0% found this document useful (0 votes)
34 views24 pages

Johnson Joel Technical Report

Report

Uploaded by

aweboluwatife4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views24 pages

Johnson Joel Technical Report

Report

Uploaded by

aweboluwatife4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

A TECHNICAL REPORT

ON

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) TRAINING


PROGRAMME

HELD AT

BLUESCRIPTS IT INSTITUTE, SECOND FLOOR, OPPOSITE TEACHERS HOUSE,

OLUYOLE ESTATE, IBADAN OYO STATE.

BY

JOHNSON JOEL OLAOLUWA


MATRIC NO: CSC/20/053

SUBMITTED

TO

THE DEPARTMENT OF COMPUTER SCIENCES, OLUSEGUN AGAGU


UNIVERSITY OF SCIENCE AND TECHNOLOGY, OKITIPUPA, ONDO STATE

IN PARTIAL FULFILMENT OF THE REQUIRMENTS FOR THE AWARD OF


BACHELOR OF SCIENCE (B.SC) IN COMPUTER SCIENCE.

NOVEMBER, 2024
DECLARATION
I, JOHNSON JOEL OLAOLUWA hereby declare that this report was written by me and is a
record of all activity carried out during the SIWES period. All sources of information are clearly
acknowledged by means of references.

Signature of Student ………………...

Date ………………………………...

i
CERTIFICATION
This is to certify that the activities reported in this SIWES report were carried out by JOHNSON
JOEL OLAOLUWA and submitted to the Department of Computer Sciences, Computer
Science, Olusegun Agagu University of Science and Technology, Okitipupa, Ondo State, having
met the standards as required by the institution and approved as to contents and style:

Dr. Orogbemi ----------------------------------

SIWES Supervisor signature/Date

Engr. Modupe Agagu ----------------------------------

Departmental SIWES Coordinator signature/Date

Prof. A.O. Adetunmbi ----------------------------------

H.O.D Computer Science signature/Date

ii
DEDICATION
I am grateful to God Almighty for His generosity, protection, guidance, and good health, as well

as for His ongoing supervision of me during the period of industrial training. He was on my side

all along.

This technical report is dedicated to my parents and siblings, who have consistently supported

and motivated me throughout my academic and professional pursuits. I couldn't have finished

this industrial training without their loving assistance.

iii
TABLE OF CONTENT

DECLARATION................................................................................................................................ 2

CERTIFICATION.............................................................................................................................. 3

DEDICATION...................................................................................................................................4

ACKNOWLEDGEMENT....................................................................................................................6

2.2 VISION.............................................................................................................................12

2.3 ORGANOGRAM OF THE INSTITUTE.....................................................................................12

CHAPTER THREE...........................................................................................................................13

3.0 EXPERIENCE GAINED/KNOWLEDGE ACQUIRED..................................................................13

3.1 INTRODUCTION TO CYBERSECURITY...............................................................................13

3.1.2 FUNDAMENTALS OF CYBER SECURITY.............................................................................13

3.1.3 KEY SECURITY TERMS USED IN CYBERSECURITY..............................................................13

3.1.4 ELEMENTS OF SECURITY..............................................................................................14

3.1.5 METHODS OF IDENTITY THEFT.....................................................................................14

3.1.6 BASIC SECURITY GUIDELINES.......................................................................................14

3.2 NETWORKING.....................................................................................................................15

3.2.1 KEY NETWORK COMPONENTS.........................................................................................15

3.2.2 TYPES OF NETWORKS......................................................................................................16

iv
3.2.3 NETWORK MEDIA............................................................................................................17

3.3 CONVERSION OF PETROL ENGINES TO COMPRESSED NATURAL GAS................................18

3.3.1 TOOLS FOR CNG CONVERSION........................................................................................18

3.3.2 CONVERSION PROCESS OF PETROL TO COMPRESSED NATURAL GAS (CNG)...................20

3.3.3 BENEFITS OF CONVERTING TO CNG................................................................................20

3.3.4 CHALLENGES OF CNG CONVERSION................................................................................20

CHAPTER FOUR............................................................................................................................ 22

4.0 CHALLENGES ENCOUNTERED.............................................................................................22

4.1 CONCLUSION......................................................................................................................22

REFERENCES.................................................................................................................................23

v
ACKNOWLEDGEMENT
First and foremost, I want express my gratitude to God Almighty for the successful completion of

my Industrial training, for seeing me through those months and also making it a success.

