Cyber Security and Data Protection

Verified

Added on  2021/04/16

|13
|2638
|440
AI Summary
This assignment covers various aspects of cyber security, including secure mobile environments, firewall anti-leak systems, SCADA system risk assessment methods, decision support approaches for cyber security investment, network security essentials, Sybil attack detection schemes, and more. It includes a list of references to relevant research papers and patents in the field.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2CYBER SECURITY
Document Page
3CYBER SECURITY
Table of Contents
Introduction..........................................................................................................................4
Literature review..................................................................................................................4
One time password..........................................................................................................5
Malicious attack detection...............................................................................................5
Installing Firewall............................................................................................................6
Essentiality of cyber security systems.............................................................................7
Cyber Security implementation.......................................................................................8
Advantages of Cyber Security.........................................................................................9
Conclusion...........................................................................................................................9
Reference...........................................................................................................................11
Document Page
4CYBER SECURITY
Introduction
The technological advancement in the field of digital communication is growing in a
constant rate. With all the threats regarding the malware and viruses increasing day by day the
awareness for the security of the systems has also been increasing in constant rate. Committing
fraud, stealing of data and bringing down data has been the major sources of cyber terrorism.
With the increase in the usage of internet the chance and instances of cyber crime has expanded
to a large scale. This review will provide the literature review of the concepts of cyber security.
This report will also provide the literature review regarding the reasons of implementation of
cyber security. This report will provide literature review of the advantages of implementing
cyber security. This report will further provide the literature review of the reasons for
implementing cyber security.
Literature review
According to Fielder, et al (2016), the main reason of implementing cyber security to the
networking systems is to prepare for a cyber attack before it happens. In case of trying to recover
from the attack caused by the cyber terrorists it gets difficult as most of the data gets pirated once
the cyber attack happens. In case of piracy of the data the organization looses most of the data
that are needed for the growth of the organization. Again according to Jones, et al (2016), the
reason of implementing cyber security is to internally secure the sensitive data for the respective
organization as well as the stake holders of the organization. The data if not secure can be
accessed by the unauthorized personnel. This unauthorized access to any data can result to
modulation of data and spreading of wrong data resulting in deformation in goodwill of the
organization.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5CYBER SECURITY
One time password
According to Graham, Olson & Howard (2016), for online transaction one time password
acts as cyber security method. In case of using digital platform for storing data and using the data
in future the usage of one time password is essential for maintaining the security of the data. On
logging into the account using the one time password one can have a complete access of the data
and information. After a certain time in active state the online application or the website gets
locked as it presumes that the authorized user is inactive. If this technology was unavailable then
having access to private data would have been easier. In case the user forgets to log out from the
platform and there is no onetime password technology and the personal account of the user stays
activated, any unauthorized user can log in to the account and cause problems to the authorized
user.
Malicious attack detection
As per Liu, et al (2018), various kinds of attacks are imposing threats to the networking
protocols of the database management system. Malicious attacks being one of the most widely
distributed and dangerous attacks among all the cyber attacks. Malicious attacks can be detected
by several means namely: -
OSLR protocol
According to Tan, Li & Dong, (2015), Optimized State Link Rating protocol is used for
detection of the malicious attacks. The emergence of malware attacks is emerging gradually in a
constant rate. Malware are lines of code that are incorporated in the system through digital
medium which affects the system drastically by decoding the data from the system and pirating
the data. To detect this set of digital attack the OSLR protocol is used. Again according to Wu, et
Document Page
6CYBER SECURITY
al (2017), Optimized State Link routing is mesh which has its infrastructure nodes connected
with each other. A dynamic attachment with other nodes which is non-hierarchical in nature
cooperates efficiently to route information to the clients.
Cryptographic method
As per Thomas &Ligh, (2016), cryptography is a process of transferring the information
via media where third parties who are unauthorized for having access to the information are
present. The data is encoded with the help of cryptographic method which ensures that the third
parties present in the medium are unable to decode the data.Rogers& Moore, (2015), stated
thatcryptography is one of the safest ways to detect malware attacks on the networking system.
