Month: August 2022
Cyber Security is One of the most Important Topics Today
Deterrence is described as the act or process of deterring such as the inhibition of criminal behavior by fear especially of punishment or the maintenance of military power for the purpose of discouraging attack. This paper will present a current review of writing on the viability of Cyber Deterrence. This paper will highlight the importance of implementing a working and effective strategy.
Cyber security is by far has been one the biggest threats that the United States has ever had to face. Over the past decade there has been a massive increase of digital attacks. Criminals had targeted trusted security software and hardware companies in the effort to take over devices and manipulate uses. One of the biggest issues that is currently faced is the fact that users had limited focus on security and the preventive measures that we have in place are very out dated.
Is cyber deterrence possible? Cyber deterrence is very possible but a successful strategy must be applied correctly. There have been a growing number of attacks against the United States. The United States government has now been challenged with the issues of finding a lasting solution to the ongoing threats and attacks that we are facing on a daily basis. There’s also the fact that most companies have no idea that they've even been hacked, spied on or even been a victim of these activities. These issues have created a wide spread of issues such as unexpected financial loss, disruptions, and even extortion. These types of problems are going and not likely to slow down and will require help from the government and/or security specialist. We are all becoming all too familiar with daily headlines about the breaches and PII that has been stolen from government agencies and companies large and small.
Is there a solution? The solution to the problem is to find a mix of passive and active actions that will serve as countermeasures to the attacks. A successfully strategy would put in place the proper tools as well as enforce laws that would punish attackers. Intelligence expert Bob Gourley maintains that “you cannot deter unless you can punish and you cannot effectively punish unless you have attribution”. (Gottschling, 2016. P 61)
It is to be noted that cyber security is a shared responsibility. Internet companies and merchants can do their part by shoring up the security of their networks and payment systems. Government can educate the public and enforce anti-cyber-crime laws. (Forbes, 2014) Cyber-crime is not likely to slow down but with the right preparation and tools the impact can minimized.
Cite this page
Cyber Security Is One of the Most Important Topics Today. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/
The Importance of Cyber Security in Social Networks
Do you think technology is a curse upon mankind? Today, internet has touched every aspect of our life but trusting it blindly is not a wise thing to do If you give it a more serious thought, most of our daily activities such as instant messages, sending emails, studying online, shopping, banking, etc. is done through internet. Due to these online activities cyber crimes are taking place every day and has increased the necessity to tighten security measures and protect every user using the internet with good intentions.
The biggest nuisance and threat for innocent online users are the hackers and spammers. In today's globalization millions of people from different countries share their personal details on the internet through social networking sites like Facebook, Twitter, etc. As people share their personal information online; often their accounts are compromised by criminals and there are several instances where heinous crimes such as rapes and murders also takes place. There are hackers who extort money by tricking those using the internet into believing that they have won huge chunks of money.
They will ask them for bank details or credit card pin numbers. The main objectives of such hackers are to steal confidential information and make illegal monetary transactions. Cyber crimes are on the rise, and we have heard several big instances such as hackers hacked Equifax company, one of the largest credit bureaus and stole the personal information of 145 million people. It was among the worst cyber crimes of because of the amount of sensitive information compromised, including Social Security numbers. Again in November, Yahoo reported that 1 billion of its accounts were hacked. Another such cyber crime was 'WannaCry'. It unleashed its fury in more than 150 countries. Within moments it was unleashed on the internet, many companies such as FedEx and Amazon faced enormous losses.
The hackers behind WannaCry demanded money from users if they wanted to unlock their files. More than 300,000 machines were compromised across the globe that included healthcare and automotive. I have firsthand experienced these cyber crimes first hand. Few years ago my father's software company named bulletink.com was hacked through a virus name PayDay, the purpose of this virus was to wipe off client data. His client sites were down for a week as he had to restore the data, it was loss of money and time! There are many entrepreneurs that are forced out of business due to these cyber crimes even while taking utmost precautions. However, a buyer can prevent cyber crimes by taking the following precautionary measures:
- upgrading the anti virus software promptly whenever there is an update and performs full system scan regularly so your computer stats virus free.
- Make sure when you make payments online the website should display https in the browser, the 's' indicates that its a secure website.
- All online transactions ask for usernames, passwords, and personal information so be sure to choose strong passwords. Also, routinely change passwords.
- Always keep your firewall turned on so hackers cannot steal confidential info from your computer.
- Read the privacy policy of the company you are about to do business with. There are numerous sites out there who have a policy of saving your info even after you have discontinued their service.
- Check your financial statement regularly to prevent identity theft and credit card fraud.
- Avoid advertisement that seems too good to be true such as 'you have won a lottery'.
- Lastly turn off your computer when you are not using it.
- Setup alerts on your smartphones.
