This article discusses the challenges and solutions in cyber security in modern times. It highlights the importance of protecting personal information and the threats posed by technology. The paper also explores the efficiency and use of technology in human lives, as well as the potential harm caused by malpractices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY ISSUES IN MODERN TIMES Cyber Security Issues in Modern Times Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY ISSUES IN MODERN TIMES VonSolms,R.,&VanNiekerk,J.(2013).Frominformationsecuritytocyber security.computers & security,38, 97-102. The term cyber security is related to the term information security in this paper. The paper tries to argue that both the concepts are different though they sound similar and are often confused for being similar. It is argued in this paper that there are no boundaries in the cyber space. They include the protection of personal information of the person using the technology. The paper tries to portray that the people are the one who pose threat to the security of the humans and often participate in the malpractices that can potentially cause harm. The strength of the paper lies in the fact that it highlights the efficiency and the use of the technology in the human lives. It also shows that individuals are more inclined towards the use new technological advancements. The weakness of the paper is in the fact that thought it highlights how the internet is helpful but it fails to show the major threats that occur due to the increased use. Wang,W.,&Lu,Z.(2013).Cybersecurityinthesmartgrid:Surveyand challenges.Computer networks,57(5), 1344-1371. This article focuses on the use of cyber security in the Smart Grid that is referred power system associated with the next generation. It includes the collection of the advanced computing technologies that also include communication. The Smart Grid aims to enhance the communication and the technological process that connects the whole world. Cyber security is a main concern as it includes the involvement of connections via numerous internet devices. It includes the interconnection of different communication networks. This paper mainly focuses on the issues that are faced by the smart grid in inclusion of the cyber security.
2CYBER SECURITY ISSUES IN MODERN TIMES The strength of the paper is in the aspects that it highlights the efficiency of the smart gridservicesinthetechnologicalsphereandhowithashelpedinthegrowthof communication. The weakness is reflected that the seriousness of the threats faced in cyber security and the adverse effects it poses on the personal life of the individuals. Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.IEEE Transactions on Smart Grid,4(2), 847-855. The development of the new technologies has increased the communication process and to exert control over the functions of the systems. This paper aims to show that how smart grid has increased the security practices in the technological world. The research applications involved in the smart grid has strengthened the physical components of the system. It has provided accurate security in the cyber environment. In this paper the different new advancements are highlighted for developing the security services. The strength of the articled lies in the ability to highlight the new technological advancements in the cyber world. The developments have strengthened the technologies whereas the weakness is that it fails to identify the threats that are experienced in the technological world with these developments. Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems.Manufacturing Letters,2(2), 74-77. The technological advancements have made the sphere of technological world prone to cyber-attacks. In this article the challenges are highlighted that are faced in the system of manufacturing new products and to maintain their security. To maintain the security and the originality of the manufactured products is becoming a challenge for the companies. The
3CYBER SECURITY ISSUES IN MODERN TIMES vulnerable position in which the companies are placed due to the technological revolution is highlighted in the article. The strength of the article is that it shows that technological revolutions have posed threats to the security of the manufactured products. The weakness reflects that it fails to show that the technology is not only a cause of destruction but it can also help to maintain secrecy of the products. With the proper use of technology companies can secure their information and that can reduce the possible threats faced by them. Yousefi-Azar,M.,Varadharajan,V.,Hamey,L.,&Tupakula,U.(2017,May). Autoencoder-basedfeaturelearningforcybersecurityapplications.In2017 International joint conference on neural networks (IJCNN)(pp. 3854-3861). IEEE. The paper focuses on the new learning methods that are used in the sphere of cyber security. In this article it is proposed that the Auto-encoders are helpful in the creation of generative models that represent different features of the cyber security. It is associated with the use of two models of detection that are identified in the practices that highlight the detection of intrusive forces and malpractices that are experienced in cyber space. It is highlighted in the article how the use of auto-encoders are helpful in the maintaining and detecting the unethical practices in the cyber space. The strength of the article is that it highlights the use of cyber security and auto- encoders as constructive measures. The weakness is that it fails to show that the humans involved in the development process can act as threat to the process and sometimes Cause major harm to the companies.