logo

Foundation of Cyber Security

6 Pages1679 Words89 Views
   

Added on  2023-04-21

About This Document

This report highlights the key factors that increase the problem of data breach and hacking in e-mails and security tools to improve the security of e-mails.

Foundation of Cyber Security

   Added on 2023-04-21

ShareRelated Documents
FOUNDATION OF CYBER SECURITY
0
Foundation of cyber security
Foundation of Cyber Security_1
FOUNDATION OF CYBER-SECURITY
1
Introduction
In the field of computer science, term cyber-security is defined as a process that
protects computer systems, hardware, software, and personal information from
hackers. Security of data is one of the critical and e-mail is very common communication
system which is used by attackers to enter into the consumer's servers. With the help of
encrypted e-mail, the information or data can be extracted and it is observed that more
than 50% of cyber-crimes occurred due to e-mail because it many consumers uses e-
mail services and hackers send fraud links to users. The aim of this report is to highlight
the key factors that increase the problem of data breach and hacking in e-mails and
security tools to improve the security of e-mails.
The current state of encrypted e-mail solutions
Yes, the information can be extracted from e-mail if the network traffic occurs in the
computer networks and it is the very common platform which is used by the criminals
to enter into the user's peripheral devices. A recent study evaluated that there are many
consumers which uses the third party applications and fraud links in their networks
which are developed by the attackers to hack their data. First hackers produce a large
amount of traffic signal with the help of malware and botnet process and transfer to the
consumer network which reduces the performance of their servers.1 Many hackers send
the unwanted links or message to the user by using e-mail and consumer click on that
mails which create uncertainty in the system and attackers collect their personal
information like login id and password. According to Lagazio Nazneen and Mike, the
lack of security is one of the common issues which increase the rate of cyber-crimes
because many users use only simple passwords that can be easily detected by the
attackers. in last five years, the rate of cyber-criminals and hacking has increased by
56% and many researchers provided their views on this issue and they analysed that
mainly, hackers enter into the computer system with the help of unauthentic servers
and they use e-mail for communication purpose.2 Therefore, the rate of cyber-crimes
1 Petri Puhakainen, and Siponen Mikko, ‘Improving employees' compliance through information
systems security training: an action research study’ (2010) 12 Mis Quarterly 757-778
2 Eirik Albrechtsen, and Hovden Jan, ‘Improving information security awareness and behaviour
through dialogue, participation and collective reflection. An intervention study.’ (2010) 29(4)
Computers & Security 432-445.
Foundation of Cyber Security_2
FOUNDATION OF CYBER-SECURITY
2
can be reduced if consumers use only authentic servers and networks and researcher
also discussed that e-mails can be secured by adopting the encryption technology.
Recently, information technology developed numerous security tools and technique to
mitigate such kind of issues and improve the security of e-mails which are described
below:
Use strong password
It is a very common step which can be used to control and manage the risk of cyber-
attacks because most consumers use only simple passwords which can be detected by
the attackers.3 First hackers identify the password of their e-mail accounts by using a
botnet process that occurs due to the simple password. If they use the combination of
alphabetic, numeric and special character during generation of password then they can
improve the security of their personal data. Lagazio Nazneen and Mike observed that
use of strong password can reduce the problem of the data breach by 24% and people
should login their personal accounts in only authentic servers.
Use a secure email service
Secure socket layer is one of the best services which can be adopted by the consumers
to reduce the issue of cyber-crimes from the computer system. Such kind of service
identifies the key factors and traffic signals from the networks and provides a message
on the computer screen. A recent survey identified that many business industries use
this step to control and monitor their security.
Encryption technology
In the last three years the use of encryption technology has increased by 56% due to
their many advantages such as more accurate, more efficient, reduce hacking and cyber-
crimes and improve the security of data.4 People and companies can adopt this
approach to handle the security related issues in their servers and name provided their
views on this topic and identified that encryption technique converts information or
data into a form of code which cannot be accessed by hackers. So, people can use this
technology to avoid the problem of malware, DOS attack and ransom ware attack.
3 Jemal Abawajy, ‘User preference of cyber security awareness delivery methods.’ (2014) 33(3)
Behaviour & Information Technology 237-248.
4 Monica Lagazio, Sherif Nazneen, and Cushman Mike. ‘A multi-level approach to understanding the
impact of cybercrime on the financial sector.’ (2014) 45 Computers & Security 58-74.
Foundation of Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329

Foundation of Cyber-Security: Information Security Policies and Encrypted E-mail Solutions
|12
|4083
|98

Communicating Security in the Internet of Things
|4
|663
|152

Ransomware & Malware
|5
|581
|276

Computer Security Breaches
|7
|2314
|447