Cyber Security Research Report: Emerging Technologies and Challenges

Verified

Added on  2020/03/13

|19
|3876
|330
Report
AI Summary
This research report delves into the multifaceted realm of cyber security, examining its crucial role in safeguarding data and infrastructure in an increasingly interconnected world. It begins by defining cyber security and its importance, then explores the evolving landscape of cyber threats, including malicious activities, network attacks, and system misuse. The report investigates the impact of cyber threats on cloud computing and the strategies for cyber security, discussing the challenges organizations face in securing their environments and managing cyber security programs. The report also covers the principles of cyber security, the importance of intrusion detection systems, and the need for strong governance and management practices to mitigate risks. This research provides a comprehensive overview of the current state of cyber security, its challenges, and the measures needed to ensure data protection and system integrity.
Document Page
Running Header: Cyber Security 1
Research on Cyber Security
Submitted by
Course
Professor
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 2
Abstract
Cyber security is the process of ensuring data and data frameworks like networking, systems,
database and other applications. Some of the security devices like firewalls, installation of
antivirus in the system or any other device are used to protect the organization’s data in order to
secure the data. As our country quickly assembling its Cyber-Infrastructure, it is necessary to
train the individual regarding cyber security processes. People needs to be trained regarding
Cyber Ethics, cyber-crimes, cyber security that is required in modern world. Various security
measures help to guarantee the classification, accessibility, and integrity of data frameworks by
keeping or moderating resource loss from Cyber security attack. Cyber security has been risen as
a networking system or infrastructures having attention on the protection of important data that is
kept on the system from various adversaries who hack the required information. This paper will
focus on digital security and developing patterns while receiving new innovative advancements
like versatile registering, distributed computing, web based business, as well as social
networking. The paper additionally depicts the challenges because of absence of coordination
between Security as well as the Critical IT Infrastructure. (Tonge, A., & Kasture, S., S., 2013).
Document Page
Cyber Security 3
Introduction
The exploration of cybersecurity provides numerous opportunities for propels in view of
a multidisciplinary methodology. Organization must protect their systems from the cyber-attack
which is a huge threat to their data. Hence, we can say that Cybersecurity is the association and
group of assets, procedures, and structures used to secure the business and the internet
empowered frameworks from any type of occurrence (Craigen, D. & Thibault, N., 2014).
In quick innovative advancements, it has provided various areas of new opportunities and
potential methods of effectiveness which is associated of various shapes, these new techniques
have carried threat with them. The cyber security is also known as the process that is used to
protect the network, computers and all the data in the internet. Digital security will just turn out
to be more vital as more systems are associated with the help of internet.
The cyber security is the technique of applying efforts to establish safety to guarantee its privacy,
its respectability, and its accessibility of data. The cyber security tries to ensure the confirmation
of favorable conditions, which can join data, systems, its servers, structure of network, etc. The
main purpose of cybersecurity is to ensure data of the business database. The countermeasures
should also be assembles for the security of main information. It mainly spotlights on securing
the systems, networking, projects and the data which is unauthorized to get the opportunity to
change. This research paper will focus on cyber security and other emerging technologies that
are used to save the data. This paper will also focus on challenges that are faced while securing
the data (IT Governance Trademark, 2017).
Document Page
Cyber Security 4
Project Objective
The objective of cyber security of research project provides help with securing hardware and
important data of the business by clarifying critical ideas, cost contemplations, as well as
interrelationships of security controls. It outlines the advantages of security controls, the major
methods or methodologies for each control, and imperative related contemplations. This project
gives a broad concept of cyber security to enable the users to comprehend their system security
requirement and also helps to build up a strong methodology to deal with the better security
controls. (Guttman, B. & Roback, B., G., 1995).
Project Scope
The research on cyber security focuses on cyber-crimes, challenges that are faced during
securing information and various methods that can be implemented for securing the data from
database. (Kumar, A. & Ahuja, C., 2014).