After taking all the precautions above it doesn't necessarily mean we have successfully stopped cyber crimes completely. Cyber crime is like a game of chase between police and robbers, in our case the between the innocent users and hackers, the chases will continue and it’s never going to end. An upgraded version of this Chase game is Cyber Warfare which is a reality as United States and Russia and few other developed countries are already armed with virtual weapons, although some might suggest Cyber Warfare is a hype. Cyber Warfare is a threat to mankind. Nations will attack other nations thru computer networks that would disrupt their financial system and cripple them.
Prashant Mali, a Cyber Lawyer and Security Expert says 'Cyber-warfare has already become a strategic warfare. All countries are getting ready with their Cyber command as 5th command after Air, Land, Navy and Space.' Its an everyday news how Russia is meddling into American politics through Cyber warfare. People want to experience freedom and empowerment and not fear to use technology, while being protected against vicious cyber crimes. Computer hackers are here to stay and always looking for more sophisticated ways of breaking the security systems. There is no 100% security in today's globalization. So, don't expect an unauthorized user will not have access to your files.
Cyber security has become an integral part of modern life, and modern institutions are necessary to safeguard those securities. The International Cyber Stability Board should step up and vigorously lay down strict international internet stability and reduce security risk. Furthermore, we should train more ethical hackers who are skilled with hacking techniques and who can quickly recognize and understand which attack tools are being used so we can anticipate next moves. Also, we can setup a hacker’s blacklist and work with your internet service provider to block these attackers before they can damage our computers or financial institutions.
Cite this page
The Importance of Cyber Security in Social Networks. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/
Digital Forensics and Cyber Security
Thomas J. Watson, Chairman of the Board, IBM, had once said “I think there is a world market for maybe 5 computers,” I wonder what he would say about technology today. Since I was a young age, I always had a fascination in computing, especially Digital Forensics and Cyber security. My first experience with a computer was when my uncle would visit and bring his old fashioned heavy laptop. I sat and watched him press buttons and execute tasks on it. From that point on, I knew I wanted to be able to figure out the mysteries of a computer as well as advance my knowledge to the degree where I can build my education in areas that have interested me. I grew up in a developing digital era where my interest has broadened with it.
I always had an interest in the field of the unknown, in this case Digital Forensics and Cyber security. Digital Forensics and Cyber security is known as a myth since you rarely get a chance to see it but you know it’s working since you know it is happening every day on your computers, applications and devices.
I accredit studying Computer Engineering Technology as vital in achieving the significant skills and knowledge required for Digital Forensics and Cyber security.
While I was earning my Bachelors degree in Computer Engineering Technology, I had a chance to look into multiple fields such as Computer Programming, Electrical Engineering, Computer Networking, and Mechanical Engineering. While I was chasing my dream in computing, I have gained skills that include designing computer hardware and software, problem solving, and critical thinking and reasoning.
During that time I realized Digital Forensics and Cyber security was for me. The fact everything you do digitally may have an effect on us and by me protecting myself and others it will keep us safe. There are a lot of vulnerabilities that we run into everyday on our computers or devices that we don’t know about or want to know about. Our information can fall into the wrong hands and this is dangerous. We go from hunters to being hunted.
My interest in Digital Forensics and Cyber security grew stronger with the fascination of being able to extract information from a criminal’s email or phone to protecting people from cyber-attacks.
This is the perfect opportunity for me to learn how to fight cybercrime by analyzing the digital world by taking courses in Digital Forensics and Cyber security.
Whether it was Digital Forensics or Cyber security, I want to heighten my knowledge in the studies of digital science hitting two birds with one stone. That being said, I realized I wanted to study the best of both worlds, a Masters in Digital Forensics and Cyber security. Something so prestigious would be unthinkable to know that I am the part of the future. I get to analyze, serve and protect what goes on in the world. Even though my grades from my Bachelors do not represent it, my passion at which I want to wake up for the rest of my life knowing what I have accomplished will make me happy.
Cite this page
Digital Forensics and Cyber Security. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/
Cyber Security Threats and Security Models
Abstract
Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber security, various frameworks and models have been developed. It also introduces the concepts of cyber security in terms of its framework, workforces and information related to protecting personal information in the computer. This paper reviews these models along with their limitations and review the past techniques used to mitigate these threats. Furthermore, the report also provides recommendations for future research.
INTRODUCTION
Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while the former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has an important implication as it focuses on the ethical part of the society as a whole. There are various de?nitions of the concept of cyber security with varied aspects such as secured sharing, con?dential and access to information. But still, the de?nitions lacks clarity and consensus. Moreover, cyber security measured with regards to access, integration of data, security, storage and transfer of data through electronic or other modes. Cybersecurity indicates three important factors.
