Cyber Security Report: Analysis of Web Attacks and Security

Verified

Added on  2022/08/26

|22
|6545
|16
Report
AI Summary
This report provides a comprehensive analysis of cyber security, focusing on web attacks. It explores the evolutionary view of web attacks, covering their past, present, and future, and discusses the implications of these trends in today's world. The report delves into the application of legal and legislative considerations within the realm of cyber security, offering insights into how laws and regulations impact the field. It also offers predictions about future developments and potential challenges in cyber security. The report examines various aspects of cyber security, including critical infrastructure, application, network, and cloud security. Specific web attacks like SQL injection, Cross-Site Scripting (XSS), and others are also discussed. The report draws on information from the Dimension Data Global Threat Intelligence Report, and includes a look at the education sector's vulnerabilities. The report concludes with a synthesis of the key findings and a forward-looking perspective on the evolving cyber security landscape.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................2
Evolutionary view............................................................................................................................2
Implication of the trend in today’s world........................................................................................8
Application of legal and legislative consideration.........................................................................11
Prediction for future.......................................................................................................................13
Conclusion.....................................................................................................................................14
References......................................................................................................................................16
Document Page
2
CYBER SECURITY
Topic chosen: The topic that have been chosen for completion of the report is Cyber security
and the domain that have been chosen is Web attacks.
Introduction
Cyber security have been one of the major strategy that is being implemented by business
organizations. This itself states the fact that there is an increase in the cyber attacking process.
Hence providing proper security system will be ensuring that there will be high stability in the
data security process. Web based attacks have been increasing in a rapid rate due to the increase
in usage of internet platform. Excess usage of internet have been leading to this kind of attacks.
With an increase in the cyber security process. This increase in the cyber security process
includes the fact that better management of the data that are present in the database will be made.
Cyber security have been affecting the processing of business process. It have been seen that data
breach have been one of the major aspect that is to be performed. This report discusses about the
evolutionary view of the cyber security process. Past, present and future of cyber security have
been stated as well. This report also states about the implications of cyber security in the process.
This implication helps in proper description of the use of cyber security in the process. This
section is considered as one of the most important section of the report. Application of legal and
legislative section of the cyber security implementation is also stated in the system. With the help
of legal and legislative sectioning and understanding proper assessment of the law
implementation can be performed.
Evolutionary view
Past
Document Page
3
CYBER SECURITY
It have been seen that the very first instance regarding cyber security was a research
project that was developed by Bob Thomas. He then believed that it was possible for a computer
program to move across a computing network. It have been seen that the cyber crimes had a
beginning in form of academic research. It have been observed that the first worm that was
created was due to a mistake that have taken place. In the year 1988, Robert Morris was trying to
gauge the size of internet (Kent 2016). This is the very first known web attack as well. Hence
wise he wrote a program that ensured that he could propagate across the network. He was using
the Unix terminal. However there have been sections where Morris wanted to multiply the bug.
This is the section where the entire programming got wrong and the Morris worm aggressively
replicated itself and hence wise this led to slowdown of internet. This also caused slowing down
of internet and hence wise this ensured that there is crawling of internet and damage in the
operational process. Since 1987, there was a distinct growth in the processing of the antivirus
company. After the growth of the Morris worm, the importance of the antivirus company have
been increasing in a rapid rate. There have been a growth in the AV industry since then. In the
mid 80’s and 90’s as there have been a certain increase in the number of AV companies. The
cyber security technique that is used in the operational process includes scanning of the binary
data that are present in the database system. Initially there have been computation of hashes in
the processing. In this process proper list of the strings that are suspected are considered in the
process. This section ensures that malware processing was not getting solved entirely. This have
been affecting the user productivity.
25 years ago there was no such part named conventional information technology. Since
last 10 years there have an increase in the impact of the cyber attacks (Finnemore and Hollis
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CYBER SECURITY
2016). This is one of the main reason that proper assessment of the cyber security have been
increasing. With increase in cyber crime there has been an increase in need of cyber security.