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBER SECURITY ISSUES IN MODERN TIMES Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked control systems using homomorphic encryption. In2015 54th IEEE Conference on Decision and Control (CDC)(pp. 6836-6843). IEEE. This report deals with the ways by which any cyber security system can be enhanced. The paper introduces the concept of controller encryption which upgrades the already in place cyber security network. One of the prime issues in control engineering is that the network control system that is applied to the industrial infrastructures such as the network of water supply and network of electricity. The authors of this report focus on the idea of cryptography which prevents the malicious use of a secured network. The strength of this research lies in the fact that the authors discuss in detail the idea of cryptography as a method for cyber security. Cryptography is a method which prevents any third party users to log into the system and use their data Craigen,D.,Diakun-Thibault,N.,&Purse,R.(2014).Defining cybersecurity.Technology Innovation Management Review,4(10). In this report the authors deal with the concept of cyber security. Cyber security is a multidimensional idea. The authors have taken a pragmatic qualitative research to try to define the multidimensional idea of cyber security. After a thorough literature review the authors have identified five themes that can be aligned with cyber security. First one is technological solutions, second is events, third is strategies, process and methods, fourth is human engagement and fifth is referent objects. The strength of this article lies in the attempt of the author to deal with only the definition of cyber security. The authors have successfully identified the multidimensional nature of the concept, it cannot be restricted to the technological aspect, and there are other
5CYBER SECURITY ISSUES IN MODERN TIMES connotations of the term. The authors have identified a socio-technical aspect of cyber security. Carr,M.(2016).Public–privatepartnershipsinnationalcyber-security strategies.International Affairs,92(1), 43-62. This research focuses on the idea of cyber security posing as a major challenge to the policy makers and he scholars of international relations. The authors’ claim that the fact that cyber security poses as a major threat to the safety and security of the nation is something that the politicians were aware of from a very long period of time. However, the government has only started to develop new laws of cyber security now. The strength of this article is the fact that the authors deal with importance of law making in the field of cyber security. There has to be proper laws and encryption to protect the cyber security networks of the company. If a private system is hacked the whole data ad secured information of the company might get into the wrong hands and compromise the security of the company. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective.Computers in Human Behavior,38, 304-312. The authors in this article deal with the concept of ‘phishing’ which is a type of online identity threat. The authors talk about the ways to prevent ‘phishing’, one of the ways to do it is using the method of cyber security. This research was done by collecting 1+61 data from an online survey and the findings of the study revealed that the effect of interaction about the conceptual and procedural knowledge has a positive effect of the behavior of the people. Hence, the authors argue that proper training in the field of cybercrime and security will help the user in dealing with threat of ‘phishing’.
6CYBER SECURITY ISSUES IN MODERN TIMES The strength of this article lies in the fact that the author talks about a specific concept of cyber threat which ‘phishing’. The article is also more authentic because the data I collected from 161 users which means that the data collected is authentic and the results from it are trustworthy. Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security strategies.International Journal of Critical Infrastructures 6,9(1-2), 3-31. This article talks about the nations that published their National Cyber Security Strategy (NCSS). All of the documents published talk about the common threat of cyber security. The research paper compare the different NCSS of Australia, Canada, Czech Republic,Estonia,France,Germany,India,Japan,Lithuania,Luxemburg,Romania, Netherlands, New Zealand, South Africa, Spain, Uganda, U.K. and the USA. The comparison highlights the fact that all these statements have certain weakness and strength. The authors have given few suggestions as to how to combat the threat of cyber security. The strength of this paper lies in the fact that the authors have compared the security details of few of the nations and suggested a solution. The fact that it compares the NCSS of a large number of nations means that the data collected are authentic and the results that have been derived from them can be applied to the national security of other regions as well.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CYBER SECURITY ISSUES IN MODERN TIMES References Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective.Computers in Human Behavior,38, 304-312. Carr,M.(2016).Public–privatepartnershipsinnationalcyber-security strategies.International Affairs,92(1), 43-62. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity.Technology Innovation Management Review,4(10). Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.IEEE Transactions on Smart Grid,4(2), 847-855. Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked control systems using homomorphic encryption. In2015 54th IEEE Conference on Decision and Control (CDC)(pp. 6836-6843). IEEE. Luiijf,E.,Besseling,K.,&DeGraaf,P.(2013).Nineteennationalcybersecurity strategies.International Journal of Critical Infrastructures 6,9(1-2), 3-31. VonSolms,R.,&VanNiekerk,J.(2013).Frominformationsecuritytocyber security.computers & security,38, 97-102. Wang,W.,&Lu,Z.(2013).Cybersecurityinthesmartgrid:Surveyand challenges.Computer networks,57(5), 1344-1371. Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems.Manufacturing Letters,2(2), 74-77.
8CYBER SECURITY ISSUES IN MODERN TIMES Yousefi-Azar, M., Varadharajan, V., Hamey, L., & Tupakula, U. (2017, May). Autoencoder- based feature learning for cyber security applications. In2017 International joint conference on neural networks (IJCNN)(pp. 3854-3861). IEEE.