Foundation of Cyber-Security: Information Security Policies and Encrypted E-mail Solutions
VerifiedAdded on 2023/05/28
|12
|4083
|98
AI Summary
This article discusses information security policies and encrypted e-mail solutions as part of the foundation of cyber-security. It covers various security measures such as wiping utilities, encryption techniques, and secure backup plans to protect data and prevent cyber-attacks. The article also provides insights on the current state of encrypted e-mail solutions and how to secure Gmail accounts.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Foundation of cyber-security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
FOUNDATION OF CYBER-SECURITY
1
Table of Contents
Q.2 Information security policies...........................................................................................................2
Wiping Utilities..................................................................................................................................3
Reset computer with Windows 8......................................................................................................4
Clean external drives.........................................................................................................................4
Use encryption technique to protect data files.................................................................................4
Destroy drives....................................................................................................................................5
Q.3 current state of encrypted e-mail solution.....................................................................................5
Complete the security checklist of g-mail account............................................................................6
Select safe email passwords..............................................................................................................6
Turn on 2 step verification process....................................................................................................7
Use the encryption process to protect emails...................................................................................7
Use of proton mail.............................................................................................................................7
Cryptography technology..................................................................................................................8
Keep networks and software up-to-date...........................................................................................8
Use a secure backup plan..................................................................................................................8
Adopt some protection......................................................................................................................8
Revoke unauthorized applications.....................................................................................................9
Enable HTTPS Security.......................................................................................................................9
References...........................................................................................................................................10
1
Table of Contents
Q.2 Information security policies...........................................................................................................2
Wiping Utilities..................................................................................................................................3
Reset computer with Windows 8......................................................................................................4
Clean external drives.........................................................................................................................4
Use encryption technique to protect data files.................................................................................4
Destroy drives....................................................................................................................................5
Q.3 current state of encrypted e-mail solution.....................................................................................5
Complete the security checklist of g-mail account............................................................................6
Select safe email passwords..............................................................................................................6
Turn on 2 step verification process....................................................................................................7
Use the encryption process to protect emails...................................................................................7
Use of proton mail.............................................................................................................................7
Cryptography technology..................................................................................................................8
Keep networks and software up-to-date...........................................................................................8
Use a secure backup plan..................................................................................................................8
Adopt some protection......................................................................................................................8
Revoke unauthorized applications.....................................................................................................9
Enable HTTPS Security.......................................................................................................................9
References...........................................................................................................................................10
FOUNDATION OF CYBER-SECURITY
2
Q.2 Information security policies
Global designs limited is an IT organization that provide various information system
related services to their consumer ‘s like communication, mobile networks, computer
devices and many more [1]. The data stored by this organization has a lifetime of one
year after that the data or information of consumers are deleted. The deletion of data is
completed by using the delete function of the operating system and it does not delete
the complete data due to which hackers collect such data and demand money to restore
back. The main aim of this investigation it to develop the information security policies
to avoid the issue of data hacking and protect the deleted data. Today information and
technology developed a number of hardware and software to store data or information
that uses global organization which are also associated with data breach [2]. There are
few tools and techniques uses by hackers to recover the deleted data of an organization,
for example, forensic computer technology which is used by governments for
investigation purpose. But hackers develop their own algorithm and use the concept of
forensic tools to recover that deleted data. It is observed when any person deletes a
data file from the computer system but it does not leave your hard drive. The deleted
files from a hard drive only avoid the pointers which make it easy for hackers to recover
the data of an organization. Immense caching is a kind of process that saves all data or
information by using search engines, for example, Google. Most the attackers use other
tools to block the e-mail and personal information such as phishing scams, remote
access and password break system.
Forensic is very common technology which is used by the global organization to recover
the deleted data or information but attackers produce a complex process to block user’s
peripheral devices. Information security policy is defined as a protection approach that
handles the unauthentic servers and analysis the key factors that increase the issue of
hacking or data breach. It is observed that information security follows the main three
principles to develop policies which are described below:
Confidentially: it means that data or information is only utilized by consumers that are
authorized to access them and global organization provided this authentication to their
whole management team that create the risk for deleting data.