Literature Review
Cyber Threats
Cyber threat can be defined as the sign, situation, or happening with the potential that can
damage the entire infrastructure of the organization as well as the resources that rely upon this
foundation (Nojeim, G., T., 2010). These cyber threats are very challenging and risky for open
security of the online group and this is because of its unexpected behavior globally. By covering
vindictive utilization of data innovation isn’t troublesome; this implies risk analysis can work
with better exclusion from anyplace. The perspective of cyber threat to various organizations is
shown in figure 1 (Stanwick, P., A. & Stanwick, S., D., 2014).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 5
These days not even a week goes without hearing about virus infection like Hacking endeavor or
'Phishing trick'. Therefore, different users, even those individuals who have installed security
system like Firewalls, anti-virus and filtering software could be in danger to security dangers.
Customarily these dangers are distinguished into vindictive, network attacks or system misuse.
The malicious activities incorporate PC infections, spyware, Trojan horses, key loggers or
BOTS. System assaults incorporate network hijacking, denial of service (DOS), and spoofing as
well as web destruction. Network misuse incorporate SPAM, phishing, and pharming activities.
In light of the research of the recognized Vulnerabilities of the risks the research examined the
noxious procedures and innovation that kept on developing. This developing concern is presently
a challenge to Cyber security specialists. Securing against these attacks will be the challenge for
the business. (Babate, A., I. & Musa, M., A., 2015).
There was huge loss of pounds in Banks. In all the countries’ internet was made down. It is
assessed that worldwide loss will surpass $2 trillion every year by 2019. In the UK loss was
more than £700 per individual. One hack in the UK had lost more than £100m in February 2016.
Therefore, the UK government has reported a £1.9bn national digital program and commanded
that every one of its providers have digital fundamentals endorsements before granting new
contracts (CPD Article, 2017).
Importance of Cyber Security
The cyber infected systems have a method for contaminating other systems and can make
everybody helpless. Therefore, digital cleaning is about securing data around us in order to stop
the infection of other systems. Eg: Bots or zombie systems that are cyber threats. Hackers look
for an opportunity for infecting and contaminating the systems as well as register with a zombie
force that taints various machines, and enhance the ability to get a large number of users.
Document Page
Cyber Security 6
It is quite possible to hack the infected network. Digital security must be mutual duty. Web
organizations and physical vendors can do their part by ensuring the security of their systems and
banking and payment frameworks. Government can teach the pubic and implement hostile to
digital criminal laws. Organizations can ensure that they have solid security forms set up that
includes ensuring their workers utilize strong passwords and everybody can assume an essential
part by securing the devices as well as being certain that our passwords must be unique and
strong to be guessed. Cyber security prediction for 2016 is shown in graph 2 (Magid, L., 2014).
Cyber Security Principles
Cybersecurity endeavors are best when utilizing and expanding upon these existing activities,
ventures, and the organizations. By having partnership with government the IT industry has
given authority, assets, advancement, as well as stewardship in each part of cybersecurity for
over 10 years.
IT is a creative and dynamic division with changing and advancing new innovations.
Cybersecurity endeavors must be similarly unique and adaptable to viably use new
advancements and plans of action and address new, regularly evolving risks.
Security should not be the ending stage. It must be a method to accomplish and guarantee new
technology with confide in different advancements that involve the digital framework.
Cybersecurity endeavors must encourage an association's capacity to appropriately access,
survey, and find a way to oversee continuous dangers in this condition (Information technology
industry council, 2011).
The organization must have knowledge and have correct approach to Cybersecurity as the
Enterprise Risk Management Issue.
Document Page
Cyber Security 7
If a refined attacker focuses on an organization's frameworks, will breach them. It goes ahead to
refer to the test of distinguishing the presence of assailants in an association's frameworks and
systems.
The association must have better access to Cybersecurity Expertise and provide Cyber Risk
Management on Board Meeting Agendas (Veltsos, C., 2017).
