Cyber Security: Threats, Importance, and Tools

Verified

Added on  2023/05/30

|11
|3114
|56
AI Summary
This paper discusses cyber security threats, their importance in private and public security, and the technology and tools available to curb them. It also includes a literature review of the study. The review identifies several threats, including ransomware evolution, the expansion of artificial intelligence, and the blockchain revolution. The paper also highlights the importance of cyber security in today's online business environment and the tools available to strengthen security programs. The slug is 'cyber-security-threats-importance-tools' and the subject is cyber security. No course code, course name, or college/university is mentioned.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: Cyber Security
Cyber security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber Security
Table of Contents
Introduction.................................................................................................................................................3
Issues concerning cyber security.................................................................................................................3
Importance of the issues in private and public security..............................................................................5
Literature review of the study.....................................................................................................................5
Technology and tools available related to the issue....................................................................................7
Conclusion...................................................................................................................................................7
References...................................................................................................................................................9
2
Document Page
Cyber Security
Introduction
The aim of the paper is to discuss the cyber security threats, how the improvement in
technology is becoming a danger for the general public and health care units as well. The
literature shares, there are multiple ways in which people may face cyber security issues in the
internet. However, despite the fact the security systems are becoming more and more secured
and strong. There are some securities issues are still found such as, Malware, which includes
viruses, trojan horses and malicious software’s with which the attackers attacks the computers
and mobile phones through malicious websites virus led .apk links (Tuvell, & Venugopal, 2015)
Others may include Phishing and Denial of Service (Hulten, et al, 2014). This paper, however,
works towards identifying the issues, the importance of more secured systems and the tools and
techniques that be used to curb the issues. This research paper has shown the possible cyber
security issues which company could face if it does not maintain the secure security program.
Issues concerning cyber security
There are issues concerning to cyber security which are raised by the rise in technological
advancement, following are some of the issues people would be facing in coming years.
However, the main issue of the cyber security is related to bombing in which ill-intentioned
persons come together to attack the secure system of the organization (Donahoe et al. 2017).
These issues show the possible problems which company could face in its business.
Ransomware Evolution: This is called to be the curse to cyber security amongst the data
professionals and IT people. This virus attacks directly to the customer and the business
information, in order to remove these viruses, the cyber criminals are needed to be involved and
their egregious demands are to be fulfilled (Richardson, & North, 2017). According to the
literature these attacks have gone to 36% in 2018 and the cost is double the percentage. The
cybercrime is growing the fastest in this area (Hampton, & Baig, 2015)
3
Document Page
Cyber Security
Source:
The expansion of Artificial Intelligence: This is another issue pertaining to security and threat,
robots these days are used to defend against the cyber threats and attacks, however, the attackers
are using the robots to attack as well. According to a report it has been estimated till 2025 that
the businesses will have to spend almost $2.5 billion on Artificial Intelligence in order to prevent
themselves from the attacks (Dilek, Çakır, & Aydın, 2015). Nevertheless, both the parties are
seen using the robots for more or less the same benefits. The robots are not required to be paid;
therefore, it is on a one time expenditure which is, however, seen as an investment for them.
They are also able to work 24 hours all seven days of the week. Due to which the security
professionals are finding it difficult to act against them, there is rarely a chance to deal with the
attack immediately (Helbing, 2019).
Blockchain Revolution: it was seen in 2017, there were a lot of crypto currencies like Bitcoin
and Ethereum. The blockchains are the base to create crypto currencies, which is yet another
technical revolution and innovation which provides the secure transaction to the public (John
Mason 2018). Blockchain is a security method against the cyber security issues being faced by
the companies; it is based upon the public, private keys, wherein the private key is given to the
owner having an access to the bitcoin assets. It has been said that while storing data in the
blockhain it becomes incorruptible (Kakavand, Kost, & Chilton, 2017).
Importance of the issues in private and public security
Cyber attacks are becoming even more widespread in the UK, which is becoming an
issue for the people and businesses globally. Despite the introduction of the GDPR (General
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber Security
Data Protection Regulation) which is meant particularly to develop and promote security around
the personal data. The amount of threats pertaining to cyber attacks are continuously increasing.
According to a recent report being published, more than 50 percent companies are experiencing
cyber attacks which have compromised their data; this number is inclusive of the companies for
which the entire IT infrastructure has been hacked. Out of these, 77 percent companies are
however, utilized the fireless techniques (Businesscomputing, 2018). The importance of issues
also raises for the fact that 98% of the businesses in today’s scenario is operating online, with the
advancement in technology and globalization even the small business houses are gaining huge
profits by working online through social media sites, their own websites, they are using software
to keep and maintain their employee and customer data, most importantly every business is using
online banking, saving their UPI codes and banking passwords online. The customers on the
other hand are also buying online. According to a governmental statistics, out of 4 in every 10
business is dealing with cyber threats in the last year. The attacks include viruses, which is the
most common of all, hacking, data compromising and theft of financial and customer’s
information (Kevin, 2018). Nonetheless, if proper security program and security concerns are not
followed then it might negatively impact the business outputs as well. There are several ill-
intentioned persons who have been impacting the business
Literature review of the study
The review of the literature pertaining to the cyber security unearthed few more threats
which people would be facing in the coming years as the technology in every field is advancing.
