COIT20249 - Cyber Security: Threats and Protection Report
VerifiedAdded on  2022/11/23
|13
|3131
|388
Report
AI Summary
This report examines the critical aspects of cyber security in the modern digital landscape. It begins with an introduction highlighting the increasing reliance on the internet for data storage and access, followed by a definition of cyber security and its importance. The report identifies key reasons why cyber security is paramount, including the sophistication of hackers, the growth of the Internet of Things (IoT), the proliferation of hacking tools, and the sharing of personal data online. It then delves into security vulnerabilities, such as employee negligence, compromised IoT devices, and unpatched security flaws. The report explores various security threats, including phishing, ransomware, social media hacking, disgruntled employees, and unsecured devices. Furthermore, it provides actionable strategies for protecting organizations, such as conducting security audits, educating employees, securing internal and external networks, monitoring system access, ensuring physical security, updating devices, and partnering with reliable service providers. The report concludes by emphasizing the need for constant vigilance and proactive measures to safeguard against evolving cyber threats.

Cyber security
Student’s Name:
Institution Affiliation:
Unit code:
Unit Name:
Assessment due date:
Email address:
Campus lecturer:
Unit coordiator:
Student’s Name:
Institution Affiliation:
Unit code:
Unit Name:
Assessment due date:
Email address:
Campus lecturer:
Unit coordiator:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Executive summary
To be aggressive, organizations should be on the web. Be that as it may, this likewise brings
dangers. Australia is progressively an objective for cybercrime and surveillance. We all—
legislatures, organizations and people—need to cooperate to fabricate versatility to digital security
dangers and to take advantage of chances on the web. For organizations to develop it needs to
enhance the current changes in the cyber security. Many changes have been brought to the
networking field. They will open up new conceivable outcomes for deft organizations in manners
up 'til now unheard of. In any case, the capability of computerized advancements relies upon the
degree to which we can confide in the Internet and the Internet. Getting digital security right will
mean we catch a greater amount of the open doors the associated world offers. It will likewise make
Australia a favored spot to work together. This thus will support our national flourishing. We can
likewise extend our digital security organizations and fare capacity.
To be aggressive, organizations should be on the web. Be that as it may, this likewise brings
dangers. Australia is progressively an objective for cybercrime and surveillance. We all—
legislatures, organizations and people—need to cooperate to fabricate versatility to digital security
dangers and to take advantage of chances on the web. For organizations to develop it needs to
enhance the current changes in the cyber security. Many changes have been brought to the
networking field. They will open up new conceivable outcomes for deft organizations in manners
up 'til now unheard of. In any case, the capability of computerized advancements relies upon the
degree to which we can confide in the Internet and the Internet. Getting digital security right will
mean we catch a greater amount of the open doors the associated world offers. It will likewise make
Australia a favored spot to work together. This thus will support our national flourishing. We can
likewise extend our digital security organizations and fare capacity.

Table contents
1. Introduction ………………………………………………………………………………. 2
2. Cyber security ……………………………………………………………………………. 2
3. Reasons why cyber security is important ………………………………………………… 3
4. Security vulnerabilities …………………………………………………………………… 4
5. Security threats ……………………………………………………………………………. 5
6. How to protect organization ……………………………………………………………… 6
7. Conclusion ………………………………………………………………………………… 8
8. Reference …………………………………………………………………………………. 9
Page 1
1. Introduction ………………………………………………………………………………. 2
2. Cyber security ……………………………………………………………………………. 2
3. Reasons why cyber security is important ………………………………………………… 3
4. Security vulnerabilities …………………………………………………………………… 4
5. Security threats ……………………………………………………………………………. 5
6. How to protect organization ……………………………………………………………… 6
7. Conclusion ………………………………………………………………………………… 8
8. Reference …………………………………………………………………………………. 9
Page 1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
A lot of information are stored in the cloud by most of the companies in the world. It is a result of
this sort of capacity individuals around the globe have a simpler time at getting to data than at any
other time. The time before the late twentieth century gathering data was long and repetitive to get a
book that the library did not possess would take in any event half a month relying upon the
timespan or it might not have been conceivable to acquire that book. However at this point
individuals can get to a huge measure of data in merely minutes. Model, in current occasions in the
event that somebody needed to think about an alternate culture they could basic look into the data
on a PC or any gadget that approached web. Individuals can likewise store touchy data in the
internet information, for example, funds, individual or instructive(Gupta, Agrawal, & Yamaguchi,
2016). Internet has all personal and money related informations. Attackers can access this
information within a short period of time(Graham, Olson, & Howard, 2016). A capacity like this is just
conceivable in the Internet and information that is increasingly delicate and basic to society,
governments and individuals are regularly put away there(Cherdantseva, Burnap, Blyth, Eden, Jones,
Soulsby, & Stoddart, 2016.