In the year of 1971, discovery of creeper virus was done. This was the precedence of
computer networks. In the year of 1982, the first U.S. Patent for cyber security was documented.
In this time a patent regarding cryptographic communication system was documented as well. In
the process, RSA algorithm was introduced (Nazir, Patel and Patel 2017). Again in the year
1993, the first DEF conference was made. This is one of the most popular cyber security
technical conference was help. In the year 1995, there was a birth of Secure Sockets Layer (SSL)
have been seen. Netscape began to develop SSL protocol for not a prolonged period. This is the
brief history of cyber security.
In the year 2002, internet and web platforms were getting directly affected due to cyber
attacks. Thirteen Domain Name System were directly getting affected in the root servers. In the
mean time the DDoS attack also took place. This was one of the most sophisticated cyber attack
that had taken place till date. Again in the year 2009, Church of Scientology took place. In this
attack, the aspect that is to be considered is that DDoS attack was implemented on the website of
the church of Scientology. A total of 500 DDoS attack was incorporated in the process. These
were the recent as well as the primitive history of web attacks.
Present
In the present scenario there are different techniques that are used for performing cyber
security. There are 5 major types of cyber security techniques that are used in today’s society.
They are namely Critical infrastructure security, Application Security, Network Security, Cloud
Security and Internet of Things Security. It have been seen that the cyber security projects have
Document Page
5
CYBER SECURITY
been dealing with the integrity of the computer’s internet connected systems. Hardware as well
as software based data have been generating data that are vulnerable to the cyber attacks
(Almeshekah and Spafford 2016). In case proper security measures are not considered, data
vulnerability will be on an increasing node. With an increase in dependency in the computing
devices, it have been considered to be affecting the likelihood of the cyber attacks. This is one of
the major aspect that will be affecting the business in a negative manner. Without proper cyber
security measures a business acts to be highly vulnerable and hence wise proper inclusion of
cyber security cell in each and every business organization acts important.
Critical Infrastructure Security is one of the main cyber security technique that is to be
considered for maintaining the security process. Critical Infrastructure security consists of the
cyber physical systems on which the modern society have been relying on. There are certain
examples that can be considered for performing the cyber security, the examples includes the
likes of electricity grid, shopping centers as well as hospitals (Khatoun and Zeadally 2017). It is
considered that the infrastructure that is based on electricity grid on internet have been making
the entire process vulnerable to different cyber attacks. Organizations that possess critical
architecture ensures that proper measures in the field of cyber security is to be considered.
Developing a contingency plan have been one of the major aspect that is to be considered. With
the help of critical infrastructure security these issues can be eliminated.
Application security is yet another cyber security model that is to be considered as this
cyber security model have been considered. This cyber security model acts as an important
model that ensures that provisioning of the security system. Application security model have
been using the likes of software and hardware methods for eliminating different external threats.
This section is considered in the development stage of the application that is considered for
Document Page
6
CYBER SECURITY
provisioning of the data system. It have been observed that applications have been highly
accessible over the networks. Security measures are also considered in the development stage of
the application. There are certain types of application security that are considered, they are
namely antivirus programs, firewall and encryption programs. These cyber security models helps
in performing proper assessment of the unauthorized access to the data that have is performed. It
have been seen that companies have been detecting sensitive data and hence wise protecting
them via specific application security model have been a major advantage.
Network security is another cyber security model that is considered. It have been seen
that with there have been presence of outside threats and hence wise this ensures that better
assessment of unauthorized intrusion is required. There have been internal networks that have
been getting affected due to the malicious intent (Yousefi-Azar et al 2017). Network security
considers the aspect that proper protection of infrastructure is provided and hence wise inhibiting
the access to the system is also provided. This cyber security model that is used implements the
fact that internal networks are well secured and protected. This section also ensures that
infrastructure is also kept protected. Managing network security model is also considered as an
important aspect. Performing machine learning for flagging abnormal traffic have been one of
the major aspect that is to be considered. There are certain examples of network security (Taylor
et al 2019). They are namely extra logins, encryptions, antispyware software, firewalls and
monitored internet access.