The few technology advancement and related security threats are being given below (Hampton,
& Baig, 2015).
Connected Cars and Semi-Autonomous Trucks – the technology has upgraded to connected
cars and driverless cars, according to the literature the connected cars in order to optimize their
operation and passenger’s comfort, utilize onboard sensors (Fagnant, & Kockelman, 2015). This
is performed through Smartphone integration. Alone in 2015 half of the connected car vehicles
are being sold, it has been predicted that alone in 2025, the new cars sold will be connected to
the user Smartphone, however, this will give an another chance to the attackers to attack the
drivers personal information (Anderson, 2014). The route and signals of the driver and it will
5
Document Page
Cyber Security
make it convenient for the attackers to compromise the user’s information and personal data
through attacking their Smartphone which is generally on Bluetooth while driving and the
unlocked (Petit, 2018). The hacking and stealing data is not only limited to the private companies
and hackers, the entire nation is facing this adverse situation through state sponsored attacks.
The nation sometimes also uses the skills of these hackers and cyber IT individuals in order to
gain access to other governments data and policies, for which the government attacks the
infrastructure (Donahoe, Hathaway, Twomey, Lewis, Nye & Tikk, 2017). Therefore, these
attacks are seen happening in private and public sector both, the review identifies that in
2018 and beyond these attacks are expecting rise, especially before the elections and meetings
(Azmi, Tibben, & Win, 2016). Internet of things is other major concern becoming omnipresent.
The major harm it results into is as it grows, if one device is attacked by the attackers, for them it
will become easy to hack and compromise every connected device to the parent device (Pacheco,
& Hariri, 2016). There is a kit called botnet kit, which makes it easy for the attackers to attack
every connected device, despite the security they ensure, according to a study IOT is responsible
to infect more than one million devices every month (Abomhara, & Køien, 2015). The healthcare
industry is also flourishing and every day coming up with the latest technology to ease the
patient and treat them more scientifically in order to remove the human errors. Smart Medical
Devices and Electronic Medical Records (EMRs) is another major evolution in the same field
as the medical records are becoming digital, the technology evolution also raises certain privacy
and security concerns pertaining to patient’s health (Topol, 2015). According to a report, more
the number of devices is connected to the hospital the more vulnerable will be the patient’s
information and medical records (Yang, Li, Mulder, Wang, Chen, Wu, & Pan, 2015). The
attackers will be in a position to directly compromise the devices connected to the patients. It
will be easy for the attacker to increase or decrease the dosage, theoretically and disable the
monitoring system (Pilkington, M. (2017). The given tools and cyber security system should be
supported by the device anti-software system which would be helpful in strengthen the security
program and save confidential data from the ill-intentioned persons.
Technology and tools available related to the issue
Phishline gives the user the patented and highly erratic simulations for multiple viruses,
this covers the e-mails, mobile phones, vishing (Voice), Smishing (SMS). This also prevents the
6
Document Page
Cyber Security
user from duplicate templates. This is the only tool so far which provides attack simulations
(Sadeh, Wescoe, Brubaker, & Hong, 2016). The main secure technology system and cyber
computing system have been adopted to strengthen the security mechanism in business.
Firewall, this is an age old method to prevent attack and data theft, this cyber security
tool monitors the traffic on the network as well as on the connections and the attempts which are
made to break the security. This tool decides whether or not the intruder should pass freely onto
the network (Yunfei, Yuanbao, Xuan, Xuan, & Qi, 2015).
Antivirus software, these software’s when installed alert the user of any virus and
infection due to malware attack while opening a website or mails. This tool also helps scanning
e-mails in order to prevent any malicious attachment it might have (Dietrich, Gadhe, Boice, &
Carpenter, 2016).
PKI Services, this technology is different from SSL and TLS technology being used, this
technology, however, is used to encrypt the communication over the server. This technology is
also responsible for the HTTPS in the browser. SSL on the other hand is also responsible for
internal networks (Fagnant, & Kockelman, 2015).
Penetration testing, in order to test the business security systems, the penetration security
proves to be useful, in this technology, the professionals use the same techniques and tools which
are being generally used by the hackers to attack and compromise the company systems, these
are however called the ethical hackers. This helps identify network security issues in order to
create a firewall and safety against them (Pilkington, 2017). This will not only increase the
confidentially of the data but also help in reducing the insider trading and malfunctioning in the
security data program. The penetration testing is used by hackers to create bombing in the
targeted computer so that they could drag confidential data for the system and strengthen the
business outcomes.
