of cyber-crimes is dependent n proper analysis of their behavior and
understandings of their impacts over various levels of society.
The second task was to learn to possibility to avoid online crime or cyber crime and present the
possible tools which can help someone to not to be a victim of cybercrime. The second step is
also called cyber security. This report presents the result of my work on both of these tasks,
specifically, details about the resent threats of cybercrime to anyone who is using Internet.
Therefore the present report provides the understanding of cyber-crimes and their impacts over
society.
6
EXECUTIVE SUMMARY OF THE REPORT
Being one of the most rapidly expanding sectors, internet has become one of the most vital parts
of our life from work to entertainment there's no other option now but it comes with a price of
our privacy.
Cyber Crimes are also on the rapid expansion causing our sensitive data to be used without our
permission. Governments are aware of this matter doing everything they can to secure our
networks but many say security is just an illusion.
In this whole report of my Internship from InternshipWala.com we will analyze the strength of
the people who are trying to spoil the Cyber Ecosystem and the higher grounds where we can
deceive them.
Cyber security is considered as appropriate means of cyber crime, cyber risk, insurance, and
awareness to absorb financial impact caused by computer security breaches. Since first computer
incident we have been debating in which way that cyber security can be adapted to match the
threats, vulnerabilities and losses by have impact on our world. Nonetheless, this report is
demonstrating internship work-flow from March until April 2020. This is just small selected
segments of what we have learnt during the internship period. In a meantime, we provide
company overview, followed by the internship description and core objectives. Then we state the
company’s contribution to the period of internship and the report, too.
Eventually, the Internship Report contributes to develop secure architecture for end-to-end data.
Moreover, we have discussed the importance of cyber security, cyber insurance, and cyber risk,
coupled with the obedient approach of computer and information security. And additionally, we
conclude by pointing the accent to hence risk transfer, or in other words cyber insurance
industry.
7
ABOUT THE ORGANISATION
InternshipWALA
InternshipWala.com is an online Platform for Trainings, Internships and Projects. The company
is registered under Ministry of MSME, Govt. of India and also accredited by International
Accreditation Services. The International Accreditation Service (IAS) provides objective
evidence that an organization operates at the highest level of ethical, legal and technical
standards.
Online Trainings have become very popular as they are affordable, convenient and flexible. Any
student can learn the technologies at their own pace. The benefits of their online courses are that
they provide students the opportunity to plan study time as per their other commitments.
Students can study and work at their convenience.
InternshipWALA also provides online project ,where students can complete their Pre Final and
Final year Project online with expert guidance. They guide at each step, right from Synopsis
preparation, Software Installation, Coding, Testing and implementation. It is convenient for the
students to complete their project from their home.
Doing internships is no longer a choice but a necessity for college students like us. A large
number of universities and colleges across India have made internships a part of their
curriculum. With more and more employers looking for candidates with prior work experience,
internships are the way out for students. They help them gain valuable professional experience
and also understand the corporate work culture.
At InternshipWALA the students gets a chance to learn the technology online and then apply for
Internship at our partner companies to get real time work experience. Also, in today’s world,
students must have experience of work from home, using the gadgets and technologies available.
That is where InternshipWALA is different from many other online Platforms.
8
After spending a good some of six weeks with InternshipWala.com, I learnt their ultimate
Objective in association with the Internship that they are providing. As it has been noticed that
such platform is presented since long but the way they provided guidance is different. As I am a
student from Bihar Secondary Board Education and these Internships, projects Mock or
Communication Skills Have always been a challenge for me. Majority of students like me have
to face this problem. I found the solution of my problems a InternshipWala.com
Their objective is to provide the best learning experience to all. The intern also learns soft skills,
work culture, ethics and organizational behavior while undergoing training. This goes a long way
in helping the student to secure permanent employment in the future. At the end of our training
InternshipWala.com issue a Certificate attesting to their training and proficiency in a particular
field.
The second and the major purpose of InternshipWala is to make the student Industry ready. In
order to provide the students or learners the best quality learning they focus and arrange the
following cutting edge services as a part of their program:
Online Support
Timely lessons
Doubt Clarifying Classes
Webinars with Resource persons from Industry.
Mock with Expert and many more.