2
Q.2 Information security policies
Global designs limited is an IT organization that provide various information system
related services to their consumer ‘s like communication, mobile networks, computer
devices and many more [1]. The data stored by this organization has a lifetime of one
year after that the data or information of consumers are deleted. The deletion of data is
completed by using the delete function of the operating system and it does not delete
the complete data due to which hackers collect such data and demand money to restore
back. The main aim of this investigation it to develop the information security policies
to avoid the issue of data hacking and protect the deleted data. Today information and
technology developed a number of hardware and software to store data or information
that uses global organization which are also associated with data breach [2]. There are
few tools and techniques uses by hackers to recover the deleted data of an organization,
for example, forensic computer technology which is used by governments for
investigation purpose. But hackers develop their own algorithm and use the concept of
forensic tools to recover that deleted data. It is observed when any person deletes a
data file from the computer system but it does not leave your hard drive. The deleted
files from a hard drive only avoid the pointers which make it easy for hackers to recover
the data of an organization. Immense caching is a kind of process that saves all data or
information by using search engines, for example, Google. Most the attackers use other
tools to block the e-mail and personal information such as phishing scams, remote
access and password break system.
Forensic is very common technology which is used by the global organization to recover
the deleted data or information but attackers produce a complex process to block user’s
peripheral devices. Information security policy is defined as a protection approach that
handles the unauthentic servers and analysis the key factors that increase the issue of
hacking or data breach. It is observed that information security follows the main three
principles to develop policies which are described below:
Confidentially: it means that data or information is only utilized by consumers that are
authorized to access them and global organization provided this authentication to their
whole management team that create the risk for deleting data.
FOUNDATION OF CYBER-SECURITY
3
Integrity: it means that any changes to the data through unauthorized consumers are
not possible and changes by authorized consumers are tracked.
Availability: it means that the data is accessible when authorized consumers require it.
So, to develop security policies for global designs limited all these steps can be used and
management team can hire an IT team that can control the security-related issues.
There are various kinds of reasons to maintain the efficiency of the computer system
and devices in order to prevent data from unauthentic networks which are the
following:
Maybe the backup data collected on a CD-ROM has touched a certain level and
requires to be obliterated.
Maybe a hard disk has become injured and is broken
Most the attackers first identify the location and remote access to enter into the
organization system and they use an easy restoration algorithm to get the deleted data
of an employee. This issue faced by many organizations and Global limited is one of
them that lost their personal data deleted from the computer system [3].
Information and communication technology developed few steps and approaches to
delete the unwanted data or information properly which can be applied for Global
limited organization which are described below:
Wiping Utilities
It is one of the best security policies to address the problem of a data breach that scrubs
all unused or unwanted data from computer systems. This organization communicates
with numbers of consumers in a day and them stores their private details in computing
devices for which they can adopt such process. Information technology also developed
much software to avoid the issue of hacking such as Cyber-Cide, Declasfy, East-West's,
PDA Defence, DBAN, Symantec Ghost’s gdisk32, and Dispose of Secure. The disk wiping
takes more time to delete the data or information from computers but the Global
organization can implement this step to improve the security of data [4]. A recent study
shows that Mac OS X provides a platform to secure the wiping of hard drives and it also
helps to back up the consumer's data if they want before wiping the hard disk.
3
Integrity: it means that any changes to the data through unauthorized consumers are
not possible and changes by authorized consumers are tracked.
Availability: it means that the data is accessible when authorized consumers require it.
So, to develop security policies for global designs limited all these steps can be used and
management team can hire an IT team that can control the security-related issues.
There are various kinds of reasons to maintain the efficiency of the computer system
and devices in order to prevent data from unauthentic networks which are the
following:
Maybe the backup data collected on a CD-ROM has touched a certain level and
requires to be obliterated.
Maybe a hard disk has become injured and is broken
Most the attackers first identify the location and remote access to enter into the
organization system and they use an easy restoration algorithm to get the deleted data
of an employee. This issue faced by many organizations and Global limited is one of
them that lost their personal data deleted from the computer system [3].