The methods of protecting Information Technology (IT), the data itself, the data being processed and transmitted together with physical and virtual setup, the level of protection obtained by applying such measures and the professional aspects associated [3]. We de?ne that the cyber-security as a measure protecting computer systems, networks, and information from disrup- tion or unauthorized access, use, disclosure, modi?c Viewpoints of cyber security issues reviewed in this paper or destruction. In the context of this review cyber security has been de?ned as the integration of policies, se- curity measures, approaches to risk management, protocols, technologies, process and training which can be utilized in securing the organization and cyber setup along with user assets. This paper focuses on the issues of cyber security threats and summarizes the existing security models represents the main viewpoints reviewed in this paper, which include cyber security workforce, vulnerability scan- ning, email virus ?ltering, personal information protection, prevention of cybersafety, and ?rewall services. The sig- ni?cance of this paper are assisting both academics and professionals gain a holistic view about contemporary cyber security ?eld. The main contributions of this paper have two aspects:
- This paper summarizes crucial issues in cyber security domains by a literature review.
- This paper proposes a number of research directions for future explorations in the ?eld.
The remainder of this paper is organized by the following orders. Section II reviews and organizes crucial issues in cyber security. A number of aspects are addressed in this section. Next, a discussion about future researches is given in Section III. Finally, we present our conclusions in Section IV.
CRU CI AL IS SU ES I N CYB ER SECURITY
Cyber security relies upon the care that individuals can take and conclusions they conduct while they organize, manage and utilize systems and internet. Numerous efforts have been made to ?nd the solution for cyber security evaluation challenge and various frameworks have been constructed. However, the frameworks encounter different dif?culties though it was working ?ne initially at the time of development. The restrictions derive from different aspects, such as emerging technologies [9] and facility limitations. Security issues are often considered a tradeoff between security requirements and other bene?ts. A. Cyber security workforce The framework of National Initiative for Cybersecurity Education (NICE) is an inter-agency attempt by the Na- tional Institute of Standards and Technology (NIST). The agency focuses on awareness, cyber security education, awareness, training and professional development. NICE Came up with the Cybersecurity Workforce framework.
This framework insists on recognition by the process of training. Also, accomplishes secure cyber infrastructure as de?ned in the context. Also, the framework has not included the factor new technologies are rapidly emerging that en- hances the challenges in cyber security threats. The scholars also mention that there need to be enough cybersecurity standards and procedures, which need to be frequently reviewed. The researchers further indicate the frameworks has not included the aspects of threats that exploit vulnerable and hence strategies of risk management needs to be addressed. Also, the authors recommend that cybercrime legislation is not in place to handle the criminals. Finally, an effective security strategy can be active in collaboration with modeling business processes.
Cyber safety for protecting personal information in com- puter Cyber-safety is a concept that has been used to explain a set of measures, practices, and actions that help in the protection of computer and privacy from various attacks. At any company, there is a Cyber-safety Program policy, PPM 310-22, which establishes that all devices con- nected to any company electronic communications network must meet certain security standards. As required by the system, most departments offer annual reports de?ning their levels of the compliance. Also, various services are in place to assist all faculty, staff and students to meet the cyber- safety standards. Speci?c information about these services is provided. The cyber safety threats can be caused due to viruses, hackers, identifying thieves, spyware. The virus in- fects the computer through the email attachment and ?le sharing. One infected computer can cause problems to all the computer networks. A people who “trespass” the computer from a remote location are considered as Hackers. These people use a computer to send spam or viruses or do other activities that cause computer malfunction. In the case of identifying thieves, the people who obtain unauthorized access to the personal information like social security, and ?nancial account numbers are considered.
Spyware is software that “piggybacks” on programs that are downloaded and gathers information about online habits and transmits personal information without the users knowledge. In addition to the above-discussed problem, a company may face a number of other consequences if they fail to take actions to protect personal information and user’s computer. The consequence indulges such as loss in the access of campus computer network, con?dential information, inte- gration and access to valuable University data, research on personal electronic data lawsuits, loss of public trust and offer opportunities, pursuit, internal con?ict action and or employment termination. C. Studies of email virus ?ltering Several studies have been conducted on the ?ltering of email virus Prior study had addressed various existing spam detection methods and ?nding the useful, precise, and de- pendable spam detection process. The applications that are currently applied by various anti-spam spam software are considered to be static, which mean that it is quite easy to elude by tweaking the messages. To perform this, the spammer would evaluate the current anti-spam methods and determine the modes to play around with. To combat the spam effectively, it is important to adopt a new technique.