I would like to sincerely appreciate my industrious supervisor Mr. Oyinloye Moses Adedeji for his

valuable advice, guidance, and encouragement during the course of this work.

I would like to sincerely appreciate my visiting supervisor, for her warm and kind relation and

attitude during her visitation for supervision.

I want to express my heartfelt appreciation to my SIWES Supervisor, Dr. Orogbemi for

dedicating her time to meticulously review and provide thoughtful corrections to my report.

My profound gratitude goes to the Head of Department, Dr. Mrs. Gbadamosi and all the staff

(academic and non-academic) of the Department of Computer Sciences for your restless effort in

ensuring you give your best in teaching and tutoring.

And lastly, I must also express my heartfelt gratitude to my parent, Mr. and Mrs. Johnson and my

siblings for their endless efforts in all ramifications by ensuring I become very hardworking in

the society and for their incomparable support, care, assistance and blessing during the course of

this work. Thank you and God bless you all.

vi
ABSTRACT

This report provides a comprehensive overview of my seven weeks industrial training experience

at Bluescripts Infotech Institute, located on the 2nd floor opposite Teacher's House, Oluyole

Estate, Ibadan. The training spanned from April 29, 2024, to June 14, 2024, and focused

primarily on cybersecurity and Python for data science.

This report further expatiates on the aspects of cybersecurity, networking, Ethical Hacking and

Python for data science. The first chapter provides a comprehensive introduction to cyber

security, covering the fundamental concepts and principles of this critical field. It defines key

security terms and elements, such as confidentiality, integrity, and availability, and discusses the

various methods of identity theft, including phishing, social engineering, and malware attacks.

The chapter also provides basic security guidelines to follow, including password management,

software updates, and network security best practices.

vii
viii
CHAPTER ONE

1.0 INTRODUCTION TO SIWES


The Student Industrial Work Experience Scheme (SIWES) is an initiative in Nigeria designed to

bridge the gap between theoretical knowledge acquired in academic institutions and practical,

real-world experience. Established by the Industrial Training Fund (ITF) in 1973, SIWES

provides students in engineering, sciences, technology, and various applied fields with

opportunities to gain hands-on experience in relevant industries before they graduate.

SIWES is a mandatory program for undergraduates in Nigerian higher institutions, especia7lly

those studying science and technology-related courses, and typically lasts 3 to 6 months. It is a

collaborative effort between the Federal Government of Nigeria, the Industrial Training Fund

(ITF), universities, and the industries involved, all working together to ensure students acquire

practical skills necessary to excel in their chosen professions.

1.1 OBJECTIVES OF SIWES

1. Skill Acquisition: SIWES aims to help students acquire practical skills and training that

will prepare them for their future careers.

2. Linking Theory with Practice: It provides students with the opportunity to apply

theoretical knowledge gained in the classroom to real-world situations.

3. Industrial Exposure: Students gain exposure to industry-specific tools, technologies, and

methodologies, allowing them to become familiar with professional work environments.

4. Enhanced Employability: By equipping students with relevant skills and experience,

SIWES helps to increase their employability and job readiness post-graduation.

1
5. Encouragement of Self-Confidence and Independence: Through SIWES, students

develop independence, teamwork, and problem-solving skills, which are essential in any

professional setting

2
CHAPTER TWO
2.0 DESCRIPTION OF BLUESCRIPTS IT INSTITUTE

Bluescripts IT Institute is renowned for its expertise in IT training, offering a wide range of

courses designed to equip students with practical and relevant skills. The institute is located on

the 2nd floor opposite Teacher's House, Oluyole Estate, Ibadan.