Information and communication technology developed few steps and approaches to
delete the unwanted data or information properly which can be applied for Global
limited organization which are described below:
Wiping Utilities
It is one of the best security policies to address the problem of a data breach that scrubs
all unused or unwanted data from computer systems. This organization communicates
with numbers of consumers in a day and them stores their private details in computing
devices for which they can adopt such process. Information technology also developed
much software to avoid the issue of hacking such as Cyber-Cide, Declasfy, East-West's,
PDA Defence, DBAN, Symantec Ghost’s gdisk32, and Dispose of Secure. The disk wiping
takes more time to delete the data or information from computers but the Global
organization can implement this step to improve the security of data [4]. A recent study
shows that Mac OS X provides a platform to secure the wiping of hard drives and it also
helps to back up the consumer's data if they want before wiping the hard disk.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
FOUNDATION OF CYBER-SECURITY
4
Reset computer with Windows 8
Windows 8 is one of the advanced operating systems that provides the process of
wiping by which consumers can delete the data properly. It is observed that global
limited company uses the old operating system in their laptops and computer system
which can be easily hacked if they implement windows 8 in their devices then they can
improve the security of deleted data. The main advantage of Windows 8 is that it does
not require any third party application to run a wiping process. Before enabling the
process of data wiping please reset your windows 8 and employees can select the ‘fully
clean the drive’ portion during removing of data [5].
Clean external drives
Develop a full format of an external drive to wipe any deleted file and global
organization can involve such kind of policy to secure their deleted files. First, connect
the drive system with employee’s computer then click on the right button in file
explorer and chose format option.
Use encryption technique to protect data files
It is a very common security policy to improve protection of deleted data files and many
organizations are using this approach. This technology secures all data or information
files including both deleted and current files and employees of a global organisation can
enable this technique to address the issue of data breaching or hacking. People can
enable the encryption by using the bit locker process develops into the professional
versions of windows [6]. In which the data file converts into a form of code which
cannot be easily hacked by attacker and people will provide an encryption passphrase
to access the data files. Hackers who want to recover the deleted files or information
from the computer that require an encryption key which is produced by the owner of
the computer. So, a global limited company can implement such kind of technique to
address the problem of cyber-crimes and they should ensure that employees do not
provide their password to another person. In the last few years the encryption
approach reduced the problem of hacking by 30% and it has the potential to protect the
personal data of an organization.
Vera crypt is a type of encryption tool which creates secure containers to protect the
data files from hackers. While there are few other software that works as an encryption
4
Reset computer with Windows 8
Windows 8 is one of the advanced operating systems that provides the process of
wiping by which consumers can delete the data properly. It is observed that global
limited company uses the old operating system in their laptops and computer system
which can be easily hacked if they implement windows 8 in their devices then they can
improve the security of deleted data. The main advantage of Windows 8 is that it does
not require any third party application to run a wiping process. Before enabling the
process of data wiping please reset your windows 8 and employees can select the ‘fully
clean the drive’ portion during removing of data [5].
Clean external drives
Develop a full format of an external drive to wipe any deleted file and global
organization can involve such kind of policy to secure their deleted files. First, connect
the drive system with employee’s computer then click on the right button in file
explorer and chose format option.
Use encryption technique to protect data files
It is a very common security policy to improve protection of deleted data files and many
organizations are using this approach. This technology secures all data or information
files including both deleted and current files and employees of a global organisation can
enable this technique to address the issue of data breaching or hacking. People can
enable the encryption by using the bit locker process develops into the professional
versions of windows [6]. In which the data file converts into a form of code which
cannot be easily hacked by attacker and people will provide an encryption passphrase
to access the data files. Hackers who want to recover the deleted files or information
from the computer that require an encryption key which is produced by the owner of
the computer. So, a global limited company can implement such kind of technique to
address the problem of cyber-crimes and they should ensure that employees do not
provide their password to another person. In the last few years the encryption
approach reduced the problem of hacking by 30% and it has the potential to protect the
personal data of an organization.
Vera crypt is a type of encryption tool which creates secure containers to protect the
data files from hackers. While there are few other software that works as an encryption
FOUNDATION OF CYBER-SECURITY
5
technique but they are very less secure as compare to Vera crypt which allows
employees to design their information security strategy. It also offers a system that
encryption the complete hard disk of consumers and global can develop such kind of
step that provides deniability feature to hide the personal data files. Storing the
confidential information can produce various security risks but encryption handle this
issues but it does not eliminate such issues [7]. When the Vera crypt volume has
mounted the data of employees can be vulnerable, so people should keep it closed
except when they modifying the files inside it.
Destroy drives
Global private limited is an IT company that contains the data of consumer in a hard
drive for which they required to destroy that drive as compared to increase the security
risks. Destruction of the data file is one of the best approaches which have the potential
to delete the data or information properly and reduce the issue of cyber-crimes. There
are various kinds of tools and methods involves in this security policy, for example,
shredding disk platters, incinerating tapes, and grinding the surfaces off of CD ROM.