Cyber Threats on Cloud Computing
In today's more innovative world, cloud computing has been emerged as most popular to save
large amount of data. Being a new concept in providing the services to the business, numerous
organizations now depend on cloud administrations to work. Cloud computing makes security
very easy for the organizations in order to outsource the data for being on clouds, hence security
is measured by the vendors. Therefore, clouds have made as the primary target for the hackers to
hack the useful data of the organization. In order to secure cloud data, there is a requirement of
encryption as well as sovereignty of access to the servers of the service providers. The web may
have no outskirts, however information itself still exists in customary true limits and thus might
be bound by the laws of a foreign ministry. Because of the development in cloud administrations,
there has been a blast in the utilization of virtual machines for business, making these prime
targets for cybercrime (James, C., 2016).
Strategy for Cyber Security
Digital security should be driven from the best quality. Financial as well as national security
objectives imply that digital security is a vital issue for pioneers, senior administrators and the
board members—not only for IT and security staff. Government as well as business pioneers
may do more to increase digital security's quality in their associations, groups and companion
group. For incorporating cyber security as a need for corporate as well as global pioneers will
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 8
show that digital security is a key requirement for Australia. Measurable information on the
national effect of digital security bargains will empower Australian organizations and federal
governments to settle on the informed choices while overseeing cyber risks. (Commonwealth of
Australia, 2016).
Cyber Security Challenges
The main challenges that an organization face in order to protect assets and information
are as following:
1. Securing the Environment: The risk of information hacking as well as resistance penalty are
able to make it crucial that organizations that have the solution to save their organized peripheral
devices. The most ideal approach to save a network from the dangers is to just interface
guaranteed gadgets where larger amounts of security are required, and to appropriately screen
and maintenance of these machines as important.
2. Who Else is Watching Your Network?: Numerous associations don't understand the risk
postured by trusted representatives who are putting aside the organization's advantage for their
own interest. (Drab, D., F., 2011).
Cyber Security Management Program in an Organization
Many association's cybersecurity groups proceed to struggle to impart cybersecurity issues to
senior authority. Similarly, senior administration adequately express cybersecurity procedure to
specialized cybersecurity staff. Inability to impart issues is regularly uncovered in cybersecurity
activities that have developed into corporate cybersecurity programs. Normally, this came about
from an undertaking in startup mode actualizing arrangements to address particular specialized
challenges. The numerous associations keep on employing a comparable approach to secure
Document Page
Cyber Security 9
significantly bigger and more perplexing conditions against dangers that doesn't match the
abilities of their unique solution.
Hence, the cybersecurity management has turned into a business function in the present business.
As a business work, a more noteworthy level of joining with different specialty units requires a
more noteworthy level of clear as well as performance revealing. The accompanying key success
factors are basic to numerous effective cybersecurity programs. The projects must
Support and drive strong administration dispositions and activities.
These programs must be composed, created, and actualized in a comparative approach to
different business abilities.
Program must adopt a standard structure approach, usable for an expanded time of numerous
years with next to zero changes to that structure
These programs are quantifiable regarding their adequacy
The associations and officials that drive successful cybersecurity programs must perform in a
similar way as other business activities. (Cisco, 2017).
Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is an extra assurance tool that enables to detect any type of
intrusion in the network. IDS frameworks can be a software tool or hardware device which is
used to recognize any type of attack. Few IDS frameworks simply screen and alert for the attack
and these tools attempt to obstruct the cyber-attack. (Devi, P., A. & Laskhmi, S., R., 2013).
IDPSs are mainly centered on recognizing any occurrences. Eg: an IDPS find when the hacker
has effectively hacked the system or network. The IDPS would log data on the action and report
Document Page
Cyber Security 10
the occurrence to security executives with the goal that they could start occurrence reaction
activities in order to minimize the loss.
Numerous IDPSs are designed to perceive infringement of satisfactory strategies and other
security methodology that incorporate the utilization of denied distributed file sharing
applications as well as transferring vast database documents onto removable media or cell
phones. Moreover, numerous IDPSs can distinguish surveillance action, which may represent
that an assault is inescapable. Another utilization of IDPSs is to pick up a better understanding of
the risks that they recognize, especially the recurrence and attributes of assaults, hence the safety
efforts could be recognized. Some IDPSs are additionally ready to change their security profile
when any other risk is identified. Its methodology is shown in figure3. (Scarfone, K. & Mell, P.,
2007).