Cyber security
Cyber security comprises of the considerable number of innovations and practices that protect PC
system and electronic information. Also, in this present reality where increasingly more of our
business and public activities are on the web, it's a tremendous and developing field. Getting hacked
isn't only an immediate danger to the secret information organizations need.
Reasons why cyber security is important
1. Hackers are getting more astute
Page 2
A lot of information are stored in the cloud by most of the companies in the world. It is a result of
this sort of capacity individuals around the globe have a simpler time at getting to data than at any
other time. The time before the late twentieth century gathering data was long and repetitive to get a
book that the library did not possess would take in any event half a month relying upon the
timespan or it might not have been conceivable to acquire that book. However at this point
individuals can get to a huge measure of data in merely minutes. Model, in current occasions in the
event that somebody needed to think about an alternate culture they could basic look into the data
on a PC or any gadget that approached web. Individuals can likewise store touchy data in the
internet information, for example, funds, individual or instructive(Gupta, Agrawal, & Yamaguchi,
2016). Internet has all personal and money related informations. Attackers can access this
information within a short period of time(Graham, Olson, & Howard, 2016). A capacity like this is just
conceivable in the Internet and information that is increasingly delicate and basic to society,
governments and individuals are regularly put away there(Cherdantseva, Burnap, Blyth, Eden, Jones,
Soulsby, & Stoddart, 2016.
Cyber security
Cyber security comprises of the considerable number of innovations and practices that protect PC
system and electronic information. Also, in this present reality where increasingly more of our
business and public activities are on the web, it's a tremendous and developing field. Getting hacked
isn't only an immediate danger to the secret information organizations need.
Reasons why cyber security is important
1. Hackers are getting more astute
Page 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The ongoing spate of digital assaults and information releases mean digital culprits are continually
changing their strategies. Organizations should be aware of security threats in there systems.
2. The web of things is growing
There is an expanding number of keen contraptions associated with the digital world, and with that,
the web of things (IoT) is winding up ever bigger. Digital crooks have distinguished many assault
fronts by means of Bluetooth and Wi-Fi, so security for all these associated gadgets is significant.
3. Hacking apparatuses are expanding and advancing
Progressively perilous hacking devices keep on surfacing, making it pivotal to identify and counter
these new dangers on the ascent(Syed, Padia, Finin, Mathews, & Joshi, 2016, March).
4. Progressively close to home data is shared on the web
People use phones and tablets to access data from the web. Notwithstanding, once in a while we
share more data than expected online by means of applications that demand individual information,
and these sources become programmers' practical objectives. This puts everybody in danger(Ben-
Asher, & Gonzalez, 2015).
Security vulnerabilities
 Organization Employees
Employees are the greatest threat in organization’s security. For instance, representatives
may mishandle their entrance benefits for individual increase. Or on the other hand, a
representative may tap on the wrong connection in an email, download the wrong record
from and online
Page 3
changing their strategies. Organizations should be aware of security threats in there systems.
2. The web of things is growing
There is an expanding number of keen contraptions associated with the digital world, and with that,
the web of things (IoT) is winding up ever bigger. Digital crooks have distinguished many assault
fronts by means of Bluetooth and Wi-Fi, so security for all these associated gadgets is significant.
3. Hacking apparatuses are expanding and advancing
Progressively perilous hacking devices keep on surfacing, making it pivotal to identify and counter
these new dangers on the ascent(Syed, Padia, Finin, Mathews, & Joshi, 2016, March).
4. Progressively close to home data is shared on the web
People use phones and tablets to access data from the web. Notwithstanding, once in a while we
share more data than expected online by means of applications that demand individual information,
and these sources become programmers' practical objectives. This puts everybody in danger(Ben-
Asher, & Gonzalez, 2015).
Security vulnerabilities
 Organization Employees
Employees are the greatest threat in organization’s security. For instance, representatives
may mishandle their entrance benefits for individual increase. Or on the other hand, a
representative may tap on the wrong connection in an email, download the wrong record
from and online
Page 3

webpage, or give the wrong individual their client account accreditations—permitting assailants
simple access to your frameworks(Joinson, Steen, 2018).