Data storage have been one of the major aspect that is to be considered. Cloud platform
have been yet another aspect that is considered for performing management of the data storage.
Hence implementation of cyber security have been yet another aspect that is to be considered.
The cloud security tool is considered as an important cyber security tool that ensures that proper
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CYBER SECURITY
security is provided to the data that are stored in the cloud. Hence with the help of cloud security,
this issue of cyber attacks that occur on the cloud platform can be eliminated. It have been
observed that the attack that have been occurring in a regular manner and this issue can be
eliminated with the help of cloud security.
The 3 major web attack that is to be considered in the process are namely SQL injection,
Cross Site scripting as well as Path traversal. These 3 have been marked as the major issues that
have been detected in the process. It have been seen that half of the detected cyber attacks have
been performed with the help of this process. Half of the affected web application was affected
by the control issues and three forth of the web applications are affected by XSS attack. This is
the present day scenario of the cyber attacks that are based on web applications. The other web
attacks that takes place are namely Local File Inclusion, Information Leakage, OS Commanding,
Brute Force and Remote Code Execution. However, SQL injection remains the main issue that is
to be considered as the major attack that is present.
Future
It can be stated that the future of cyber security lies entirely on the target that will be set
by the hackers. The target of the hackers will ensure the direction of the cyber attacks and hence
forth cyber security techniques will be getting enhanced as per the attacks. It is expected that the
attacks will be targeting majorly 2 sectors, namely health sector and wealth sector. Personalized
data is gathered from the documents of these 2 sectors. Implementation of EU's General Data
Protection Regulation as well as California Consumer Privacy act have been the new path way
which cyber security have been paving through (Li, Shahidehpour and Aminifar 2017). There
will be a motive of not only ensuring that cyber attacks do not occur internally but also
externally and hence wise strategy development will be performed accordingly. This is one of
Document Page
8
CYBER SECURITY
the major reason that there will be a startegic development in the cyber security planning
process. Inclusion of automation have been another aspect that is to be considered for performing
better cyber security. With the help of automation axing of cyber attacks that occur internally can
be eliminated. Hence a complete section of cyber attack can be prohibited. This will be
benefitting the entire business operational process and robustness of business will be on a higher
node. This is one of the major reason that acceptance of automation in business processing have
been on a higher end. With the help of introduction of automation the data handling section will
be performed by the automated computing system. This reduces the chances of data breach (de
Bruijn and Janssen 2017). This reduction in data handling issues will be increasing the
robustness of the system.
It have been seen that tools that help in automation of the network context, provides
proper security analysis and detect the probable loop holes that are present in the networking
system. With the help of proper segmentation policies abnormal flow of traffic can be well
understood. This ensures that proper assessment of data security can be performed. Visibility as
well as gaining insight have been the major works that are performed by the automation tools.
Self propagating as well as network based attacks are detected before hand and hence wise
prevention of these can take place.
Another terminology that will be gaining importance in the future of the cyber security
process is namley machine learning. Machine learning will be helping in detecting the known
risks that might occur as per the knowledge that have been gained previously. However the main
importance of machine learning is that it helps in performing proper monitoring of the threats
and malware familiarities (Lamba et al 2017). Detection of new threats as well as existing threats
before facing massive loss due to attack have been one of the major advantage that is faced due
Document Page
9
CYBER SECURITY
to implementation of machine learning. With the help of machine learning the main benefit that
will be received is that there the computing device will be having a constant updates regarding
the new threats that might occur and hence wise this will be bettering the entire operational
process. Thus it can be stated that the entire process of data handling will be having a better
understanding and the threats that might occur will be well known and this will be increasing the
robustness of the system. This is one of the main reason that proper assessment of the data
security will be assessed.