The encoding of data is done by the experts who have been practicing this process for many
years and are experienced in their field as any faults of the expert can lead to data piracy of the
organization. Data modulation is also another aspect that can happen in case of wrong
implemen6tation of cryptography.
Installing Firewall
According to Kalam, et al (2017), Firewall is network based security system that acts as a
barrier between the authorized and authorized access of the data. The authenticated user comes
with anauthenticate user identity which lacks in the case of an unauthorized user. With the help
of Firewall preinstalled in the system cyber security can be prevailed to a certain extent.Firewall
can be broadly classified in two categories namely: -
Host based firewall
Document Page
7CYBER SECURITY
Shue, et al (2016), stated that host based firewall is mainly used to deal with the threats that
are originating within the network that are corporate in nature. Which are often used to mitigate
the risk that can happen in the host networking system.
Network firewall
According to Salah, Calyam&Boutaba, (2017), network firewall finds its use as a semi
permeable platform. Both the useful and useless data approach the networking system. The
firewall judges the utility of the data that has been approaching them. After evaluation of the data
it allows only the useful and authorized data to pass through them and leaves behind the
unauthorized data.
Although according to Tan, Li & Dong, (2015), Firewall alone is not efficient enough to protect
a system from malware and malicious viruses. External security tools like antivirus software are
needed to be installed in order to keep the computing system safe from the cyber-attacks.
Essentiality of cyber security systems
Virus
Yang, Yang & Wu, (2017), stated in their book that viruses are a piece of code that can
multiply itself and get into networking systems even being unauthorized for the system and
posses a detrimental effect on the networking system which might result in destroying the entire
system or corrupting the data.
Hacker
Hoffman, Benton & Java, (2016), stated in the twelfth volume of their book that hackers
are the terrorists in this new world of technology. With digital communication gaining

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CYBER SECURITY
importance and the expansion of the phenomenon hackers are gaining the diversity to plan
attacks on the organizations that lack robustness in their security systems and get access to the
data of the organization and corrupt the data or even ask a lump sum amount of money in order
to regain access over the data of the organization.
Trojan horses
According to Perlman, Kaufman &Speciner, (2016), Trojan virus is well calculated and
well designed program that violates the security system of the network and continues to harm the
computing system in which it has gained an unauthorized access and corrupts data and piracy of
data also acts as a major issue of this kind of cyber attack.
Cyber Security implementation
According to Atoum, Otoom& Abu Ali, (2014), elements of cyberspace is at risk and the
elements of cyberspace’s interconnection makes the entire procedure more complex and difficult
to focus on the extent of security. It is very difficult to get data regarding the exact cost of
incidents regarding the security of the networking systems. The main focus of the organizations
is to fix the problem rather than focusing on the cost of installing the security system. The risk
possessed by the cyber-attack is calculated but the organizations than the cost incurred I setting
up the cyber security system. The increase I consequences due to the effectiveness of the
botnetsare estimated with the increase of the usage of the internet. Newer and more efficient
techniques are being invented in a regular basis to compete with the newer versions of cyber-
attacks. This cyber-attacks can be efficiently only with the help of attack cab be handled only by
updating the software of the systems. The security services need special attention due to the
increase in cyber-attacks. The security software needs to be in their most updated version in
Document Page
9CYBER SECURITY
order to stay safe from any kind of cyber-crime. With the versions of the security system getting
updated it gets easier or the attackers to find loop holes of the system ad get unauthorized access
to the system.
Advantages of Cyber Security
Amini et al (2015), in their book stated the advantages of using cyber security process in
the modern era of technology where the usage of internet has increased to a great extent. The
advantages stated in the book were the data and information stays safe on using cyber security
tools and piracy of the data is lessens to a great extent. The cyber security toolsalso enables the
blocking of unsafe websites, the cyber security tool does not allow the user to have an access the
websites that are not viable or safe to access. This blocking of websites results in lessening of
cyber-attacks as most of the malware attacks and ransomware attacks are done through the
unsafe and unauthorized websites. The cyber security also takes into consideration the aspect of
filtering the data that is incoming to the networking system, the cyber-security tool also keeps a
track on the outgoing data so in order to prevent unauthorized data transfer from the system.