 IoT Devices
The Internet of Things (IoT) includes many "shrewd" gadgets, for example, Wi-Fi fit coolers,
printers, fabricating robots, espresso producers, and endless different machines. The issue with
these gadgets is that they can be seized by assailants to shape slaved systems of traded off gadgets
to complete further assaults. Many organizations do not understand the number of IOT devices
available in the system. These obscure gadgets speak to a huge chance to assailants—and, a huge
hazard for organizations(Rodriguez, Schweikert, Thornton, Powell, Perez-Piris, E.Cuenco, & Mikurak,
2015).
 Unpatched Security Vulnerabilities
Most of the malware are programmed in such a manner that it exploits the old security
vulnerability. With such huge numbers of malwares hoping to abuse a similar couple of
vulnerabilities on numerous occasions, one of the greatest dangers that a business can take is
neglecting to fix those vulnerabilities once they're found. It's very basic for a business—or even
only the individual clients on a system—to expel the "update accessible" updates that spring up in
specific projects since they would prefer not to lose the 5-10 minutes of beneficial time that running
the update would take. Refreshing is an annoyance to generally clients(Buczak, Guven, 2015).
Nonetheless, it's an "aggravation" that could spare a business untold measures of time, cash, and
lost business later.
Security Threats
1. Phishing
Phishing utilizes misleading messages, telephone calls, instant messages and sites to fool
simple access to your frameworks(Joinson, Steen, 2018).
 IoT Devices
The Internet of Things (IoT) includes many "shrewd" gadgets, for example, Wi-Fi fit coolers,
printers, fabricating robots, espresso producers, and endless different machines. The issue with
these gadgets is that they can be seized by assailants to shape slaved systems of traded off gadgets
to complete further assaults. Many organizations do not understand the number of IOT devices
available in the system. These obscure gadgets speak to a huge chance to assailants—and, a huge
hazard for organizations(Rodriguez, Schweikert, Thornton, Powell, Perez-Piris, E.Cuenco, & Mikurak,
2015).
 Unpatched Security Vulnerabilities
Most of the malware are programmed in such a manner that it exploits the old security
vulnerability. With such huge numbers of malwares hoping to abuse a similar couple of
vulnerabilities on numerous occasions, one of the greatest dangers that a business can take is
neglecting to fix those vulnerabilities once they're found. It's very basic for a business—or even
only the individual clients on a system—to expel the "update accessible" updates that spring up in
specific projects since they would prefer not to lose the 5-10 minutes of beneficial time that running
the update would take. Refreshing is an annoyance to generally clients(Buczak, Guven, 2015).
Nonetheless, it's an "aggravation" that could spare a business untold measures of time, cash, and
lost business later.
Security Threats
1. Phishing
Phishing utilizes misleading messages, telephone calls, instant messages and sites to fool
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Page 4
beneficiaries into giving delicate data, for example, individual information, banking subtleties and
even passwords(Knowles, Prince, Hutchison, Disso, & Jones, 2015).
Phishing can represent a noteworthy security danger, not exclusively to the individual staff
individuals, however to the association itself. It can prompt huge information breaks, traded off
frameworks, and even budgetary misfortunes(Carr, 2016).
2. Ransomware
Ransomware assaults begin by contaminating an infection into an unprotected PC or system. This
infection would scramble information to make them difficult to reach to the client. At that point, the
programmers will request installment in return for the information. These assaults costs
organizations a huge number of dollars regularly in untraceable cryptographic money. Paying the
payoff, be that as it may, does not ensure the arrival of the information. As per an ongoing
information report, 48% of Australian organizations have been focused by ransomware assaults in
2017. Likewise, each assault had cost organizations a normal of AU$822,251(Kent, 2016).
3. Internet based hacking
Be that as it may, internet based life additionally opens the way to a monstrous security risk.
On the off chance that your social record is hacked, it can prompt various issues, from lost
adherents and clients to noteworthy harm to your notoriety and brand.
4. Disappointed employees
Troubled and irate workers can complete a ton of harm as they approach the organization's
information and system - particularly an IT representative who has regulatory access to remove
delicate data. They may likewise taint the system with an infection that can harm databases and PC
frameworks.
beneficiaries into giving delicate data, for example, individual information, banking subtleties and
even passwords(Knowles, Prince, Hutchison, Disso, & Jones, 2015).
Phishing can represent a noteworthy security danger, not exclusively to the individual staff
individuals, however to the association itself. It can prompt huge information breaks, traded off
frameworks, and even budgetary misfortunes(Carr, 2016).
