Cyber Security: Literature Review and Main Discussions

Verified

Added on  2023/06/11

|8
|2145
|269
AI Summary
This report provides a literature review on cyber security, evaluating different viewpoints and presenting arguments for and against it. It discusses the advancements in cyber security, its usefulness, and risks associated with it. The report also highlights the importance of cyber security in today's world and its impact on different sectors.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COURSEWORK
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
LITERATURE REVIEW................................................................................................................3
MAIN DISCUSSIONS....................................................................................................................4
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................1
Document Page
INTRODUCTION
Cyber security is an application pertain to technology which provides security to the
system, network and other programmes (Shaukat, 2020) In the report a range of authoritative
sources, books, magazines, blogs, Journals, authentic online sources etc. would be reviewed for
the purpose of cyber security. In Literature review the view points of different authors and
authorities would be evaluated. On the basis of the literature review arguments with respect to
cyber security will be presented, depicting different sides considering the arguments.
LITERATURE REVIEW
As per the view points of (Shaukat, 2020) cyber security is now well improved. With the
development of science and technology artificial intelligence is also getting improved. In recent
time internet became inseparable part of our life. Online criminality is one of such concern which
is affecting the use and reliability of internet services. With this regard cyber security is
performing well. As (Lallie, 2021) shared its view point that cyber security is now not only
related to individuals but to governments and companies are also getting affected by it. As per
the view of (Alhayani, 2021) cyber security safeguards such key data and integrity of such
confidential information of institutions. To the study of (Demirkan, Demirkan and McKee, 2020)
in the realm of computer science cyber security has been the most affective or prominent area
and made a good growth in last couple of years. With the development of internet and
widespread use, cyber security became word of mouth. It has paved way for Critical
infrastructure security, Application security, Network security, Cloud security and internet of
things security etc. As the international Data Corporation (IDC) has forecasted the globally
spending on cyber security would be reaching to 174.7 billion dollar in 2024 (Shaukat, 2020)
From the points of (Lallie, 2021) they upheld cyber security augmentation and supported that the
modern cyber security tools are more likely to prevent cyber attacks, damages and other illegal
penetration in the system of user. With the time new tools or technological improvements like
enforcement of new password rules, drastic forms of algorithms, implementing VPNs
(Georgiadou, Mouzakitis and Askounis, 2021) for different connections, providing timely update
are helping to prevent cyber security concerns.
As per the (Alhayani, 2021) in the nation more than 75% of health care organizations
have shown their cyber security related concerns due to less use of papers and hiking online
Document Page
records keeping of their business. More than 50% cyber crimes are taking place only due to
improper security management by the organization or users. As (Nguyen and Reddi, 2019) said
these incidents are happening due to vulnerability of database, using unsecured application, dark
web services etc. Dr Kennedy, Proposed timely and continuous updates of the software security
so can eliminate such possibilities of cyber issues, As per the investigations of (Alhayani, 2021)
cyber security is not only related to the security of internet or computers which may affect
individuals or any company but also airport security, fire protection, and after CoVID-19
management of Vaccinations and many more such realms are also getting affected. As (Nguyen
and Reddi, 2019) suggested that cyber security is directly related with the failure of the
economy, if it is not performing well then cyber security will be injured. As the reports of
(Lallie, 2021) found there are many types of cyber threats are being experienced by the world at
this time, which mainly consists Malware, Emotet, Phishing, Password attack, Ransomware etc.
MAIN DISCUSSIONS
From the literature review above it can be argued that the recent cyber security is getting
evolved and making great improvements due to advancement of computer science and its various
branches. But cyber threats can not be ignored. Cyber security enhances capability of
organizations, individuals, governments to perform their work with safe use of data (Humayun,
2020.) It prevents online crimes like fraud through internet, financial embezzlement using social
media tools, data protections and preventing data to be accessed by undesired person. As it is
seen that cyber security is helping in advancement and better performance of cloud security,
network security and many more such sectors of the society. The development of cyber security
as a realm of computer science has been admirable. With the time different aspects like
application security, information security, network security, end user security, operational
security these all got improved (von Solms and von Solms, 2018)
Cyber Security has become the essential of today's world, with the continuous update in
the technology, the websites, applications and servers need cyber security to prevent the risk of
cyber attacks. It is important to maintain the privacy and security of the data and information of
individuals and companies. As nowadays, the cyber crimes and attacks have been increased it is
required for very business to adopt the cybersecurity practices protecting the devices, data and
information from the malware, viruses and malicious attacks by the hackers or insiders.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
There are certain arguments which are in favour and against of the cyber security. The arguments
specify the usefulness of the cyber security and how it can be bane as well.