Smart technology is an organization that provides a platform to identify that the deleted
file from the computer can be recovered or not and global community can communicate
with this authority when they delete any kind of data [8]. C-Cleaner is an advanced tool
that handles the deleted data files and monitors the security issues associated with
these files? This organization can adopt such kind of software and install in every
computer devices and they should ensure that employees will use these tools during
deletion of data files. An eraser is also a common tool which is used to delete the
unwanted data or information permanently from the computer system. It has the ability
to clean a digital storage device by which the issue of hacking can be addressed and a
global company can improve the security of their personal information.
Q.3 current state of encrypted e-mail solution
E-mail is one of the most common communication platforms which are used by many
organization and most of the hackers target on e-mails of consumers. It is observed that
hackers first generate traffic signals by using malware software and send an unwanted
or spam mail to the user by which they extract the personal information of the
consumer. Yes, data or information can be extracted from the e-mails because hackers
5
technique but they are very less secure as compare to Vera crypt which allows
employees to design their information security strategy. It also offers a system that
encryption the complete hard disk of consumers and global can develop such kind of
step that provides deniability feature to hide the personal data files. Storing the
confidential information can produce various security risks but encryption handle this
issues but it does not eliminate such issues [7]. When the Vera crypt volume has
mounted the data of employees can be vulnerable, so people should keep it closed
except when they modifying the files inside it.
Destroy drives
Global private limited is an IT company that contains the data of consumer in a hard
drive for which they required to destroy that drive as compared to increase the security
risks. Destruction of the data file is one of the best approaches which have the potential
to delete the data or information properly and reduce the issue of cyber-crimes. There
are various kinds of tools and methods involves in this security policy, for example,
shredding disk platters, incinerating tapes, and grinding the surfaces off of CD ROM.
Smart technology is an organization that provides a platform to identify that the deleted
file from the computer can be recovered or not and global community can communicate
with this authority when they delete any kind of data [8]. C-Cleaner is an advanced tool
that handles the deleted data files and monitors the security issues associated with
these files? This organization can adopt such kind of software and install in every
computer devices and they should ensure that employees will use these tools during
deletion of data files. An eraser is also a common tool which is used to delete the
unwanted data or information permanently from the computer system. It has the ability
to clean a digital storage device by which the issue of hacking can be addressed and a
global company can improve the security of their personal information.
Q.3 current state of encrypted e-mail solution
E-mail is one of the most common communication platforms which are used by many
organization and most of the hackers target on e-mails of consumers. It is observed that
hackers first generate traffic signals by using malware software and send an unwanted
or spam mail to the user by which they extract the personal information of the
consumer. Yes, data or information can be extracted from the e-mails because hackers
FOUNDATION OF CYBER-SECURITY
6
send traffic signal on the network of the consumer by which they can easily enter into
their servers and encrypt all personal details of the user. According to Blumberg and
Eckersley, (2009) security of consumer data is one of the biggest issues in the world and
many hackers use the malicious process to encrypt the personal data of users. A recent
study observed that in the last five years more than 2 million people were faced the
issue of data breaching and hackers enter into their personal accounts by using Gmail
accounts. First, they generate unauthentic networks using malware and transfer
unwanted links or signals to the Gmail account of the consumer. This is a very serious
problem for every organization because every user clicks on the spam links and
unauthentic website by they can their personal information like bank details, financial
documents and many more. In the last few years the information and communication
technology produced numbers of advanced security tools by which people can protect
the data of their emails accounts which are the following:
Complete the security checklist of g-mail account
Initially, Google provides a simple checklist process to secure the data of Gmail and
some of the users know the feature of security checklist due to which they lost their
data. People can see the IP address of a person that entered into their personal accounts
and it enables the security process to monitor the unauthorized networks. People can
also adopt the other security tools, for example, anti-malware scanner, and firewall and
make sure they use only updated operating systems [9].
Select safe email passwords
It is observed that most the consumers use a simple password system like 12345,
xyz123 and many more that can be easily hacked by attackers. It is not enough to
protect their personal data or information because hackers use an advanced algorithm
that detects the ID and password of their Gmail. For which they can adopt a high-level
password and user ensure that they use numbers, upper and lower case and characters
in order to address the unauthentic servers and networks [10]. Gmail allows people to
use up to 200 characters and some numbers to develop a complex password by which
they can secure their Gmail account as well as personal data files.