The most updated resource materials.
Offline Support
9
PLAN OF THE INTERNSHIP PROGRAM
10
LEARNING EXPERIENCES
Knowledge Acquired
I learnt in detail about the subject matter of my Internship. I learnt about the essential
requirements what I should attain to be ready for my Professional Career. I have got a
better idea about myself while learning with this platform. This internship introduced
myself to a to real-life work problems and hence I developed problem-solving skills. The
knowledge that I learnt with the help of this online Platform is also helpful in building
career options after my technical education.
Skills Learned
I have learnt several skills during my Internship. The things that I found really very
helpful are mentioned below:
Teamwork:
The first thing I need to mention is definitely team work. My internship experience is
different from my college project where one person did all the work and the grades were
shared among us. Here, it is more professional and each one in a team needs to work
together to finish the task. I learnt to work as a team without focusing entirely on myself.
I also learnt about the importance of Teamwork. I learnt how to act if I would be a
member or I would be the Team leader. It provided me the real experience with their
examples how to be in a Team.
11
evaluation so we should be our own judge and try to earn the customers’ trust for a long
run.
Group Discussion
We learnt what is a Group Discussion, what are the assessment measures utilized for
choosing/filtering participants, and how might one guarantee success in GDs. I learnt
that while short listing a candidate in a Group Discussion the Interview panel finds a
person who can communicate with a number of people such as colleagues, clients,
customers, and many more t bring business for the company. So, the one candidate who
has the leadership activity and whose expressions are effective and also who has the
power to organize his knowledge with the suitable word becomes the ultimate choice of
the panel. So in a nut shell the panel’s prime concern is to find out-who can make his
presence outstanding in the group. It becomes essential to be a good listener and then try
to snatch the time and put up your opinion in a logical manner.
Making Reports
The thing that I learnt under the term Report is as follows:
It is an organized statement of facts relating to a particular subject matter prepared by
the writer after making independent inquiry or investigation with or without opinions or
recommendations. Points that I learnt about writing a Report:
Accurate: The writer should be very obvious in drafting a report. The draft should be
precise.
Correctness: The sentence structure should be simple. The writer should avoid any
grammatical errors. The Report should look neat.
Data: Inaccurate data may cause serious problems so the writer should be very
precautious while writing a Report.
No Diction Error: No grammatical error is accepted in a Report. If a writer leaves
grammatical errors gives an impression of the writer to be irresponsible.
Significance: Irrelevant information should not be included in the report. If relevant
information is not included, the report is incomplete. If irrelevant information is included
the readers are puzzled.
Simple words: The writer should use simple words and easy to understand language.
Arrangement of Matters: The subject matter of the report should be symmetrically
arranged. If so, the readers can understand the report in the right direction.
SWOT Analysis
I learnt that SWOT analysis is a technique that enables organizations or individual to
move from everyday problems and traditional strategies to a fresh prospective. SWOT
analysis looks at your strengths and weaknesses, and the opportunities and threats your
12
business faces. SWOT can help your company face its greatest challenges and find its
most promising new markets. The SWOT Analysis framework is a very important and
useful tool to use in marketing Management and other business applications. A clear
understanding of SWOT is required for business majors. It is a technique that enables
organizations or individual to move from everyday problems and traditional strategies to
a fresh prospective.
Facing Interviews
After the completion of my training I learnt about the basic and important aspects to be
Industry ready. I learnt about one of the crucial things ‘Facing Interviews’. The details
and the idea what the InternshipWala provided me is going to help me in building my
career. The mock session was really very helpful to know my mistakes and not to repeat
in future.
13
The most challenging task
The challenge that I faced is time management. Earlier, I could just miss a class because I
had some personal commitments. During this internship which is almost the beginning of
my work life, I realized that I can’t mark my absence on a regular basis. That's why it
helped me to learn to manage time better by maintaining a balance between work and
personal life, without harming any of them.
The internship program is a great bridge for graduating students into the workplace.
14
SWOT ANALYSIS
Strength Opportunity
Brand Online Learning
Resource Persons Growing Technical Demand
Connectivity Technological Advancement
Weaknesses Threats
Load on Internet Competitors
Limited Subjects Work load
Duplicity
15
Introduction/Cybercrime
1) Internet Fraud.