Firewall
A firewall is a device that analyzes all the activity between the two networks and also monitors
that they meet all the prettified model and protocols. A firewall is directed approach between that
systems if they take after the prettified model otherwise they don't take after the model then it
stops working. A firewall helps not just in constraining the unauthorized or malicious entry to the
network traffic and also helps in incoming risks. (Chopra, A., 2016). The performance of firewall
impacts the network security and firewall performance that relies on the limit of firewall. When
firewall limit is high, it will give high execution. (Tharaka, S., C. & Silva, R., L., C., 2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 11
Cyber Security Auditing
The auditing of cyber security within an organization can be performed, yet it is practically
difficult to successfully do the auditing. By sending an unmistakable Request For Proposal (RFP)
to potential auditors will advance the procedure rapidly. Scope of the auditing is as following:
An autonomous external output as well as vulnerability evaluation toward the start of the
process.
External scanning as well as vulnerability appraisal after remediation
Stock of Devices – both approved as well as unapproved devices. Associations have various
servers, switches, routers, remote devices, modems, firewalls and different tools that can be used
by programmers. It needs to be updated all the network devices. To begin with we have to
recognize what you have and what needs to be updated to guarantee best practices for the future.
Stock of Software – both approved and unapproved. Programming concerns are like that of
hardware devices.
Check for secure solution of tablets, workstations, and cell phones.
Internal security programming assessment– we have obtained against infection, hostile to
malware, and other programming for the protection. Is it true that they are working accurately?
Evaluation if our present information reinforcement and recuperation arrangements enable us to
recoup from a breech.
Evaluation regulatory privilege controls. (Brown, T., 2017).
Conclusion
Cybersecurity ought to be dealt with external as well as internal perspective. This is the issue
regarding business and business pioneers that they must own it. Regardless, cyber-crime is
Document Page
Cyber Security 12
another sensation and most business pioneers have not grown-up with it. To remain before the
growing complex quality and pace of digital attack, care among agents is an irrefutable necessity,
which is similar as the consolidation of cybersecurity into general peril organization as well as
continued with direction for all board people. Managing digital attack is a bewildering matter. As
the information security scene propels, a development of focus from confirmation and
consistence is segregating. Depending solely on obstruction won't stop enemy to overcome to
characterized information. Public as well as private organizations must be educated of what
threats they defy so at whatever point they can assess the environment. The understanding that
the attack gives is at the core of the best in class time of information security. In some broad
manner, complex overall organizations, moving from a receptive to proactive working mode
obliges transformative change. (Podhorec, M., 2012).
Document Page
Cyber Security 13
References
Australia's cyber security strategy - Enabling innovation, growth & prosperity. Commonwealth
of Australia (2016). Australian Government. Retrieved from -
https://cybersecuritystrategy.pmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf
Babate, A., I. & Musa, M., A. (2015). State of Cyber Security: Emerging Threats Landscape.
International Journal of Advanced Research in Computer Science & Technology (IJARCST
2015) 114 Vol. 3, Issue 1 (Jan. - Mar. 2015). Retrieved from -
http://www.ijarcst.com/doc/vol3issue1/ver2/alhaji.pdf
Brown, T. (2017). The Importance Of Cyber Security Within Your Organization.
http://www.enterprisecontinuity.com/index.php?
option=com_content&view=article&id=1717:the-importance-of-cyber-security-within-your-
organization&catid=6:information-technology
Chopra, A. (2016). Security Issues of Firewall. International Journal of P2P Network Trends and
Technology (IJPTT) – Volume 22 Number 1 January 2016. Retrieved from -
http://www.ijpttjournal.org/2016/volume-22/IJPTT-V22P402.pdf
Craigen, D. & Thibault, N., D. (2014). Defining Cybersecurity. Technology Innovation Management
Review. Retrieved from -
https://timreview.ca/sites/default/files/article_PDF/Craigen_et_al_TIMReview_October2014.pdf
Cybersecurity Management Program. Cisco (2017).
https://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-management-
programs.pdf
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 14
Devi, P., A. & Laskhmi, S., R. (2013). A Study on Network Security Aspects and Attacking Methods.