2. Ransomware
Ransomware assaults begin by contaminating an infection into an unprotected PC or system. This
infection would scramble information to make them difficult to reach to the client. At that point, the
programmers will request installment in return for the information. These assaults costs
organizations a huge number of dollars regularly in untraceable cryptographic money. Paying the
payoff, be that as it may, does not ensure the arrival of the information. As per an ongoing
information report, 48% of Australian organizations have been focused by ransomware assaults in
2017. Likewise, each assault had cost organizations a normal of AU$822,251(Kent, 2016).
3. Internet based hacking
Be that as it may, internet based life additionally opens the way to a monstrous security risk.
On the off chance that your social record is hacked, it can prompt various issues, from lost
adherents and clients to noteworthy harm to your notoriety and brand.
4. Disappointed employees
Troubled and irate workers can complete a ton of harm as they approach the organization's
information and system - particularly an IT representative who has regulatory access to remove
delicate data. They may likewise taint the system with an infection that can harm databases and PC
frameworks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Page 5
5. Unbound printers and multifunction gadgets (MFDs)
Your associated printers can bring numerous business benefits, for example, streamlined work
processes, improved efficiency and even decreased expenses. Printers and gadgets should be
protected against unauthorized access since they carry important data. As indicated by the 2017
Ponemon Cost of Data Breach Study, an information break can cost a business overall AU$2.64
million. Thus, whenever left unconfigured and unbound, your printers and MFDs can represent a
major security hazard – causing money related misfortunes, brand harm, spillage of delicate
information, claims and even consistence issues(DiMase, Collier, Heffner, & Linkov, 2015).
How to protect organization
To appropriately manage the dangers referenced above, you would need to routinely survey your
safety efforts and systems, and modify procedures and arrangements. Here are a few hints on the
best way to secure your business:
1. Lead a review
We suggest beginning with a review of every one of your frameworks, machines, gadgets and
systems. This will enable you to distinguish vulnerabilities in your system and procedures, and start
making the fundamental upgrades(Baig, Szewczyk, Valli, Rabadia, Hannay, Chernyshev, Johnstone,
Kerai, Ibrahim, Sansurooah, & Syed, 2017).
2. Teach all representatives
Make a culture of security inside your association. Lead preparing courses and workshops to keep
your staff educated and instructed on the distinctive security dangers, the organization's security
approaches, and how to react and give an account of a security episode(Almeshekah, Spafford, 2016).
3. Secure your interior and outside system
Firewalls should be updated to the latest version. Also the softwares used by the system should be
5. Unbound printers and multifunction gadgets (MFDs)
Your associated printers can bring numerous business benefits, for example, streamlined work
processes, improved efficiency and even decreased expenses. Printers and gadgets should be
protected against unauthorized access since they carry important data. As indicated by the 2017
Ponemon Cost of Data Breach Study, an information break can cost a business overall AU$2.64
million. Thus, whenever left unconfigured and unbound, your printers and MFDs can represent a
major security hazard – causing money related misfortunes, brand harm, spillage of delicate
information, claims and even consistence issues(DiMase, Collier, Heffner, & Linkov, 2015).
How to protect organization
To appropriately manage the dangers referenced above, you would need to routinely survey your
safety efforts and systems, and modify procedures and arrangements. Here are a few hints on the
best way to secure your business:
1. Lead a review
We suggest beginning with a review of every one of your frameworks, machines, gadgets and
systems. This will enable you to distinguish vulnerabilities in your system and procedures, and start
making the fundamental upgrades(Baig, Szewczyk, Valli, Rabadia, Hannay, Chernyshev, Johnstone,
Kerai, Ibrahim, Sansurooah, & Syed, 2017).
2. Teach all representatives
Make a culture of security inside your association. Lead preparing courses and workshops to keep
your staff educated and instructed on the distinctive security dangers, the organization's security
approaches, and how to react and give an account of a security episode(Almeshekah, Spafford, 2016).
3. Secure your interior and outside system
Firewalls should be updated to the latest version. Also the softwares used by the system should be

Page 6
updated in a regular basis. Your field workers utilizing a virtual private system in the cloud ought
to
have solid username and secret key access to the organization's VPN(Liu, Sarabi, Zhang, Naghizadeh,
Karir, Bailey, & Liu, 2015).
4. Screen access to systems and information
Set up standard prompts on the system foundation guarding messages, versatile access, gadget get
to and different structures hacking endeavors or infection/malware pervasion. All individuals who
are not working in the organization should be screen properly before gaining access to the
organization. At the same time, individuals working in the organization should make sure that there
passwords are not exposed.