Bluescripts IT Institute is a leading information technology training institution focused on

providing practical and professional IT education. Established with the goal of addressing the

growing demand for tech skills, Bluescripts offers a variety of courses designed to equip students

with the necessary expertise to thrive in the digital economy.

The institute provides comprehensive training in areas such as web development, software

engineering, digital marketing, cybersecurity, and data analysis. Bluescripts prides itself on its

hands-on learning approach, allowing students to gain real-world experience through projects,

internships, and practical sessions.

Over the years, the institute has grown into a reputable center for IT education, recognized for its

strong emphasis on quality instruction, industry-standard curriculum, and a commitment to

student success. Its graduates are well-prepared to enter various sectors of the tech industry, both

locally and internationally. Through partnerships with organizations and certification bodies,

Bluescripts ensures that its students are competitive in the global job market

2.1 MISSION

The mission of Bluescripts IT Institute is to provide high-quality, industry-relevant education in

information technology, equipping students with the practical skills and knowledge necessary to

3
excel in the ever-evolving tech industry. The institute aims to foster innovation, critical thinking,

and a problem-solving mindset, preparing students to meet global IT demands and contribute

effectively to technological advancements. Bluescripts IT Institute also seeks to bridge the gap

between theoretical learning and real-world application by offering hands-on training,

professional certifications, and career development opportunities in fields such as software

development, cybersecurity, data science, and IT infrastructure.

2.2 VISION

To become a leading institution in providing cutting-edge Information Technology education and

training, equipping students with the skills and knowledge to excel in the global digital economy,

and fostering innovation, creativity, and technological advancement.

2.3 ORGANOGRAM OF THE INSTITUTE

Fig 1. Organogram of Bluescripts Institute

4
CHAPTER THREE

3.0 EXPERIENCE GAINED/KNOWLEDGE ACQUIRED

3.1 INTRODUCTION TO CYBERSECURITY

The importance of cybersecurity was highlighted as critical in today’s digital age for

safeguarding information and systems against cyber threats. Due to the increasing frequency and

sophistication of cyber-attacks, robust security measures are essential. The report covered

cybersecurity basics, emphasizing key terms, security elements, identity theft methods, and

fundamental security guidelines.

3.1.2 FUNDAMENTALS OF CYBER SECURITY

Cybersecurity was described as a combination of practices, technologies, and processes designed

to protect networks, devices, programs, and data from attack, damage, or unauthorized access. It

aims to uphold the integrity, confidentiality, and availability of information.

3.1.3 KEY SECURITY TERMS USED IN CYBERSECURITY

Several terms were outlined as fundamental to cybersecurity:

1. Attack: An attempt to gain unauthorized access to system services, resources, or

information, or to compromise system integrity.

2. Threat: A potential source of harm or unwanted impact to a system or organization.

3. Exploit: Software or data that leverages a system vulnerability to cause unintended

behavior.

4. Vulnerability: A system weakness exploitable by threats for unauthorized access or harm.

5
5. Data Theft: The unauthorized copying or transfer of data from a computer or server.

3.1.4 ELEMENTS OF SECURITY

The report discussed the critical elements needed for effective cybersecurity, including:

1. Confidentiality: Ensuring that only authorized users can access information.

2. Integrity: Protecting information accuracy and processing methods.

3. Availability: Ensuring authorized users have access to information and resources when

needed.

4. Authenticity: Verifying the identity of users, devices, or entities within a system.

5. Non-repudiation: Guaranteeing that a party cannot deny their involvement in a

communication or document.

3.1.5 METHODS OF IDENTITY THEFT

Various identity theft methods commonly used by cybercriminals were explained:

 Phishing: Using deceptive emails or websites to steal personal information by pretending

to be trustworthy.

