Cyber Security Issues in Modern Times: A Comprehensive Report

Verified

Added on  2023/01/10

|9
|2348
|25
Report
AI Summary
This report delves into the multifaceted realm of cyber security, examining its evolution from information security and its crucial role in protecting personal data within the boundless cyber space. It explores the threats posed by human actions and technological advancements, highlighting the efficiency of technology while acknowledging the associated risks. The report analyzes several research papers, including those focusing on cyber security in smart grids, the challenges in manufacturing systems, and the application of autoencoders for cyber security. It also discusses the enhancement of cyber security through cryptography, the multidimensional nature of cyber security, and the importance of public-private partnerships and security awareness to combat phishing. The report draws on various sources, including academic articles and research papers, to provide a comprehensive overview of the current issues and future directions in cyber security.
Document Page
Running head: CYBER SECURITY ISSUES IN MODERN TIMES
Cyber Security Issues in Modern Times
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY ISSUES IN MODERN TIMES
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
The term cyber security is related to the term information security in this paper. The
paper tries to argue that both the concepts are different though they sound similar and are
often confused for being similar. It is argued in this paper that there are no boundaries in the
cyber space. They include the protection of personal information of the person using the
technology. The paper tries to portray that the people are the one who pose threat to the
security of the humans and often participate in the malpractices that can potentially cause
harm.
The strength of the paper lies in the fact that it highlights the efficiency and the use of
the technology in the human lives. It also shows that individuals are more inclined towards
the use new technological advancements. The weakness of the paper is in the fact that
thought it highlights how the internet is helpful but it fails to show the major threats that
occur due to the increased use.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer networks, 57(5), 1344-1371.
This article focuses on the use of cyber security in the Smart Grid that is referred
power system associated with the next generation. It includes the collection of the advanced
computing technologies that also include communication. The Smart Grid aims to enhance
the communication and the technological process that connects the whole world. Cyber
security is a main concern as it includes the involvement of connections via numerous
internet devices. It includes the interconnection of different communication networks. This
paper mainly focuses on the issues that are faced by the smart grid in inclusion of the cyber
security.
Document Page
2CYBER SECURITY ISSUES IN MODERN TIMES
The strength of the paper is in the aspects that it highlights the efficiency of the smart
grid services in the technological sphere and how it has helped in the growth of
communication. The weakness is reflected that the seriousness of the threats faced in cyber
security and the adverse effects it poses on the personal life of the individuals.
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions
on Smart Grid, 4(2), 847-855.
The development of the new technologies has increased the communication process
and to exert control over the functions of the systems. This paper aims to show that how
smart grid has increased the security practices in the technological world. The research
applications involved in the smart grid has strengthened the physical components of the
system. It has provided accurate security in the cyber environment. In this paper the different
new advancements are highlighted for developing the security services.
The strength of the articled lies in the ability to highlight the new technological
advancements in the cyber world. The developments have strengthened the technologies
whereas the weakness is that it fails to identify the threats that are experienced in the
technological world with these developments.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
The technological advancements have made the sphere of technological world prone
to cyber-attacks. In this article the challenges are highlighted that are faced in the system of
manufacturing new products and to maintain their security. To maintain the security and the
originality of the manufactured products is becoming a challenge for the companies. The
Document Page
3CYBER SECURITY ISSUES IN MODERN TIMES
vulnerable position in which the companies are placed due to the technological revolution is
highlighted in the article.
The strength of the article is that it shows that technological revolutions have posed
threats to the security of the manufactured products. The weakness reflects that it fails to
show that the technology is not only a cause of destruction but it can also help to maintain
secrecy of the products. With the proper use of technology companies can secure their
information and that can reduce the possible threats faced by them.
Yousefi-Azar, M., Varadharajan, V., Hamey, L., & Tupakula, U. (2017, May).
Autoencoder-based feature learning for cyber security applications. In 2017
International joint conference on neural networks (IJCNN) (pp. 3854-3861). IEEE.
The paper focuses on the new learning methods that are used in the sphere of cyber
security. In this article it is proposed that the Auto-encoders are helpful in the creation of
generative models that represent different features of the cyber security. It is associated with
the use of two models of detection that are identified in the practices that highlight the
detection of intrusive forces and malpractices that are experienced in cyber space. It is
highlighted in the article how the use of auto-encoders are helpful in the maintaining and
detecting the unethical practices in the cyber space.
The strength of the article is that it highlights the use of cyber security and auto-
encoders as constructive measures. The weakness is that it fails to show that the humans