6
send traffic signal on the network of the consumer by which they can easily enter into
their servers and encrypt all personal details of the user. According to Blumberg and
Eckersley, (2009) security of consumer data is one of the biggest issues in the world and
many hackers use the malicious process to encrypt the personal data of users. A recent
study observed that in the last five years more than 2 million people were faced the
issue of data breaching and hackers enter into their personal accounts by using Gmail
accounts. First, they generate unauthentic networks using malware and transfer
unwanted links or signals to the Gmail account of the consumer. This is a very serious
problem for every organization because every user clicks on the spam links and
unauthentic website by they can their personal information like bank details, financial
documents and many more. In the last few years the information and communication
technology produced numbers of advanced security tools by which people can protect
the data of their emails accounts which are the following:
Complete the security checklist of g-mail account
Initially, Google provides a simple checklist process to secure the data of Gmail and
some of the users know the feature of security checklist due to which they lost their
data. People can see the IP address of a person that entered into their personal accounts
and it enables the security process to monitor the unauthorized networks. People can
also adopt the other security tools, for example, anti-malware scanner, and firewall and
make sure they use only updated operating systems [9].
Select safe email passwords
It is observed that most the consumers use a simple password system like 12345,
xyz123 and many more that can be easily hacked by attackers. It is not enough to
protect their personal data or information because hackers use an advanced algorithm
that detects the ID and password of their Gmail. For which they can adopt a high-level
password and user ensure that they use numbers, upper and lower case and characters
in order to address the unauthentic servers and networks [10]. Gmail allows people to
use up to 200 characters and some numbers to develop a complex password by which
they can secure their Gmail account as well as personal data files.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
FOUNDATION OF CYBER-SECURITY
7
Turn on 2 step verification process
It is a very common step which is used by many consumers to protect their personal
information and when any person enable this step, anyone attempting to log in to a
human personal account which will require a special code sent to their mobile number.
Generally, hacker’s uses a bypass process to hack the personal data or information if
people adopt this step by which they can enhance the security of their data.
Use the encryption process to protect emails
Encryption is a very advanced technology which is used by many companies and
government authorities to secure their personal data files. It is observed that this
approach has decreased the issue of hacking or cyber-crime by 40% in the last two
years and much researcher investigation on this topic and they also provided this
approach to handle such issues. It protects inbox and emails of the consumer by
providing a private key which cannot be easily hacked by attacker [11]. It is very best
security step which protects the personal messages of consumers and it has the
potential to detect the unwanted signals from the computer system. Recent survey
observed that largest business companies are using this approach during data
transmission and communication by using Gmail accounts. Mainly, it converts the data
or information into a form of code and transfers to the receiver which needs a private
key to descript the message. If any person adopts this technology in their security
programmes then they can address the issue of cyber-attacks and they can protect the
private details of the consumer like account numbers, credit and debit card numbers
and financial documents.
Use of proton mail
It is a free open source process which is used to protect the personal data files of
consumers and it can work from any computer device with the help of a website. It
provide a platform to encrypt the message transferred from one person to another and
hacker send unauthentic servers on Gmail so, it helps to reduce such issues from the
computer device. The main advantage of this technology is that it does not recover the
emails account if consumer forgets their password. So, people can adopt such a process
to enhance the efficiency of their personal data or information and ensure that they use
only authentic networks during communication process [12].
7
Turn on 2 step verification process
It is a very common step which is used by many consumers to protect their personal
information and when any person enable this step, anyone attempting to log in to a
human personal account which will require a special code sent to their mobile number.
Generally, hacker’s uses a bypass process to hack the personal data or information if
people adopt this step by which they can enhance the security of their data.
Use the encryption process to protect emails
Encryption is a very advanced technology which is used by many companies and
government authorities to secure their personal data files. It is observed that this
approach has decreased the issue of hacking or cyber-crime by 40% in the last two
years and much researcher investigation on this topic and they also provided this
approach to handle such issues. It protects inbox and emails of the consumer by
providing a private key which cannot be easily hacked by attacker [11]. It is very best
security step which protects the personal messages of consumers and it has the
potential to detect the unwanted signals from the computer system. Recent survey
observed that largest business companies are using this approach during data
transmission and communication by using Gmail accounts. Mainly, it converts the data
or information into a form of code and transfers to the receiver which needs a private
key to descript the message. If any person adopts this technology in their security
programmes then they can address the issue of cyber-attacks and they can protect the
private details of the consumer like account numbers, credit and debit card numbers
and financial documents.