 Social Engineering: Manipulating individuals into providing confidential information.

 Hacking: Unauthorized access to data within a system.

 Personal Data Theft: Illegally accessing sensitive information like social security

numbers or credit card details.

3.1.6 BASIC SECURITY GUIDELINES

Several essential security practices were recommended for both personal and organizational data

protection:

6
1. Use Strong Passwords: Creating complex passwords and using unique ones for different

accounts.

2. Install Antivirus Software: Utilizing reputable antivirus programs to detect and prevent

malware.

3. Enable Encryption: Protecting data during storage and transmission.

4. Regular Backups: Backing up data regularly to guard against potential data loss.

5. Use Firewalls/IDS: Employing firewalls and intrusion detection systems to monitor

network traffic.

6. Exercise Caution with Email Attachments: Avoiding attachments from unknown senders

to prevent malware infection.

7. Update Software Regularly: Keeping software up to date with security patches.

8. Limit Access to Data: Applying the principle of least privilege, providing access only to

those who need it for their roles

3.2 NETWORKING

The basics of networking were explained as the process involving the exchange of information and ideas

between devices, which enables communication and resource sharing. It is essential for connecting

computers, mobile devices, printers, and other peripherals to communicate and share data seamlessly.

3.2.1 KEY NETWORK COMPONENTS

Several components essential to a network were outlined, including end devices like computers, printers,

and mobile phones, which act as sources or destinations for network data. Intermediate devices such as

routers, switches, and hubs help route and manage data traffic between these end devices. Additionally,

7
network media, including cables like coaxial, twisted-pair, fiber optic, and wireless transmission methods

such as Wi-Fi, serve as physical pathways for data transmission.

Fig 2. Basic Network Components

3.2.2 TYPES OF NETWORKS

The primary types of networks were also discussed, each serving specific purposes:

 Local Area Network (LAN): Covers a small geographic area like a home or office, with

advantages such as high data transfer rates and low latency.

 Personal Area Network (PAN): Has a short range, suitable for connecting personal devices like

smartphones or laptops, usually via Bluetooth or USB, offering convenience for individual data

management.

 Metropolitan Area Network (MAN): Spans larger areas like cities, connecting multiple LANs

within a city, which benefits organizations with several branches by enabling seamless data

sharing.

 Wide Area Network (WAN): Covers vast areas, including entire countries or continents, by

connecting multiple LANs and MANs over long distances, often using telecommunication lines

or satellite links, which is essential for global communication.

8
3.2.3 NETWORK MEDIA

Network media refers to the communication channels connecting nodes on a network, either wired

(physically) or wireless. Common types of network media include:

Coaxial Cable: Known for its durability and long-distance signal transmission with low interference,

commonly used in satellite communications, though it can be bulky.

Fig 3. Coaxial Cable

Twisted Pair Cables: Widely used in Ethernet and telephone systems, they are affordable and reduce

electromagnetic interference but are susceptible to interference without proper shielding.

Fig 4. Twisted pair cables

Fiber Optic Cable: The most expensive wired medium, it offers high bandwidth and immunity to

electromagnetic interference, ideal for high-speed, long-distance transmissions but requires careful

handling.

9
Fig 5. Fiber optic cable

3.3 CONVERSION OF PETROL ENGINES TO COMPRESSED NATURAL GAS

The conversion of petrol engines to Compressed Natural Gas (CNG) was described as a viable

option for reducing fuel expenses and emissions. It was mentioned that converting a petrol car to

a CNG vehicle allows it to operate on both petrol and CNG, known as bi-fuel capability.

3.3.1 TOOLS FOR CNG CONVERSION

The tools required for this conversion include a CNG conversion kit with key components such

as a CNG cylinder, which stores compressed natural gas at high pressure; a fuel injection system

to regulate CNG flow to the engine; and a CNG reducer/regulator to lower the high pressure

from the cylinder to a manageable level for the engine. Additionally, the CNG ECU (Electronic

Control Unit) was described as controlling the fuel switching between petrol and CNG, while an

injector rail delivers gas to the engine cylinders, a pressure gauge monitors gas levels in the

cylinder, and a fuel changeover switch allows the driver to switch between petrol and CNG

modes.