This new approach needs to be complete the spammer’s strategies as they are changed from time to time. It must also able to adapt to the particular organization that it is protecting for the answer lies in Bayesian mathematics. The study ?ndings indicated that some of the spam detection method and the numerous issues associated with the spam. From various studies, it is understood that we will not be able to stop the spam and will be a limit them effectively using Bayesian method when compared to other methods. Moreover, prior research also explored various prob- lems associated with spam and spam ?ltering methods, techniques. The different methods determine the incoming spam methods are Bayesian analysis, Blacklist/Whitelist, Keyword checking and Mail header analysis. The different spam ?ltering techniques adopted Distributed adap- tive blacklists, Rule-based ?ltering, Bayesian classi?er, K nearest neighbors, Support Vector Machine (SVM), Content-based Spam Filtering Techniques - Neural Networks,The multi-layer networks,Technique of search engines,Tech- nique of genetic engineering,Technique of arti?cial immune system.
The study ?ndings revealed that many of the ?ltering techniques are based on text categorization methods, and there is no technique can claim to provide an ideal solution with 0% false positive and 0% false negative. There are a lot of research opportunities to classify multimedia and text messages. Kumar et al. indicated that the spam dataset is ex- amined with the use of TANAGRA data mining tool which determine the ef?cient classi?er in the classi?cation of email spam. Firstly, feature selection and feature construction is conducted to obtain the required characteristics. After that different classi?cation algorithms would be applied to the dataset and a cross-validation would be done on each classi?er. In the end, the best classi?er in email spam is determined on the aspects of precision, error rate and recall. From the obtained results, ?sher ?ltering and runs ?ltering feature selection algorithms performs better classi?cation for many classi?ers. The Rnd tree classi?cation algorithm applied to relevant features after ?sher ?ltering has produced more than 99% accuracy for spam detection. This Rnd tree classi?er is also tested with test dataset which gives accurate results than other classi?ers for this spam dataset.
Studies of ?rewall services Al-Fayyad et al. evaluated the performance of per- sonal ?rewall systems by organizing an arranged walk- through to determine the design factors that could violate the usage standards. In the study of personal ?rewalls usability on Windows XP platform, four modern ?rewalls namely Norton. The study results indicated that Personal ?rewalls encounter poor usability that could lead to vulnerabilities in security. The usability problems could be due to the issue that the data given by the ?rewalls (could be during the process of installing, con?guration or during interaction) was not clear or misleading. Various usability problems have been noticed because of the reduced clarity of alerts. Li evaluated the issues in placing the ?rewalls in the topology of networking design and how to frame the routing tables in the process so that a maximized ?rewall rule set could be minimal that helps to avoid performance bottleneck and limits the security loopholes. There have been two signi?cant contributions that the problems are NP-complete, and that a heuristic solution has been proposed and illustrate the ef?ciency of algorithms using simulations. The outcome of the test indicates that the suggested algorithm has limited the multi-?rewall rule set than other algorithms.
Studies of vulnerability scanning
Sudha Rani et al analyzed Intrusion Detection System (IDS) methods to identify an attack of a computer network. In order to prevent vulnerable virtual machines network, intrusion detection system is proposed. In addition, the study has taken potential security risks as well as the security considerations taken into account for implementing a virtual private network. The study ?ndings revealed General operation ?ow of cybersafety prevention that there is two types of intrusion detection system host based and network based. In addition proposed solution provides information on how to use programmability of software switches based on the solutions that improve the detection accuracy and defeat. Other research focused on the vulnerability as- sessment for automatic environments along with the web applications and various threats which are detected during the vulnerability assessment for different networking prod- ucts.
The study has adopted OpenVas tool with exploratory research method. The study ?ndings revealed some of the methods that can ?x vulnerability for removing threats using the function PHP info () and other methods like Trojan helps in keeping networking systems safe. Ye et al studied the quantitative vulnerability assess- ment model in cyber security for DAS. The evaluation pro- cess is distinguished into three sections namely vulnerability adjacency matrix formation, attack processes modeling, and physical consequences analysis. The increasing smart grid merits cyber security problems has enhanced because of the higher integration of cyber systems to the physical power systems. It has been found that DAS is highly exposed to cyber attacks when compared to various control systems in substations or power plants. However, it has to make sure that each DAS is secure and economically not favorable and technically not essential. The theory involves creating ADG models, evaluation of potential physical effects due to cyber-attacks and sug- gesting vulnerability adjacency matrix to show the con- nection among various weaknesses. Numerous case studies on account of RBTS bus 2 indicate the effectiveness and validation of the proposed vulnerability assessment model.
Prevention of Cybersafety
There are seven signi?cant cyber-safety actions which are Running Anti-virus Software, Installing OS/Software Updates, Preventing Identity Theft, Switch on the Personal Firewalls, Prevent Adware/Spyware, protection of Pass- words and Backing up Important Files [29]. Fig. 2 represents a general operation ?ow of the cybersafety prevention.
Install OS/Software updates:
- Installing software updates are also known as patches that helps to ?x issues of operating system (OS) (e.g., Mac OS X , Windows Vista, Windows XP,) and software programs such as Microsoft applications.