5. Fix physical security
The security of the physical resources, for example, servers and PC frameworks ought to be a top
need as physical burglary likewise enables hoodlums to get to delicate information.
6. Overhaul and update all printers, MFDs and other associated gadgets
Unbound and unconfigured printers and MFDs can open the ways to a potential information
rupture.
Set aside the effort to evaluate every one of your machines and gadgets, overhauling them routinely,
and refreshing them with the most recent programming and innovations(Do, Tran, Hong, Kamhoua,
Kwiat, Blasch, Ren, Pissinou, & Iyengar, 2017).
Additionally, address your MPS supplier so you can enact the suitable security highlights(Anwar,
He, Ash, Yuan, Li, & Xu, 2017).
7. Work with a dependable supplier
To help deal with every one of your printers and ensure your information and systems, consider
working with a dependable oversaw print administrations (MPS) supplier. Pick one with the correct
understanding and mastery, and can execute a modified answer for meet your particular needs.
updated in a regular basis. Your field workers utilizing a virtual private system in the cloud ought
to
have solid username and secret key access to the organization's VPN(Liu, Sarabi, Zhang, Naghizadeh,
Karir, Bailey, & Liu, 2015).
4. Screen access to systems and information
Set up standard prompts on the system foundation guarding messages, versatile access, gadget get
to and different structures hacking endeavors or infection/malware pervasion. All individuals who
are not working in the organization should be screen properly before gaining access to the
organization. At the same time, individuals working in the organization should make sure that there
passwords are not exposed.
5. Fix physical security
The security of the physical resources, for example, servers and PC frameworks ought to be a top
need as physical burglary likewise enables hoodlums to get to delicate information.
6. Overhaul and update all printers, MFDs and other associated gadgets
Unbound and unconfigured printers and MFDs can open the ways to a potential information
rupture.
Set aside the effort to evaluate every one of your machines and gadgets, overhauling them routinely,
and refreshing them with the most recent programming and innovations(Do, Tran, Hong, Kamhoua,
Kwiat, Blasch, Ren, Pissinou, & Iyengar, 2017).
Additionally, address your MPS supplier so you can enact the suitable security highlights(Anwar,
He, Ash, Yuan, Li, & Xu, 2017).
7. Work with a dependable supplier
To help deal with every one of your printers and ensure your information and systems, consider
working with a dependable oversaw print administrations (MPS) supplier. Pick one with the correct
understanding and mastery, and can execute a modified answer for meet your particular needs.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Page 7
Right now is an ideal opportunity to know, to be educated, and to arranged. You have to continually
survey your frameworks and systems, distinguish vulnerabilities, and actualize measures to shield
the business from potential security assaults(Abomhara, 2015).
Download our security direct and find how to improve the security of your business
information(Liu, Dong, Ota, Yang, Liu, 2018).
Conclusion
It was difficult to access data in the late twentieth century. However at this point individuals can get
to a huge measure of data in merely minutes. Model, in current occasions in the event that
somebody needed to think about an alternate culture they could basic look into the data on a PC or
any gadget that approached web. Individuals can likewise store touchy data in the internet
information, for example, funds, individual or instructive. The internet is fit for holding an entire
history of one individual's money related records and that individual can just access this whole
history with a couple of snaps and passwords. A capacity like this is just conceivable in the Internet
and information that is increasingly delicate and basic to society, governments and individuals are
regularly put away there.
Right now is an ideal opportunity to know, to be educated, and to arranged. You have to continually
survey your frameworks and systems, distinguish vulnerabilities, and actualize measures to shield
the business from potential security assaults(Abomhara, 2015).
Download our security direct and find how to improve the security of your business
information(Liu, Dong, Ota, Yang, Liu, 2018).
Conclusion
It was difficult to access data in the late twentieth century. However at this point individuals can get
to a huge measure of data in merely minutes. Model, in current occasions in the event that
somebody needed to think about an alternate culture they could basic look into the data on a PC or
any gadget that approached web. Individuals can likewise store touchy data in the internet
information, for example, funds, individual or instructive. The internet is fit for holding an entire
history of one individual's money related records and that individual can just access this whole
history with a couple of snaps and passwords. A capacity like this is just conceivable in the Internet
and information that is increasingly delicate and basic to society, governments and individuals are
regularly put away there.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Page 8
Reference
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for cyber security
intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of
cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic
solutions for computer and cyber security. IGI global.