Conclusion
From the literature review, it has been identified that despite the fact that there are a
number of tools and techniques have come up in order to protect the company data, attackers are
still growing with their up gradation in technology. However, as the technology is improving so
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security
is the need to stay more aware and protected. There are a number of ways being identified,
among which penetration technique has been proved successful, companies such as Facebook
and Google also award people who identify a glitch in their security system and help them
improve over the same. Now in the end, it could be inferred that advance technologies and cyber
security installation should be supported by the secure mechanism which will assist in restrain
the malware attacks of the ill-intentioned persons in effective manner.
8
Document Page
Cyber Security
References
Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities,
threats, intruders and attacks. Journal of Cyber Security, 4(1), 65-88.
Anderson, J. M., Nidhi, K., Stanley, K. D., Sorensen, P., Samaras, C., & Oluwatola, O. A.
(2014). Autonomous vehicle technology: A guide for policymakers. Rand Corporation.
Azmi, R., Tibben, W., & Win, K. T. (2016). Motives behind Cyber Security Strategy
Development: A Literature Review of National Cyber Security Strategy.
Businesscomputing., (2018). The Importance of Cyber Security in the UK [Online] Retrieved
from http://www.businesscomputingworld.co.uk/news-post/the-importance-of-cyber-
security-in-the-uk/
Dietrich, K. W., Gadhe, G. P., Boice, E. T., & Carpenter, S. G. (2016). U.S. Patent Application
No. 14/871,695.
Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to
combating cyber crimes: A review. arXiv preprint arXiv:1502.03552.
Donahoe, E., Hathaway, M., Twomey, P., Lewis, J. A., Nye Jr, J., & Tikk, E. (2017). Getting
beyond Norms: New Approaches to International Cyber Security Challenges.
Fagnant, D. J., & Kockelman, K. (2015). Preparing a nation for autonomous vehicles:
opportunities, barriers and policy recommendations. Transportation Research Part A:
Policy and Practice, 77, 167-181.
Hampton, N., & Baig, Z. A. (2015). Ransomware: Emergence of the cyber-extortion menace.
Helbing, D. (2019). Societal, economic, ethical and legal challenges of the digital revolution:
from big data to deep learning, artificial intelligence, and manipulative technologies.
In Towards Digital Enlightenment (pp. 47-72). Springer, Cham.
9
Document Page
Cyber Security
Hulten, G. J., Rehfuss, P. S., Rounthwaite, R., Goodman, J. T., Seshadrinathan, G., Penta, A.
P., ... & Snelling, D. A. W. (2014). U.S. Patent No. 8,839,418. Washington, DC: U.S.
Patent and Trademark Office.
2018 5 Cybersecurity Challenges and Trends: What to Expect in 2018
Kakavand, H., Kost De Sevres, N., & Chilton, B. (2017). The blockchain revolution: An analysis
of regulation and technology related to distributed ledger technologies.
Kevin L, Posted on:8 October 2018 Why cyber security is important for your business
https://companieshouse.blog.gov.uk/2018/10/08/why-cyber-security-is-important-for-
your-business/
Pacheco, J., & Hariri, S. (2016, September). IoT security framework for smart cyber
infrastructures. In Foundations and Applications of Self* Systems, IEEE International
Workshops on (pp. 242-247). IEEE.
Petit, J. (2018, July). Automated Vehicles Cybersecurity: Summary AVS’17 and Stakeholder
Analysis. In Automated Vehicles Symposium 2018 (pp. 171-181). Springer, Cham.
Pilkington, M. (2017). Can Blockchain Improve Healthcare Management? Consumer Medical
Electronics and the IoMT.
Richardson, R., & North, M. (2017). Ransomware: Evolution, mitigation and
prevention. International Management Review, 13(1), 10-21.
Sadeh-Koniecpol, N., Wescoe, K., Brubaker, J., & Hong, J. (2016). U.S. Patent No. 9,373,267.
Washington, DC: U.S. Patent and Trademark Office.
Topol, E. J. (2015). The patient will see you now: the future of medicine is in your hands (Vol.
2015364). New York: Basic Books.
Tuvell, G., & Venugopal, D. (2015). U.S. Patent No. 9,104,871. Washington, DC: U.S. Patent
and Trademark Office.
Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., ... & Pan, H. (2015). Emerging
information technologies for enhanced healthcare. Computers in Industry, 69, 3-11.
10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber Security
Yunfei, L., Yuanbao, C., Xuan, W., Xuan, L., & Qi, Z. (2015, August). A Framework of Cyber-
Security Protection for Warship Systems. In Intelligent Systems Design and Engineering
Applications (ISDEA), 2015 Sixth International Conference on (pp. 17-20). IEEE.
11
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]