- Many of the latest operating systems are arranged to download updates automatically by default. Once the updates have ben downloaded, a con?rmation prompt is displayed for installation. Click yes
- Once the updates are complete, make sure to restart the computer for the patches to be applied.
Running Anti-Virus Software:
- In order prevent computer virus issues install and then run the anti-virus software such as Sophos and check the last updated date.
- Make sure to check periodically if the installed anti- virus is up to the date which helps to block current and future viruses. The anti-virus application removes detected viruses, quarantines it and ?nally repairs users system infected ?les.
- The students of UC Davis, staffs and faculty members can download Sophos software for both homes and work computers for free from the Internet Tools CD, which you can obtain from the Shields Library’s IT Express.
Preventing Identity Theft:
- Don’t give out ?nancial account numbers, Social Secu- rity numbers, driver’s license numbers or other personal identity information unless you know exactly who’s receiving it. Protect others people’s information as you would your own.
- Never send personal or con?dential information via email or instant messages as these can be easily in- tercepted.
- Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business (often a ?nancial institution) in an attempt to gain personal or account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in and any email from an unknown email id. Generally authentic businesses do not request personal details online.
Switching on Personal Firewalls:
- Find under system’s security setting for a default per- sonal ?rewall and switch it on. Mac OSC and Microsoft Vista have installed built-in ?rewalls. After turning on the ?rewall, check it for any open ports which would allow hackers and viruses.
- Firewalls work as the protection layers between the internet and computers.
- The standard process of hackers would be to send pings(calls) to various computers at random and check for their responses. The functionality of Firewalls is to block your computer which prevents any response calls from a computer.
Protecting passwords:
- Make sure that not to share your passwords, and make sure to create new passwords which are hard to guess. Avoid any dictionary works and establish a password by with mixed number, alphabets, and punctuation marks.
- Be sure not to use any common passwords or its vari- ations such as abc123, iloveyou1, let me in, qwerty1, (yourname1), password1 and baseball1.
- Change passwords periodically.
- When choosing a password:
–Mix upper and lower case letters
–Use a minimum of 8 characters
–Use mnemonics to help you remember a compli- cated password
DISCUSSIONS
From the review it was observed that, there are various studies conducted on cyber safety especially earlier studies have tried to attempt the problems linked to spam and spam ?ltering techniques. In speci?c, spam dataset is analyzed using TANAGRA data mining tool to explore the ef?cient classi?er for email spam classi?cation. Further studies also analyzed various existing spam detection meth- ods and identi?ed an ef?cient, accurate, and reliable spam detection method. The usage of personal ?rewall systems by performing a cognitive analysis in determining design elements which would violate the principles of usability.
The issue of how to arrange the topology of ?rewalls in a network design and how the frame the routing tables in execution so that the max ?rewall rule set could be limited. Attribute-based solutions can be an option for speci?c security requirements. The usage of Intrusion Detection System (IDS) procedure to ?nd a computer network attack. The vulnerability assessment in automatic setups together with web applications and other threats, such as data validations. An innovative quantitative vulnerability assess- ment model on cyber security for DAS is evaluated. Further the analysis indicated various safety and prevention functionalities.
CONCLUSIONS
From the review, it was found that majority of the studies have been conducted on the email security, ?rewalls, and vulnerabilities. Yet, not many studies from the perspective of password security. There are general recommendations on how to secure the password but not any authenticated protocol to protect the system inherently. Therefore, there is a need for more studies in terms of technics and models from this perspective to ensure that passwords are protected.
Cite this page
Cyber Security Threats and Security Models. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/
Information Technology Security or Electronic Information Security
Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
- Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.
- Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
- Information security protects the integrity and privacy of data, both in storage and in transit.
- Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.
- Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
- End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.
As the technology is increasing day by day, many people fall victim to cyber theft. This high development of technology and the availability of internet to most of the public, broadens the pathway of cyber-crime. Cyber-Security was once not a serious issue. But now many people are complaining about their credit card information getting stolen or sudden drop of credits in their bank account.
The internet has become the integral part of today’s generation of people. Many people share their information out in the web through social networking sites like Facebook, Twitter, Instagram etc. Internet has touched every aspect of life right from the beginning to the present. As people share their personal information online; most of their accounts get hacked by cyber-criminal or in other word's black hat hackers. And, trusting internet nowadays isn't a wise thing to do.
With the growing use of the internet by people, protecting sensitive information has become something which must be taken into consideration, quite seriously. Otherwise, the internet can be one of the dangerous places to visit if one's sensitive information isn't being protected. If a computer doesn't have proper security controls then it has high chances of getting infected by malwares, malicious logics and hence, any type of information in that computer can be accessed easily within moments. And, there are many millions of websites on internet which are infected with malwares and spy-programs. Which allows a hacker to gain illegal access to the specific computer, once the computer has browsed the domain name of the malicious website or if the spy-program is downloaded into the computer. It is very important to stay secure while you are online or else it might be very risky to lose your personal information.