Use of proton mail
It is a free open source process which is used to protect the personal data files of
consumers and it can work from any computer device with the help of a website. It
provide a platform to encrypt the message transferred from one person to another and
hacker send unauthentic servers on Gmail so, it helps to reduce such issues from the
computer device. The main advantage of this technology is that it does not recover the
emails account if consumer forgets their password. So, people can adopt such a process
to enhance the efficiency of their personal data or information and ensure that they use
only authentic networks during communication process [12].
FOUNDATION OF CYBER-SECURITY
8
Cryptography technology
It is an advanced security technique to secure the communication process and computer
networks. It converts the data files into a format which is not readable without
permission of use and allows the security approach to their consumers. Information
technology developed this method for large business industries to protect data from
hackers and encrypt the personal information of their employees [13]. Mainly, it focuses
on the consumer Gmail accounts and provides a way to improve the security of their
accounts because hackers attack users Gmail and transfer spam emails that create
uncertainty in their communication system.
Keep networks and software up-to-date
It is observed that hackers attack the computer software of consumer and they use
malware software to hack their networks. If they update software on regular basis then
the issue of hacking can be addressed because attackers found the best way to enter
into their peripheral devices. Change the password of the computer system and use only
authentic servers when you update software and employees should ensure that they
turn on security programmes during the process of a software update.
Use a secure backup plan
It is a part of security policy that provides a way to save private details and addresses
the harmful signals from the computer. Cloud computing is one of the best examples of a
backup plan which is a more effective technique to improve the privacy of consumer
data files [14]. If any hacker encrypts your data then people can restore them from
backup plans but people should use a high-level password system on their backup plan.
Adopt some protection
In this modern generation, there are many companies that provide security tools and
programs like a firewall, spam filtering, virus protection, malware blocking, and
intrusion detection process. With the help of such technologies, individuals can enhance
the security of their Gmail accounts from criminals [15]. Spam filtering is a kind of
process that detects the spam and fraud emails from the computer because hackers
send fraud links on the Gmail account of the user. People can clear their spam emails on
regular basis and reduce the use of a third-party application that will help to address
the issue of data breaching.
8
Cryptography technology
It is an advanced security technique to secure the communication process and computer
networks. It converts the data files into a format which is not readable without
permission of use and allows the security approach to their consumers. Information
technology developed this method for large business industries to protect data from
hackers and encrypt the personal information of their employees [13]. Mainly, it focuses
on the consumer Gmail accounts and provides a way to improve the security of their
accounts because hackers attack users Gmail and transfer spam emails that create
uncertainty in their communication system.
Keep networks and software up-to-date
It is observed that hackers attack the computer software of consumer and they use
malware software to hack their networks. If they update software on regular basis then
the issue of hacking can be addressed because attackers found the best way to enter
into their peripheral devices. Change the password of the computer system and use only
authentic servers when you update software and employees should ensure that they
turn on security programmes during the process of a software update.
Use a secure backup plan
It is a part of security policy that provides a way to save private details and addresses
the harmful signals from the computer. Cloud computing is one of the best examples of a
backup plan which is a more effective technique to improve the privacy of consumer
data files [14]. If any hacker encrypts your data then people can restore them from
backup plans but people should use a high-level password system on their backup plan.
Adopt some protection
In this modern generation, there are many companies that provide security tools and
programs like a firewall, spam filtering, virus protection, malware blocking, and
intrusion detection process. With the help of such technologies, individuals can enhance
the security of their Gmail accounts from criminals [15]. Spam filtering is a kind of
process that detects the spam and fraud emails from the computer because hackers
send fraud links on the Gmail account of the user. People can clear their spam emails on
regular basis and reduce the use of a third-party application that will help to address
the issue of data breaching.
FOUNDATION OF CYBER-SECURITY
9
Revoke unauthorized applications
Whenever any user login to an application by using Google then it stores the personal
information of their Gmail account. That means hackers can access personal accounts of
customers from anyplace and they can easily enter into their peripheral devices like
mobile phones, computer system many more. Such kinds of problems occur due to use
of third-party application because they are developed by malware software to hack the
private details of the user. So, people ensure that they use only authentic application
and do not allow their Gmail account within any other application.