International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013. Retrieved
from - http://www.ijpttjournal.org/volume-3/issue-2/IJPTT-V3I2P406.pdf.
Drab, D., F. (2011). Network Peripherals: A Weak Link in Security and an Open Gateway for Attackers.
Auerbach Publications. Retrieved from -
http://www.infosectoday.com/Articles/networkedperipherals.htm
Guttman, B. & Roback, B., G. (1995). An Introduction to Computer Security: The NIST Handbook. U.S
Department of commerce. Retrieved from -
http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf.
The key cybersecurity principles. CPD Article (25th May 2017). Retrieved from -
http://www.accaglobal.com/sg/en/member/discover/cpd-articles/audit-assurance/the-key-
cybersecurity-principles.html.
James, C. (2016). Cybersecurity Threats Challenges Opportunities. The Australian Computer Society.
Retrieved from -
https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf
Kumar, A. & Ahuja, C. (2014). Cyber Security Research Developments - Global and Indian Context.
Data security council of India. Retrieved from - https://beta.dsci.in/sites/default/files/Cyber-
Security-Research-Developments.pdf.
Magid, L. (2014). Why Cyber Security Matters To Everyone? Retrieved from -
https://www.forbes.com/sites/larrymagid/2014/10/01/why-cyber-security-matters-to-everyone/
#3e2347cc5a71
Document Page
Cyber Security 15
Nojeim, G., T. (2010). Cybersecurity and Freedom on the Internet. Journal of national security law &
policy Vol. 4:119. Retrieved from - http://jnslp.com/wp-content/uploads/2010/08/09_Nojeim.pdf
Podhorec, M. (2012). Cyber security within the globalization process. Journal of defense resources
management. Vol. 3 Issue 1 (4)/ 2012. Retrieved from -
http://journal.dresmara.ro/issues/volume3_issue1/02_podhorec.pdf
Scarfone, K. & Mell, P. (2007). Special Publication 800-94: Guide to Intrusion Detection and
Prevention Systems (IDPS). National Institute of Standards and Technology (NIST). Retrieved
from - http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=901146
Stanwick, P., A. & Stanwick, S., D. (2014). A Security Breach at Target: A Different Type of BullsEye.
International Journal of Business and Social Science Vol. 5, No. 12; November 2014. Retrieved
from - http://ijbssnet.com/journals/vol_5_no_12_november_2014/6.pdf
Tharaka, S., C. & Silva, R., L., C. (2016). High Security Firewall: Prevent Unauthorized Access Using
Firewall Technologies. International Journal of Scientific and Research Publications, Volume 6,
Issue 4, April 2016. Retrieved from - http://www.ijsrp.org/research-paper-0416/ijsrp-p5278.pdf
The IT Industry’s Cybersecurity Principles for Industry and Government. Information technology
industry council. Information technology industry council (2011). Retrieved from -
http://www.itic.org/dotAsset/191e377f-b458-4e3d-aced-e856a9b3aebe.pdf
Tonge, A., M. & Kasture, S., S. (2013). Cyber security: challenges for society- literature review. IOSR
Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume
12, Issue 2 (May. - Jun. 2013), PP 67-75. Retrieved from -
http://www.iosrjournals.org/iosr-jce/papers/Vol12-issue2/K01226775.pdf?id=15
Document Page
Cyber Security 16
Veltsos, C. (2017). NACD Publishes Five Cybersecurity Principles Every Board Director Needs to
Know. Retrieved from - https://securityintelligence.com/nacd-publishes-five-cybersecurity-
principles-every-board-director-needs-to-know/
What is cyber security? IT Governance Trademark (2017). Retrieved from -
https://www.itgovernance.co.uk/what-is-cybersecurity#.VW6uS8-qqko
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security 17
Appendix
Figure 1
Document Page
Cyber Security 18
Figure 2
Figure 3
Document Page
Cyber Security 19
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]