10
Fig 6. CNG Cylinder

Fig 7. Fuel Injector

Fig 8. Electric control unit

11
3.3.2 CONVERSION PROCESS OF PETROL TO COMPRESSED NATURAL GAS

(CNG)

In the conversion process, a vehicle assessment is first conducted by a mechanic to determine if

the vehicle is suitable for CNG conversion, evaluating the engine, fuel system, and overall

condition. Next, the CNG kit is installed by a trained mechanic, who mounts the CNG cylinder

in the trunk, installs the reducer/regulator and fuel injector near the engine, integrates the CNG

ECU with the existing electronic system, and connects the CNG pipes, injectors, and electrical

systems to the engine.

After installation, the engine is tuned to ensure optimal performance with CNG, allowing it to

run smoothly on both fuels without affecting efficiency or power. Finally, the vehicle undergoes

testing and calibration to verify that the CNG system functions properly. This testing includes

checking for leaks and performance issues and ensuring the seamless operation of the fuel switch

between petrol and CNG.

3.3.3 BENEFITS OF CONVERTING TO CNG

The benefits of CNG conversion include:

 Lower fuel costs, as CNG is generally more affordable than petrol, resulting in

substantial savings.

 Environmental benefits, with CNG emitting fewer pollutants than petrol, reducing

greenhouse gas emissions.

 Extended engine longevity, as CNG burns cleaner than petrol, leading to reduced deposits

and potentially increased engine life.

12
3.3.4 CHALLENGES OF CNG CONVERSION

The challenges associated with CNG conversion were outlined as follows:

 Initial conversion cost, given the significant upfront expense of installing a CNG kit,

though fuel cost savings may offset this over time.

 Reduced boot space, as the CNG cylinder takes up space in the trunk.

 Availability of refueling stations, which may be limited in certain areas.

 Potential power reduction, as vehicles running on CNG may experience a slight decrease

in engine power compared to petrol.

3.3.5 MAINTENANCE AFTER CONVERSION

Maintenance post-conversion involves regular inspection of the CNG system for leaks and

proper pressure regulator function. Additionally, dual fuel maintenance is required for both

petrol and CNG systems, potentially resulting in slightly higher maintenance costs.

13
CHAPTER FOUR

4.0 CHALLENGES ENCOUNTERED

1. Financial problem: During the program I encountered financial problem, the students find it

difficult to provide transport fare every day because there were no financial assistances from

anywhere and this made me at times let go off certain things so as to endure that, yet I attend

work every day.

2. Relationship: In the area of relationship with staffs, and other IT student, some challenges

were experienced in that made me to learn how to relate with different people of various kinds

and learning to patiently tolerate people attitude on daily basis.

3. Conveying of information: At the outset of the program, information was not efficiently

flowing from supervisors to students on industrial training attachments, but this was resolved

once their attention was devoted to it.

4.1 CONCLUSION

Throughout the industrial training, a comprehensive understanding of various key topics in

cybersecurity, ethical hacking, network design was achieved. The projects undertaken provided

practical exposure to real-world scenarios, enhancing technical proficiency and problem-solving

abilities. The networking design and implementation project emphasized the importance of

planning and securing small networks. The cybersecurity awareness training effectively

increased organizational awareness of security best practices and also a comprehensive training

of conversion of petrol car to compressed natural gas (CNG) was done.

14
REFERENCES
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed

Systems. Wiley.

Stallings, W. (2016). Computer Security: Principles and Practice. Pearson.

McClure, S., Scambray, J., & Kurtz, G. (2018). Hacking Exposed: Network Security Secrets and

solutions. McGraw-Hill.

15

You might also like