Conclusion
From the above literature review it can be concluded that the emergence of cyber
security is in a stage of growth in a constant rate. With the increase in growth of usage of digital
communication platform the threats possessed due to the attacks caused on cyber criminals also
increases as the data available I the digital platform increases which helps in gathering
information of the organization and attacking the organization gets easier when the data is
available. The cyber attackers pirates the data and uses the organization’s information against
them and earns huge amount of revenue on returning back the uncorrupt data of the organization.
Document Page
10CYBER SECURITY
To stay protected from these kinds of attacks cyber security tools are being used. These tools
keeps the organization free from unauthorized access of imposters. Cyber security as a field of
technology is facing a lot of changes as the technology is emerging at a very fast rate. To keep
the computing systems updated the latest versions of security tools must be installed in the
networking system.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11CYBER SECURITY
Reference
Amini, L., Christodorescu, M., Cohen, M. A., Parthasarathy, S., Rao, J., Sailer,
R., ...&Verscheure, O. (2015). U.S. Patent No. 9,032,521. Washington, DC: U.S. Patent
and Trademark Office.
Ammari, N., Mrabti, A. A. E., Kalam, A. A. E., &Ouahman, A. A. (2017, March). Securing the
mobile environment: firewall anti-leak of sensitive data on smartphone. In Proceedings of
the Second International Conference on Internet of things and Cloud Computing (p. 126).
ACM.
Atoum, I., Otoom, A., & Abu Ali, A. (2014). A holistic cyber security implementation
framework. Information Management & Computer Security, 22(3), 251-264.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., &Stoddart, K. (2016).
A review of cyber security risk assessment methods for SCADA systems. Computers &
security, 56, 1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., &Smeraldi, F. (2016). Decision support
approaches for cyber security investment. Decision Support Systems, 86, 13-23.
Graham, J., Olson, R., & Howard, R. (Eds.). (2016). Cyber security essentials. CRC Press.
Hoffman, S., Benton, M., & Java, C. (2016). Javascript: The Ultimate Guide to Javascript
Programming and Computer Hacking (javascript for beginners, how to program, hacking
exposed, hacking, how (Volume 12).
Document Page
12CYBER SECURITY
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2018). A Sybil attack detection scheme for a forest
wildfire monitoring application. Future Generation Computer Systems, 80, 613-626.
Perlman, R., Kaufman, C., &Speciner, M. (2016). Network security: private communication in a
public world. Pearson Education India.
Rogers, D. J., & Moore, M. A. (2015). U.S. Patent No. 9,218,466. Washington, DC: U.S. Patent
and Trademark Office.
Salah, K., Calyam, P., &Boutaba, R. (2017). Analytical Model for Elastic Scaling of Cloud-
Based Firewalls. IEEE Transactions on Network and Service Management, 14(1), 136-
146.
Tan, S., Li, X., & Dong, Q. (2015). Trust based routing mechanism for securing OSLR-based
MANET. Ad Hoc Networks, 30, 84-98.
Taylor, C. R., MacFarland, D. C., Smestad, D. R., &Shue, C. A. (2016, April). Contextual, flow-
based access control with scalable host-based SDN techniques. In INFOCOM 2016-The
35th Annual IEEE International Conference on Computer Communications, IEEE (pp. 1-
9). IEEE.
Thomas, R., &Ligh, M. (2016). U.S. Patent No. 9,245,114. Washington, DC: U.S. Patent and
Trademark Office.
Wu, Y., Xu, L., Lin, X., & Fang, J. (2017, November). A New Routing Protocol Based on OLSR
Designed for UANET Maritime Search and Rescue. In International Conference on
Internet of Vehicles (pp. 79-91). Springer, Cham.
Document Page
13CYBER SECURITY
Yang, L. X., Yang, X., & Wu, Y. (2017). The impact of patch forwarding on the prevalence of
computer virus: a theoretical assessment approach. Applied Mathematical Modelling, 43,
110-125.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]