involved in the development process can act as threat to the process and sometimes Cause
major harm to the companies.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY ISSUES IN MODERN TIMES
Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked
control systems using homomorphic encryption. In 2015 54th IEEE Conference on
Decision and Control (CDC) (pp. 6836-6843). IEEE.
This report deals with the ways by which any cyber security system can be enhanced.
The paper introduces the concept of controller encryption which upgrades the already in
place cyber security network. One of the prime issues in control engineering is that the
network control system that is applied to the industrial infrastructures such as the network of
water supply and network of electricity. The authors of this report focus on the idea of
cryptography which prevents the malicious use of a secured network.
The strength of this research lies in the fact that the authors discuss in detail the idea
of cryptography as a method for cyber security. Cryptography is a method which prevents
any third party users to log into the system and use their data
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining
cybersecurity. Technology Innovation Management Review, 4(10).
In this report the authors deal with the concept of cyber security. Cyber security is a
multidimensional idea. The authors have taken a pragmatic qualitative research to try to
define the multidimensional idea of cyber security. After a thorough literature review the
authors have identified five themes that can be aligned with cyber security. First one is
technological solutions, second is events, third is strategies, process and methods, fourth is
human engagement and fifth is referent objects.
The strength of this article lies in the attempt of the author to deal with only the
definition of cyber security. The authors have successfully identified the multidimensional
nature of the concept, it cannot be restricted to the technological aspect, and there are other
Document Page
5CYBER SECURITY ISSUES IN MODERN TIMES
connotations of the term. The authors have identified a socio-technical aspect of cyber
security.
Carr, M. (2016). Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), 43-62.
This research focuses on the idea of cyber security posing as a major challenge to the
policy makers and he scholars of international relations. The authors’ claim that the fact that
cyber security poses as a major threat to the safety and security of the nation is something
that the politicians were aware of from a very long period of time. However, the government
has only started to develop new laws of cyber security now.
The strength of this article is the fact that the authors deal with importance of law
making in the field of cyber security. There has to be proper laws and encryption to protect
the cyber security networks of the company. If a private system is hacked the whole data ad
secured information of the company might get into the wrong hands and compromise the
security of the company.
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A
phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
The authors in this article deal with the concept of ‘phishing’ which is a type of online
identity threat. The authors talk about the ways to prevent ‘phishing’, one of the ways to do it
is using the method of cyber security. This research was done by collecting 1+61 data from
an online survey and the findings of the study revealed that the effect of interaction about the
conceptual and procedural knowledge has a positive effect of the behavior of the people.
Hence, the authors argue that proper training in the field of cybercrime and security will help
the user in dealing with threat of ‘phishing’.
Document Page
6CYBER SECURITY ISSUES IN MODERN TIMES
The strength of this article lies in the fact that the author talks about a specific concept
of cyber threat which ‘phishing’. The article is also more authentic because the data I
collected from 161 users which means that the data collected is authentic and the results from
it are trustworthy.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.
This article talks about the nations that published their National Cyber Security
Strategy (NCSS). All of the documents published talk about the common threat of cyber
security. The research paper compare the different NCSS of Australia, Canada, Czech
Republic, Estonia, France, Germany, India, Japan, Lithuania, Luxemburg, Romania,
Netherlands, New Zealand, South Africa, Spain, Uganda, U.K. and the USA. The comparison
highlights the fact that all these statements have certain weakness and strength. The authors
have given few suggestions as to how to combat the threat of cyber security.
The strength of this paper lies in the fact that the authors have compared the security
details of few of the nations and suggested a solution. The fact that it compares the NCSS of
a large number of nations means that the data collected are authentic and the results that have
been derived from them can be applied to the national security of other regions as well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY ISSUES IN MODERN TIMES
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing
threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
Carr, M. (2016). Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), 43-62.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology
Innovation Management Review, 4(10).
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions
on Smart Grid, 4(2), 847-855.
Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked
control systems using homomorphic encryption. In 2015 54th IEEE Conference on
Decision and Control (CDC) (pp. 6836-6843). IEEE.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer networks, 57(5), 1344-1371.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Document Page
8CYBER SECURITY ISSUES IN MODERN TIMES
Yousefi-Azar, M., Varadharajan, V., Hamey, L., & Tupakula, U. (2017, May). Autoencoder-
based feature learning for cyber security applications. In 2017 International joint
conference on neural networks (IJCNN) (pp. 3854-3861). IEEE.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]