Graham, J., Olson, R. and Howard, R., 2016. Cyber security essentials. Auerbach Publications.
Joinson, A. and Steen, T.V., 2018. Human aspects of cyber security: Behaviour or culture change?. Cyber
Security: A Peer-Reviewed Journal, 1(4), pp.351-360.
Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International Affairs, 92(1),
pp.43-62.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection. Computers
in Human Behavior, 48, pp.51-61.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security
management in industrial control systems. International journal of critical infrastructure protection, 9, pp.52-
80.
Rodriguez, R.J., Schweikert, W.R., Thornton, Y.M., Powell, W.S., Perez-Piris, E.R., Cuenco, J.S. and
Mikurak, M.G., Forcepoint Federal LLC, 2015. Science, technology, engineering and mathematics based
cyber security education system. U.S. Patent 9,159,246.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders and
attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Syed, Z., Padia, A., Finin, T., Mathews, L. and Joshi, A., 2016, March. UCO: A unified cybersecurity
ontology. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L. and Xu, L., 2017. Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, pp.437-443.
Kent, A.D., 2016. Cyber security data sources for dynamic network research. In Dynamic Networks and
Cyber-Security(pp. 37-65).
Reference
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for cyber security
intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of
cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic
solutions for computer and cyber security. IGI global.
Graham, J., Olson, R. and Howard, R., 2016. Cyber security essentials. Auerbach Publications.
Joinson, A. and Steen, T.V., 2018. Human aspects of cyber security: Behaviour or culture change?. Cyber
Security: A Peer-Reviewed Journal, 1(4), pp.351-360.
Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International Affairs, 92(1),
pp.43-62.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection. Computers
in Human Behavior, 48, pp.51-61.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security
management in industrial control systems. International journal of critical infrastructure protection, 9, pp.52-
80.
Rodriguez, R.J., Schweikert, W.R., Thornton, Y.M., Powell, W.S., Perez-Piris, E.R., Cuenco, J.S. and
Mikurak, M.G., Forcepoint Federal LLC, 2015. Science, technology, engineering and mathematics based
cyber security education system. U.S. Patent 9,159,246.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders and
attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Syed, Z., Padia, A., Finin, T., Mathews, L. and Joshi, A., 2016, March. UCO: A unified cybersecurity
ontology. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L. and Xu, L., 2017. Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, pp.437-443.
Kent, A.D., 2016. Cyber security data sources for dynamic network research. In Dynamic Networks and
Cyber-Security(pp. 37-65).

Page 9
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015. Cloudy with a chance
of breach: Forecasting cyber security incidents. In 24th {USENIX} Security Symposium ({USENIX} Security
15) (pp. 1009-1024).
Liu, X., Dong, M., Ota, K., Yang, L.T. and Liu, A., 2018. Trace malicious source to guarantee cyber security
for mass monitor critical infrastructure. Journal of Computer and System Sciences, 98, pp.1-26.
Do, C.T., Tran, N.H., Hong, C., Kamhoua, C.A., Kwiat, K.A., Blasch, E., Ren, S., Pissinou, N. and Iyengar,
S.S., 2017. Game theory for cyber security and privacy. ACM Computing Surveys (CSUR), 50(2), p.30.
DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I., 2015. Systems engineering framework for cyber physical
security and resilience. Environment Systems and Decisions, 35(2), pp.291-300.
Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber deception (pp. 23-50).
Springer, Cham.
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P.,
Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities: Cyber-security and
digital forensics. Digital Investigation, 22, pp.3-13.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015. Cloudy with a chance
of breach: Forecasting cyber security incidents. In 24th {USENIX} Security Symposium ({USENIX} Security
15) (pp. 1009-1024).
Liu, X., Dong, M., Ota, K., Yang, L.T. and Liu, A., 2018. Trace malicious source to guarantee cyber security
for mass monitor critical infrastructure. Journal of Computer and System Sciences, 98, pp.1-26.
Do, C.T., Tran, N.H., Hong, C., Kamhoua, C.A., Kwiat, K.A., Blasch, E., Ren, S., Pissinou, N. and Iyengar,
S.S., 2017. Game theory for cyber security and privacy. ACM Computing Surveys (CSUR), 50(2), p.30.
DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I., 2015. Systems engineering framework for cyber physical
security and resilience. Environment Systems and Decisions, 35(2), pp.291-300.
Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber deception (pp. 23-50).
Springer, Cham.
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P.,
Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities: Cyber-security and
digital forensics. Digital Investigation, 22, pp.3-13.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




