logo

Cyber Security: Exploring the Various Aspects and Solutions

29 Pages8168 Words290 Views
   

Added on  2023-04-21

About This Document

This dissertation explores the various aspects of cyber security and suggests solutions for the identified issues. It discusses the importance of cyber security in today's modern world and the increased demand for cyber security solutions. The research aims to analyze cyber security and cyber warfare, identify the risks faced by cyber security, and propose ways to mitigate these risks.

Cyber Security: Exploring the Various Aspects and Solutions

   Added on 2023-04-21

ShareRelated Documents
Running head: CYBER SECURITY
Cyber Security
[Name of the Student]
[Name of the University]
[Author note]
Cyber Security: Exploring the Various Aspects and Solutions_1
1CYBER SECURITY
Abstract:
Cyber Security is generally considered to be important aspect which needs to be
understood by everyone. The emergence of the new technologies has been associated with
giving rise to new cyber threats and this in turn has been associated with the invention of new
solutions so as to counter the threats. In today’s world almost, each and every device is
connected to the internet and this is the main reason which is responsible for opening up on
new possibilities and threats for the cyber security. This dissertation is going to explore the
various aspects of cyber security and is associated with suggesting solutions for the various
issues that has been identified.
As the world is modernizing and the internet is taking up a significant space in the
business is responsible for the increased demand of the cyber security. The Small and
Medium sized enterprises along with the larger corporations are in search for cyber security
solutions along with looking for certain proactive formulas which would be helping in the
mitigation of the risks related to cyber breaches, data theft and financial frauds.
Cyber Security: Exploring the Various Aspects and Solutions_2
2CYBER SECURITY
Chapter 1: Introduction:.............................................................................................................4
1.1 Background of the Study..................................................................................................4
1.2 Aim of the Research.........................................................................................................4
1.3 Problem Statement...........................................................................................................4
1.4 Research Objectives.........................................................................................................5
1.5 Research Questions..........................................................................................................5
Chapter 2: Literature review:.....................................................................................................5
Introduction:...........................................................................................................................5
Discussion:.............................................................................................................................6
Elements of Cybersecurity:................................................................................................6
Application Security:.....................................................................................................6
Information Security:.....................................................................................................7
Network Security:..........................................................................................................7
Disaster recovery or the Business continuity plan:........................................................8
Operational security:......................................................................................................8
Cases of Cyber Warfare:........................................................................................................8
Summary:.............................................................................................................................10
Chapter 3: Research methodology...........................................................................................10
Research Philosophy:...........................................................................................................11
Data Collection process........................................................................................................11
Data analysis technique:.......................................................................................................12
Cyber Security: Exploring the Various Aspects and Solutions_3
3CYBER SECURITY
Chapter 4: Discussion..............................................................................................................12
Types of security risks:........................................................................................................13
Ransomware:....................................................................................................................13
Malware or Malicious Software:......................................................................................13
Social Engineering:..........................................................................................................15
Phishing:...........................................................................................................................16
Some other type of Cyber-attacks:...................................................................................17
Man-in-the-Middle attack:...........................................................................................17
SQL injection:..............................................................................................................18
Zero-Day Exploit:........................................................................................................18
Denial-of-service attacks:.............................................................................................19
Chapter 5: Conclusion and recommendation...........................................................................19
Conclusion:..........................................................................................................................19
Recommendation:................................................................................................................22
References:...............................................................................................................................23
Cyber Security: Exploring the Various Aspects and Solutions_4
4CYBER SECURITY
Chapter 1: Introduction:
1.1 Background of the Study
Cyber security generally refers to the protection of the systems connected to the
internet and this includes the hardware, software and data from any kind of cyberattack. The
security in computing generally consists of the cybersecurity and the physical security and
both of this are used by the enterprises for the purpose of providing protection against any
kind of unauthorized access to the data centers or any of the other computerized systems
(Levi, Allouche and Kontorovich 2018). The Information security is generally designed for
the purpose of maintaining the integrity, confidentiality and the availability of the data which
are considered to be the subsets of cyber security.
1.2 Aim of the Research
The aim of this research is to analyze the Cybersecurity and the cyberwarfare which is
the main focus of this research. Besides this the risks that are faced by the cybersecurity and
the way by which the risks can be mitigated has also been analyzed.
1.3 Problem Statement
The importance of cyber security is gradually increasing day by day for the everyday
users. Besides this the increased opportunities that has brought due to the new technologies
that has also been associated with bringing a lot of security concerns which is to be taken into
account as well. The users need to be aware of the various type of risks that are associated
with the usage of everyday cyber technology where the increased number of everyday items
are being connected to the internet (Dua and Du 2016). As everything is being moved
Cyber Security: Exploring the Various Aspects and Solutions_5
5CYBER SECURITY
towards the internet new ways are opening up for the criminals and well as for the
government officials to compromise the cyber security and privacy of the users.
1.4 Research Objectives
The major object of this research is to understand the ways by which the cyberwarfare can be
mitigated along with understanding the basic concept of cybersecurity and the various
elements of cyber security.
1.5 Research Questions
Q1. What is Cybersecurity?
Q2. What are the basic elements of cybersecurity?
Q3. What are the major threats faced by cybersecurity?
Q4. What is Cyberwarfare?
Q5. What are the ways by which the different threats faced by cybersecurity can be
mitigated?
Chapter 2: Literature review:
Introduction:
Cyberwarfare can be defined as the computer of network-based conflict which
generally involves an attack that has been motivated politically by a nation-state on some
other nation state. This type of attacks generally involves a nation-state actor who is
associated with making attempts for disrupting the activities of a specific organization or
nation states specially for the strategic or military purposes as well as for cyberespionage.
Cyber Security: Exploring the Various Aspects and Solutions_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cyber Security in Retail Industry
|21
|7572
|72

Changing the Job Market and Business Strategy under Cyber Security Guidance
|65
|15173
|37

Applications of Cyber-Security in Higher Education
|28
|7698
|11

Cyber Security in Aviation
|115
|33698
|384

Study of Cyber Security issues for e-commerce
|51
|15114
|99

Cybersecurity Business Plan for Desklib
|25
|4839
|272