Cyber-attacks can be caused due to negligence and vulnerabilities. One can be a victim of cyber-attack due to his own ignorance of the vulnerabilities which his system shows. Which also means that one can stay secure online by blocking ways by which a hacker can come. He can do this by installing an anti-virus (such as, Avira, Norton, Macafee, Kaspersky etc.), updating the application which he uses for browsing internet etc. Few other ways are, not surfing websites that isn't secure. Well, this might sound a minor thing. But, it's one of the most important things which must be followed in order to stay secure online. According to a study conducted on 2012, most of the internet users don’t bother whether the website they visit is secured or not. Due to this, many of the information registered on the website gets duplicated. Such as, credit card initials while making a purchase, their official e-mail password while linking their account. All these can prove fatal if the hacker gets all this personal information.
One more thing what a person can do to stay secure is; by not clicking a link or downloading an application, which is sent via mail to him by an un-authorized person. If the e-mail shows up in spam folder then also, he shouldn't open it. In case, if the person downloads the application then his anti-virus must be turned on, in order to scan the downloaded application. Otherwise, his PC could be vulnerable to viruses and malware program. If he doesn't have an anti-virus and he downloads the application, then what's going to happen is; his monitor screen suddenly flashes and shuts down. And, when he restarts his PC, he notices that it doesn't function as it used to before. These symptoms are cause of the presence of virus inside his desktop.
We as a human tend to ignore things most of the time. And, this can be very dangerous when it comes to surfing web online and downloading applications. Hackers make use of paths which we tend to ignore. And, most of the attacks which we receive from them can be brutal. In earlier this year, there were a team of black hat hackers who created a ransomeware ware called Wannacry. Within moments of its release to the internet, many multi-million companies including FedEx and Amazon faced huge loss. This ransomeware is so powerful that it spreads through a connected network.
For example, you have logged into some website and you see an add which says ' Click here to win $ 20,000. Only few contestants will be chosen for this draw. Hurry!! '. So, due to your interest in the draw. You tend to click it. So, while you are directed to another website through the link; a new application gets downloaded without your notice and it intiate's the launch of its written commands. Your screen flashes in a moment and all you notice is a message saying that ' All your files have been encrypted and in order for you to decrypt it, you will have to pay a sum of $300 in bitcoins. If you don't make a payment within 3 days to the give address, then the amount will be double for each day. If you are unable to make the payment within 7 days then, all your files will be lost! '. This is exactly what happens when Wannacry ransomeware gets into your computer.
Nowadays hackers are so good in their field. That, they wipe out traces of crime in such a way; that it is almost impossible to find the cyber-criminal. If you are one of the targets of a hacker. He always tries his best to keep track of you. And, once you fall into his hands then that's the biggest mistake you have ever made. If a hacker gets into your network, say Wi-fi then he can manipulate its security setting and also have detailed log about your browsing. He can also get access to the devices that are connected to your Wi-fi. And, in case if one of your computers has your personal information then he can access it within moments. In order, to get around this issue of a hacker getting in your home network; first, you should make sure that all the devices connected into your network are all trusted devices. And, it is recommended that you must have a strong WPA2 security password. Or else, if you are using any other security type like WEP, then the password can be cracked within minutes. The next step is to regularly update your routers firmware (security settings). Regularly updating router's firmware can literally keep hackers from getting into your network. Also, keep in mind that if you disable your firewall then no matter how much you update your firmware. It's of no use until your firewall is enabled.
Normally, what firewalls do is; they block the data coming from outside the network. They pretend as a thick layer of filter that denies the penetration of un-wanted or harmful data that comes from the internet. So, in order to have a strong firewall, all you need to do is block all the outbound connection and allow all the inbound connection. This makes sure that the data on the internet can be accessed through inbound connection. But no user will be able to penetrate into you network unless and until he is connected to your network. Meaning, blocking the outbound connection, you make the firewall stronger in such a way that other users who aren't connected to your network won't be able to access your files or see the devices connected to your network.
I would like to conclude by saying that, there is no 100% security in today's era. Nor, will there be in the future. So, don't expect an un-authorized user not to have accessed your files if connected to your network. Or in other words, don't think that they can't access any of your files. And, always update your systems and network's security settings. Always make sure that your anti-virus performs full-system-scan every week. So, that your desktop stays virus and malware free.
Cite this page
Information Technology Security or Electronic Information Security. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/
A Study of Cyber Security and Challenges
ABSTRACT
Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security on the latest technologies .It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security.