2) Spam.
3) Cyber bullying.
5) Identity Theft.
6) Phishing scams.
7) Hate Crimes.
Cybercriminals buy and sell malware online (generally on the dark web) while also
trading in services that test how robust a virus is, business intelligence dashboards to
track malware deployment, and tech support (that’s right — crooks can contact a criminal
helpline to troubleshoot their illegal hacking server or other malfeasance!).
The professionalization and proliferation of cybercrime add up to countless costs in
damages every year, impacting individuals, businesses, and even governments. Experts
estimate that cybercrime damages will reach $6 trillion annually by 2021, making it one
16
of the most lucrative criminal enterprises.
As the Internet of Things (IoT) evolves and smart devices become more popular,
cybercriminals benefit from a much broader attack surface — increased opportunities to
penetrate security measures, gain unauthorized access, and commit crimes.
As the saying goes, there’s more than one way to skin a cat — and there are most
certainly a variety of ways to make money as a cybercriminal.
DESCRIPTION
Internet Fraud:
1) Internet Fraud
Internet fraud is the use of Internet services or software with Internet access to defraud
victims or to otherwise take advantage of them. Internet crime schemes steal millions of
dollars each year from victims and continue to plague the Internet through various
methods. Several high-profile methods include the following:
Business E-Mail Compromise (BEC): A sophisticated scam targeting businesses
working with foreign suppliers and companies that regularly perform wire transfer
payments. The scam is carried out by compromising legitimate business e-mail accounts
through social engineering or computer intrusion techniques to conduct unauthorized
transfers of funds.
Data Breach: A leak or spill of data which is released from a secure location to an
untrusted environment. Data breaches can occur at the personal and corporate levels and
involve sensitive, protected, or confidential information that is copied, transmitted,
viewed, stolen, or used by an individual unauthorized to do so.
Denial of Service: An interruption of an authorized users access to any system or
network, typically one caused with malicious intent.
E-Mail Account Compromise (EAC): Similar to BEC, this scam targets the general
public and professionals associated with, but not limited to, financial and lending
institutions, real estate companies, and law firms. Perpetrators of EAC use compromised
e-mails to request payments to fraudulent locations.
Malware: Malicious software that is intended to damage or disable computers and
computer systems. Sometimes scare tactics are used by the perpetrators to solicit funds
from victims.
Phishing/Spoofing: Both terms deal with forged or faked electronic documents.
Spoofing generally refers to the dissemination of e-mail which is forged to appear as
though it was sent by someone other than the actual source. Phishing also referred to as
vishing, smishing, or pharming, is often used in conjunction with a spoofed e-mail. It is
the act of sending an e-mail falsely claiming to be an established legitimate business in an
17
attempt to deceive the unsuspecting recipient into divulging personal, sensitive
information such as passwords, credit card numbers, and bank account information after
directing the user to visit a specified website. The website, however, is not genuine and
was set up only as an attempt to steal the user's information.
Ransomware: A form of malware targeting both human and technical weaknesses in
organizations and individual networks in an effort to deny the availability of critical data
and/or systems. Ransomware is frequently delivered through spear phishing emails to end
users, resulting in the rapid encryption of sensitive files on a corporate network. When
the victim organization determines they are no longer able to access their data, the cyber
perpetrator demands the payment of a ransom, typically in virtual currency such as
Bitcoin, at which time the actor will purportedly provide an avenue to the victim to regain
access to their data.
2. Spam
Spam is electronic junk mail or junk newsgroup postings. Some people define spam even
more generally as any unsolicited email. However, if a long-lost brother finds your email
address and sends you a message, this could hardly be called spam, even though it is
unsolicited. Real spam is generally email advertising for some product sent to a mailing
list or newsgroup.
Why is it Called Spam?
There is some debate about the source of the term, but the generally accepted version is
that it comes from the Monty Python song, "Spam spam spam spam, spam spam spam
spam, lovely spam, and wonderful spam". Like the song, spam is an endless repetition of
worthless text. Another school of thought maintains that it comes from the computer
group lab at the University of Southern California who gave it the name because it has
many of the same characteristics as the lunch meat Spam: Nobody wants it or ever asks
for it. No one ever eats it; it is the first item to be pushed to the side when eating the
entree. Sometimes it is actually tasty, like 1% of junk mail that is really useful to some
people. The term spam can also be used to describe any "unwanted" email from a
company or website -- typically at some point a user would have agreed to receive the
email via subscription list opt-in -- a newer term called graymail is used to describe this
particular type of spam.