The practices such as Dark Web is one of the cause of growing and developing the cyber
security. The dark web is the collaboration of the websites and internet sites through the web
browsers privately. The users adopt such practices keeping the identity private and anonymous
and it is used for human and drugs trafficking, illegal actions, unlawful activities, distribution of
illegal weapons, piracy and many more (Gokhale and Olugbara, 2020.). The development in the
technology also strengthened the sophistication of the dark web. It is necessary to develop the
cyber security solutions to avoid the increasing number of cyberattacks and vulnerable use of the
internet.
The cyber security enables the protection for the social media users because of unwanted
chaos and identity fraud by the hackers and cybercriminals. The identity theft is the new issue
faced by the people as the hackers uses the personal information and details and represent them
as the same person to steal the necessary information and business deals. The cyber security
adopted by the Government has reduced the number of identity theft and frauds (Irshad and
Soomro, 2018.). Nowadays, the cloud storage also needs protection to protect the personal data,
details, account details and information due to higher risk in the online theft and malware.
Though cyber security is a boon for the businesses and the organizations but it can be
risky too. As, the excessive cyber security of the data to avoid tampering or theft of the data by
the businesses might lead to breach of security or the data may be endangered, it might cause
corrupting of relevant information, this will result in losing the reputation and the information of
the customers.
Cyber attacks causes various issues such as failure of the equipments, breach or leaking
of the national security data and secrets and so on. This might result in theft of sensitive and
valuable data. The cyberattacks can paralyse and disrupt the networks (Porcedda, 2018.). The
cybersecurity may provide the full protection to the risks and breach of the security but it is not
always necessary that they are under the control of IT team. The risks associated with the cyber
crimes are increasing with the increase in the number of the security solutions.
The global expenditures on the cuber security is getting bigger as various reports expressed,
Which is a clear evidence that the current cyber security is not meeting the demands of its users.
Various forms of cyber crimes are taking place due to unavailability of improper cyber security
Document Page
tools and management. There is rigorous need of improvement in cyber security system so can
provide better network environment to the users. A huge amount of cyber threats are taking place
since the users are not managing their cyber security properly which has been a driving factor.
For this purpose there are number of such tools and mechanisms are introduced and computer
science is also progressing rapidly which offers great security to the users. Modern economy or
market are hugely depended on the online networking, there are different tools and techniques
which are being used by such entities to manage their business and most chiefly their finance.
Pertain to economy usefulness of cyber security is radical since a small loophole of cyber
security may cause them series damages so cyber technological advancements are essential for
the growth of economies (Sarker, 2020)
If the cyber security promises apex level of reliability then there would be more
participation of the society to adapt it and practise on fully fledged manner. As it has been used
in the pandemics and made the work easier of management of such complex vaccinations tasks.
So in conclusion it can be said that cyber security a branch of computer science is making good
progress but needs to do more with it in order to augment the use and reliability.
CONCLUSION
From the report above it can be summarized that cyber security a branch of computer
science is a driving factor in the barrier less use of internet and other online services. In the
report by using different authentic sources like newspapers, magazines, books, blogs and other
forms of information literature review had been carried out. On the basis of the literature review
various arguments were also presented depicting both pros and cons of the topic with giving
multidimensional picture of cyber security.
Document Page
REFERENCES
Books and journals-
Alhayani, B., 2021. Effectiveness of artificial intelligence techniques against cyber security risks
apply of IT industry. Materials Today: Proceedings.
Demirkan, S., Demirkan, I. and McKee, A., 2020. Blockchain technology in the future of
business cyber security and accounting. Journal of Management Analytics. .7(2).
pp.189-208.
Georgiadou, A., Mouzakitis, S. and Askounis, D., 2021. Working from home during COVID-19
crisis: a cyber security culture assessment survey. Security Journal, pp.1-20.
Gokhale, C. and Olugbara, O. O., 2020. Dark web traffic analysis of cybersecurity threats
through South African Internet protocol address space. SN Computer Science.1(5).
pp.1-20.
Humayun, M., 2020. Cyber security threats and vulnerabilities: a systematic mapping
study. Arabian Journal for Science and Engineering. 45(4). pp.3171-3189.
Irshad, S. and Soomro, T. R., 2018. Identity theft and social media. International Journal of
Computer Science and Network Security. 18(1). pp.43-55.
Lallie, H. S., 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-
crime and cyber-attacks during the pandemic. Computers & Security. 105. p.102248.
Nguyen, T. T. and Reddi, V.J ., 2019. Deep reinforcement learning for cyber security. IEEE
Transactions on Neural Networks and Learning Systems.
Porcedda, M. G., 2018. Patching the patchwork: appraising the EU regulatory framework on
cyber security breaches. Computer law & security review. 34(5). pp.1077-1098.
Sarker, I. H., 2020. Intrudtree: a machine learning based cyber security intrusion detection
model. Symmetry. 12(5). p.754.
Shaukat, K., 2020. A survey on machine learning techniques for cyber security in the last
decade. IEEE Access. 8. pp.222310-222354.
von Solms, B. and von Solms, R., 2018. Cybersecurity and information security–what goes
where?. Information & Computer Security.
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]