INTRODUCTION
“The science of today is the technology of tomorrow” says Edward Teller. What do you mean by cyber security? Cyber security is concerned with making cyberspace safe from threats, namely cyber-threats. The notion of “Cyber-Threats” is rather vague and implies the malicious use of information and communication technologies (ICT) either as a target or a tool by a wide range of malevolent actors. Although it should be emphasized that these figures are extrapolations. Much of its vulnerability is explain by widespread computer illiteracy and easily pirated machines.
Internet is one of the fasted-growing areas of technical infrastructure development. In today’s business environment, disruptive technologies such as cloud computing such as could computing, and next-generation mobile computing are fundamentally changing how organizations utilize information technology for sharing information and conducting commerce online. Today more than 80% of total commercial transactions are done online, so this field required a high quality if security transparent and best transactions. The scope of Cyber Security
extends not only to the security of IT systems within the enterprise, but also to the broader digital networks upon which they rely including cyber space itself and critical infrastructure..Cyber security plays an important role in the development of information technology, as well as internet services. Enhancing cyber security and protecting critical information infrastructure are essential to each nation’s security and economic well being. Society has become dependent on cyber systems across the full range of human activities, given away too much personal information and want to be forgotten when there is no legitimate grounds for retaining their personal information services as well as governmental policy. The fight against cyber crime needs a comprehensive and a safer approach. Given that technical measures alone cannot prevent any crime, it is critical that law enforcement agencies are allowed to investigate and prosecute cyber crime effectively. Today many nations and governments are imposing strict laws on cyber securities in order to prevent the loss of some important information. Every individual must also be trained on this cyber security and save themselves from these increasing cyber crimes
CYBER CRIME
Cyber crime is a term for any illegal activity that uses a computer as its primary means of commission and theft. The U.S. Department of Justice expands the definition of cyber crime to include any illegal activity that uses a computer for the storage of evidence. The growing list of cyber crimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft, stalking, bullying and terrorism which have become as major problem to people and nations. Usually in common man’s language cyber crime may be defined as crime committed using a computer and the internet to steel a person’s identity or sell contraband or stalk victims or disrupt operations with malevolent programs. As day by day technology is playing in major role in a person’s life the cyber crimes also will increase along with the technological advances.
CYBER SECURITY
Privacy and security of the data will always be top security measures that any organization takes care. We are presently living in a world where all the information is maintained in a digital or a cyber form. Social networking sites provide a space where users feel safe as they interact with friends and family. In the case of home users, cyber-criminals would continue to target social media sites to steal personal data. Not only social networking but also during bank transactions a person must take all the required security measures.
There will be new attacks on Android operating system based devices, but it will not be on massive scale. The fact tablets share the same operating system as smart phones means they will be soon targeted by the same malware as those platforms. The number of malware specimens for Macs would continue to grow, though much less than in the case of PCs. Windows 8 will allow users to develop applications for virtually any device (PCs, tablets and smart phones) running Windows 8, so it will be possible to develop malicious applications like those for Android, hence these are some of the predicted trends in cyber security.
The threat of attacks on web applications to extract data or to distribute malicious code persists. Cyber criminals distribute their malicious code via legitimate web servers they’ve compromised. But data-stealing attacks, many of which get the attention of media, are also a big threat. Now, we need a greater emphasis on protecting web servers and web applications. Web servers are especially the best platform for these cyber criminals to steal the data. Hence one must always use a safer browser especially during important transactions in order not to fall as a prey for these crimes.
Cloud computing and its services
These days all small, medium and large companies are slowly adopting cloud services. In other words the world is slowly moving towards the clouds. This latest trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection. Additionally, as the number of applications available in the cloud grows, policy controls for web applications and cloud services will also need to evolve in order to prevent the loss of valuable information. Though cloud services are developing their own models still a lot of issues are being brought up about their security. Cloud may provide immense opportunities but it should always be noted that as the cloud evolves so as its security concerns increase.
APT’s and targeted attacks
APT (Advanced Persistent Threat) is a whole new level of cyber crime ware. For years network security capabilities such as web filtering or IPS have played a key part in identifying such targeted attacks (mostly after the initial compromise). As attackers grow bolder and employ more vague techniques, network security must integrate with other security services in order to detect attacks. Hence one must improve our security techniques in order to prevent more threats coming in the future.
Mobile Networks
Today we are able to connect to anyone in any part of the world. But for these mobile networks security is a very big concern. These days firewalls and other security measures are becoming porous as people are using devices such as tablets, phones, PC’s etc all of which again require extra securities apart from those present in the applications used. We must always think about the security issues of these mobile networks. Further mobile networks are highly prone to these cyber crimes a lot of care must be taken in case of their security issues.