Enable HTTPS Security
Gmail is one of the best ways to communicate with others and it can be accessed from
any location or any place. People may log into unencrypted servers and networks by
which their privacy become exposed. To control and manage the privacy of data
between Gmail and browser people can adopt the HTTPS security because hacker
enters into the computer devices with the help of browsers [16]. When the browser of
the user is out of date this can increase the chance of hacking or data breaching so,
people can update their networks and control cyber-security threats by enabling HTTPS
security.
Therefore, with the help of all these techniques and approaches the security of Gmail
can be increased and the consumer should ensure that they enable the encryption
technique during the communication process. If they found any spam emails in their
accounts then use a robust technique which detects and delete fraud emails that can
enhance the security of consumer data or information.
9
Revoke unauthorized applications
Whenever any user login to an application by using Google then it stores the personal
information of their Gmail account. That means hackers can access personal accounts of
customers from anyplace and they can easily enter into their peripheral devices like
mobile phones, computer system many more. Such kinds of problems occur due to use
of third-party application because they are developed by malware software to hack the
private details of the user. So, people ensure that they use only authentic application
and do not allow their Gmail account within any other application.
Enable HTTPS Security
Gmail is one of the best ways to communicate with others and it can be accessed from
any location or any place. People may log into unencrypted servers and networks by
which their privacy become exposed. To control and manage the privacy of data
between Gmail and browser people can adopt the HTTPS security because hacker
enters into the computer devices with the help of browsers [16]. When the browser of
the user is out of date this can increase the chance of hacking or data breaching so,
people can update their networks and control cyber-security threats by enabling HTTPS
security.
Therefore, with the help of all these techniques and approaches the security of Gmail
can be increased and the consumer should ensure that they enable the encryption
technique during the communication process. If they found any spam emails in their
accounts then use a robust technique which detects and delete fraud emails that can
enhance the security of consumer data or information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
FOUNDATION OF CYBER-SECURITY
10
References
[1].A.A. Friedman and D.M., West, “Privacy and security in cloud computing.” Center
for Technology Innovation at Brookings, 2010.
[2].A.J. Blumberg and P., Eckersley “On locational privacy, and how to avoid losing it
forever.” Electronic frontier foundation, 10(11), 2009.
[3].F.Y., Leu, I., You, Y.L., Huang, K. Yim and C.R., Dai, “Improving security level of LTE
authentication and key agreement procedure.” In Globecom Workshops (GC
Wkshps), 2012 IEEE, 12(4), pp. 1032-1036, 2012.
[4].J. Zdziarski “Hacking and securing iOS applications: stealing data, hijacking
software, and how to prevent it. “ O'Reilly Media, Inc, 2012.
[5].J., Tang, “The implementation of Deming's system model to improve security
management: A case study.” International Journal of Management, 25(1), pp.54-
68, 2008.
[6]. K. Hwang and D., Li “Trusted cloud computing with secure resources and data
colouring.” IEEE Internet Computing, 14(5), pp.14-22, 2010.
[7].M. Hneif and S.P., Lee, “Using guidelines to improve quality in software
nonfunctional attributes.” IEEE Software, 28(6), pp.72-77, 2011.
[8]. M., Balduzzi, J., Zaddach, D., Balzarotti, E. Kirda and S., Loureiro, “A security
analysis of Amazon's elastic compute cloud service.” In Proceedings of the 27th
Annual ACM Symposium on Applied Computing, 10(1), pp. 1427-1434, 2012.
[9].M.S., Abolghasemi, M.M. Sefidab and R.E., Atani, “Using location-based encryption
to improve the security of data access in cloud computing.” In Advances in
Computing, Communications and Informatics (ICACCI), 2013 International
Conference on, 6(2), pp. 261-265, 2013.
[10]. M.U., Farooq, M., Waseem, A. Khairi and S., Mazhar, “A critical analysis of the
security concerns of the internet of things (IoT).” International Journal of
Computer Applications, 111(7), pp. 12-15, 2015.
[11].N. Teodoro and C., Serrao, “Web application security: Improving critical web-
based applications quality through in-depth security analysis.” In Information
Society (i-Society), 2011 International Conference on, 12(2), pp. 457-462, 2011.
10
References
[1].A.A. Friedman and D.M., West, “Privacy and security in cloud computing.” Center
for Technology Innovation at Brookings, 2010.
[2].A.J. Blumberg and P., Eckersley “On locational privacy, and how to avoid losing it
forever.” Electronic frontier foundation, 10(11), 2009.