3) Cyber Bullying
Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online
in social media, forums, or gaming where people can view, participate in, or share
content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or
mean content about someone else. It can include sharing personal or private information
about someone else causing embarrassment or humiliation. Some cyber bullying crosses
the line into unlawful or criminal behavior.
The most common places where cyber bullying occurs are:
Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok
Text messaging and messaging apps on mobile or tablet devices
Instant messaging, direct messaging, and online chatting over the internet
Online forums, chat rooms, and message boards, such as Reddit
Email
Online gaming communities
19
the United States Office of Personnel Management impacted personal and financial
information of millions of American, with calls for increasing information technology
security and protection of PII data by businesses and governmental agencies.
5) Identity Theft
Identity theft is the crime of obtaining the personal or financial information of another
person for the sole purpose of assuming that person's name or identity to make
transactions or purchases. Identity theft is committed in many different ways. Some
identity thieves sift through trash bins looking for bank account and bank statements;
other more high-tech methods involve accessing corporate databases to steal lists of
customer information. Once they have the information they are looking for, identity
thieves can ruin a person’s credit rating the standing of other personal information.
Identity thieves increasingly use computer technology to obtain other people's personal
information for identity fraud. To find such information, they may search the hard drives
of stolen or discarded computers; hack into computers or computer networks; access
computer-based public records; use information gathering malware to infect computers;
browse social networking sites; or use deceptive emails or text messages.
6) Phishing Spam
Phishing is a common type of cyber attack that everyone should learn about to protect
themselves. Phishing attacks are fraudulent communications that appear to come from a
reputable source. The goal is to trick the recipient into giving away sensitive data or to
install malware in the form of spyware on the victim's system. Spear phishing is a form of
phishing that targets one specific, high-profile individual.
Both spam and phishing are related to social engineering, a general term for any activity
in which an attacker is trying to manipulate you into revealing personal information.
Passwords, account credentials, social security numbers--you should always think twice
before giving out this information. Always verify who is really on the other end of the
line.
7) Hate Crime
A hate crime is when someone commits a crime against you because of your disability,
gender identity, race, sexual orientation, religion, or any other perceived difference.
It doesn’t always include physical violence. Someone using offensive language towards
you or harassing you because of who you are, or who they think you are, is also a crime.
The same goes for someone posting abusive or offensive messages about you online.
The term 'hate crime' can be used to describe a range of criminal behavior where the
perpetrator is motivated by hostility or demonstrates hostility towards the victim's
disability, race, religion, sexual orientation or transgender identity.
These aspects of a person's identity are known as 'protected characteristics'. A hate crime
20
can include verbal abuse, intimidation, threats, harassment, assault and bullying, as well
as damage to property. The perpetrator can also be a friend, caretaker or acquaintance
who exploits their relationship with the victim for financial gain or some other criminal
purpose
21
I found it very helpful to do this online Internship from Internshipwala.com. This was my first
time experience to be enrolled in any such experience. My concern was whether this company
will be able to come up my expectation as a student. I can state with affirmation that what I have
learnt from them is going to stay with me. This Internship course of Cybercrime has taught me
quite important subject matter in associations to the present time.
Cyber Crime is not something which we cannot deal with our self. Likewise, with little use of
our common sense and logic, we can stop Cyber Crimes from happening.
To conclude, we can say that Cyber Crime is a dangerous offense to someone’s privacy or any
material. Also, we can avoid Cyber Crime by following some basic logical things and using our
common sense. Above all, Cyber Crime is a violation of not only law but of human rights too.
22
1 Communication networks and systems for power utility automation – Part 1:
Introduction and Overview", 2012.
3. Online Resources
4. Google Images
NOTE- The references mentioned above and the subject matter are only
for understanding purpose. It is to tell you what and how to write under
Bibliography section and in order to write Internship Report.
Thank you!
23