IPv6: New internet protocol
IPv6 is the new Internet protocol which is replacing IPv4 (the older version), which has been a backbone of our networks in general and the Internet at large. Protecting IPv6 is not just a question of porting IPv4 capabilities. While IPv6 is a wholesale replacement in making more IP addresses available, there are some very fundamental changes to the protocol which need to be considered in security policy. Hence it is always better to switch to IPv6 as soon as possible in order to reduce the risks regarding cyber crime.
Encryption of the code
Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it.. In an encryption scheme, the message or information is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Encryption at a very beginning level protects data privacy and its integrity. But more use of encryption brings more challenges in cyber security. Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e- commerce), mobile telephones, wireless microphones, wireless intercoms etc. Hence by encrypting the code one can know if there is any leakage of information.
ROLE OF SOCIAL MEDIA IN CYBER SECURITY
As we become more social in an increasingly connected world, companies must find new ways to protect personal information. Social media plays a huge role in cyber security and will contribute a lot to personal cyber threats. Social media adoption among personnel is skyrocketing and so is the threat of attack. Since social media or social networking sites are almost used by most of them every day it has become a huge platform for the cyber criminals for hacking private information and stealing valuable data.
In a world where we’re quick to give up our personal information, companies have to ensure they’re just as quick in identifying threats, responding in real time, and avoiding a breach of any kind. Since people are easily attracted by these social media the hackers use them as a bait to get the information and the data they require. Hence people must take appropriate measures especially in dealing with social media in order to prevent the loss of their information.
The ability of individuals to share information with an audience of millions is at the heart of the particular challenge that social media presents to businesses. In addition to giving anyone the power to disseminate commercially sensitive information, social media also gives the same power to spread false information, which can be just being as damaging. The rapid spread of false information through social media is among the emerging risks identified in Global Risks 2013 report.
Though social media can be used for cyber crimes these companies cannot afford to stop using social media as it plays an important role in publicity of a company. Instead, they must have solutions that will notify them of the threat in order to fix it before any real damage is done. However companies should understand this and recognise the importance of analysing the information especially in social conversations and provide appropriate security solutions in order to stay away from risks. One must handle social media by using certain policies and right technologies.
CYBER SECURITY TECHNIQUES
Access control and password security
The concept of user name and password has been fundamental way of protecting our information. This may be one of the first measures regarding cyber security.
The documents that we receive must always be authenticated be before downloading that is it should be checked if it has originated from a trusted and a reliable source and that they are not altered. Authenticating of these documents is usually done by the anti virus software present in the devices. Thus a good anti virus software is also essential to protect the devices from viruses.
Malware scanners
This is software that usually scans all the files and documents present in the system for malicious code or harmful viruses. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware.
Firewalls
A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. All messages entering or leaving the internet pass through the firewall present, which examines each message and blocks those that do not meet the specified security criteria. Hence firewalls play an important role in detecting the malware.
Anti-virus software
Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered. An anti virus software is a must and basic necessity for every system.
CYBER ETHICS
Cyber ethics are nothing but the code of the internet. When we practice these cyber ethics there are good chances of us using the internet in a proper and safer way. The below are a few of them:
Don’t be a bully on the Internet. Do not call people names, lie about them, send embarrassing pictures of them, or do anything else to try to hurt them.
Internet is considered as world’s largest library with information on any topic in any subject area, so using this information in a correct and legal way is always essential.
Do not operate others accounts using their passwords.
Never try to send any kind of malware to other’s systems and make them corrupt.
Never share your personal information to anyone as there is a good chance of others misusing it and finally you would end up in a trouble.
When you’re online never pretend to the other person, and never try to create fake accounts on someone else as it would land you as well as the other person into trouble.
Always adhere to copyrighted information and download games or videos only if they are permissible.
CONCLUSIONS
This paper has examined the significance of individuals as a fundamental human right. Violations of human rights arise from the unlawful collection and storage of personal data ,the problems associated with inaccurate personal data, or the abuse, or unauthorized disclosure of such data. In this paper we also include the current threats, issues, challenges and measures of
IT sector in our society. With the increasing incidents of cyber attacks, building an effective intrusion detection model with good accuracy and real-time performance are essential. Indian citizens must identify the best techniques in order to protect the information and system, as well as the network in which they work.
.As the IT industry has been playing catch-up with hackers and cybercriminals for decades. These days all small, medium and large companies are slowly adopting cloud services .In other words the world is slowly moving towards the clouds. This latest trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection. Additionally, as the number of applications available in the cloud grows, policy controls for web applications and cloud services will also need to evolve in order to prevent the loss of valuable information. Though cloud services are developing their own models still a lot of issues are being brought up about their security. Cloud may provide immense opportunities but it should always be noted that as the cloud evolves so as its security concerns increase.
Cite this page
A Study of Cyber Security and Challenges. (2022, Aug 30).
Retrieved November 3, 2025 , from
https://studydriver.com/2022/08/page/2/