[3].F.Y., Leu, I., You, Y.L., Huang, K. Yim and C.R., Dai, “Improving security level of LTE
authentication and key agreement procedure.” In Globecom Workshops (GC
Wkshps), 2012 IEEE, 12(4), pp. 1032-1036, 2012.
[4].J. Zdziarski “Hacking and securing iOS applications: stealing data, hijacking
software, and how to prevent it. “ O'Reilly Media, Inc, 2012.
[5].J., Tang, “The implementation of Deming's system model to improve security
management: A case study.” International Journal of Management, 25(1), pp.54-
68, 2008.
[6]. K. Hwang and D., Li “Trusted cloud computing with secure resources and data
colouring.” IEEE Internet Computing, 14(5), pp.14-22, 2010.
[7].M. Hneif and S.P., Lee, “Using guidelines to improve quality in software
nonfunctional attributes.” IEEE Software, 28(6), pp.72-77, 2011.
[8]. M., Balduzzi, J., Zaddach, D., Balzarotti, E. Kirda and S., Loureiro, “A security
analysis of Amazon's elastic compute cloud service.” In Proceedings of the 27th
Annual ACM Symposium on Applied Computing, 10(1), pp. 1427-1434, 2012.
[9].M.S., Abolghasemi, M.M. Sefidab and R.E., Atani, “Using location-based encryption
to improve the security of data access in cloud computing.” In Advances in
Computing, Communications and Informatics (ICACCI), 2013 International
Conference on, 6(2), pp. 261-265, 2013.
[10]. M.U., Farooq, M., Waseem, A. Khairi and S., Mazhar, “A critical analysis of the
security concerns of the internet of things (IoT).” International Journal of
Computer Applications, 111(7), pp. 12-15, 2015.
[11].N. Teodoro and C., Serrao, “Web application security: Improving critical web-
based applications quality through in-depth security analysis.” In Information
Society (i-Society), 2011 International Conference on, 12(2), pp. 457-462, 2011.
FOUNDATION OF CYBER-SECURITY
11
[12].P., Gilbert, B.G., Chun, L.P. Cox and J., “Vision: automated security validation of
mobile apps at app markets.” In Proceedings of the second international workshop
on Mobile cloud computing and services, 15(4), pp. 21-26, 2011.
[13].R., Bassily, E., Ekrem, X., He, E., Tekin, J., Xie, M.R., Bloch, S. Ulukus and, A., Yener,
“Cooperative security at the physical layer: A summary of recent advances.” IEEE
Signal Processing Magazine, 30(5), pp.16-28, 2013.
[14].S., Akbar, J.A., Chandulal, K.N. Rao and G.S., Kumar, “Improving network security
using machine learning techniques.” In Computational Intelligence & Computing
Research (ICCIC), 2012 IEEE International Conference on, 16(4), pp. 1-5, 2012.
[15].V. Chang and M., Ramachandran, “Towards achieving data security with the
cloud computing adoption framework.” IEEE Trans. Services Computing, 9(1),
pp.138-151, 2016.
[16].W., Yang, A., Xiong, J., Chen, R.W. Proctor and N., Li, “Use of phishing training to
improve security warning compliance: evidence from a field experiment.”
In Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp,
15(2), pp. 52-61, 2017.
11
[12].P., Gilbert, B.G., Chun, L.P. Cox and J., “Vision: automated security validation of
mobile apps at app markets.” In Proceedings of the second international workshop
on Mobile cloud computing and services, 15(4), pp. 21-26, 2011.
[13].R., Bassily, E., Ekrem, X., He, E., Tekin, J., Xie, M.R., Bloch, S. Ulukus and, A., Yener,
“Cooperative security at the physical layer: A summary of recent advances.” IEEE
Signal Processing Magazine, 30(5), pp.16-28, 2013.
[14].S., Akbar, J.A., Chandulal, K.N. Rao and G.S., Kumar, “Improving network security
using machine learning techniques.” In Computational Intelligence & Computing
Research (ICCIC), 2012 IEEE International Conference on, 16(4), pp. 1-5, 2012.
[15].V. Chang and M., Ramachandran, “Towards achieving data security with the
cloud computing adoption framework.” IEEE Trans. Services Computing, 9(1),
pp.138-151, 2016.
[16].W., Yang, A., Xiong, J., Chen, R.W. Proctor and N., Li, “Use of phishing training to
improve security warning compliance: evidence from a field experiment.”
In Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp,
15(2), pp. 52-61, 2017.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.