These are the future technologies that can be implemented in future of the project. Hence
it can be stated that the cyber security techniques will be getting updated and hence wise this will
be imposing a challenge in front of the cyber attackers as with constant updates provided in the
process ensures that security system gets better and hence robustness of the system will be
getting better. Again with the usage of artificial intelligence, the entire processing of cyber
security will be having a constant change (Schatz, Bashroush and Wall 2017). With the help of
AI proper understanding of the data flow can be made. This is one of the major reason that
proper assessment of the data flow will be checked and will be monitored in a constant manner.
In case the data is monitored in a proper manner, the entire security process will be having a
check over the entire scenario and this will be providing a better result for the business
organizations that have been suffering from cyber attacks.
Implication of the trend in today’s world
Cyber Security have been acting to be the most important trend at this time. It have been
seen that there used be an average cost of $7.91 million charge for data breaching. However in
case of data breaching in 2020, the estimated cost is $150 million (Sun et al 2018). Hence it can
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
CYBER SECURITY
be stated that it will be a huge loss in revenue. It is expected that the cyber crime cost will be
increasing to $2 trillion and the entire crime activities will be increasing by 4 fold within this 4
years. Beyond the financial aspect that is considered the main issue that is considered in the
process is that there occurs incalculable harm which will be disrupting as well as ruining several
lives and here lies the importance of introduction of Cyber Security.
However it can be stated that cyber threats are not the only reason that requires
implementation of cyber security. Implementation of regulations namely HIPAA and EU’s
GDPR have been another reason that cyber security have been gaining importance. These are the
regulation that forces the business organizations to implement the cyber security process. This
ensures that the data that are being transacted are transacted in a safe manner (Hemilä, Mikkola
and Salonen 2019). In case of failing to maintain a proper cyber security proposition, these legal
laws will be penalizing the organizations. These laws are introduced in today’s world is to
protect the data that are stored in data set. Safeguarding the personal data have been one of the
major aspect that is considered. In today’s world of cloud data storage system the main aspect
that is to be considered in the process is that’s the data that are stored in the cloud platform are
interconnected amongst each other and hence wise this ensures that in case one of the data set is
breached, information about the other data sets are received as well and hence wise proper
securing of every single data set is required (Van Schaik et al 2017). The fact that the data that
are stored in the system are interconnected importance of cyber security have been on an
increasing node.
With the initial implementation of cyber security in the system, then main benefit that is
received in the process is that better analysis of the traffic flow can be made. This better analysis
of traffic flow will be helping in ensuring the path that proper analysis of the traffic flow gate
Document Page
11
CYBER SECURITY
will be known and hence wise preventive measures can be taken. This will be increasing the
robustness of the system. Hence data security will be in an increasing node. Implementing
correct firewall and antivirus packages have been another aspect that is to be considered for
storing data. This section ensures proper management of hosted app security and hence wise this
is one of the major reason that proper operation of organization.
Hence it can be stated that Cyber Security have been playing an important role in the
operation of the business organization. The major benefits that are considered in this case are
namely communicate and operate against data breach (Edgar and Manz 2017). Keeping a
constant track over the traffic control have been another benefit that can be considered in the
process. Cyber security also helps in securing financial systems. These includes the likes of bank
account, paychecks as well as loaning systems.
The major benefit that is received in this case is that this terminology has been protecting
business in a proper manner. With the help of cyber security the main advantage that is received
is that the employees can perform proper research and this ensures that the data management will
be getting easier. The cyber security tools will be helping in proper development analysis of the
flow of traffic and hence wise this will ensure that potential threats will be identified and this
will help in better and secured operation (Kostopoulos 2017). Another aspect that is to be
considered in the process is that personal information is also well protected and secured. Hence it
can be stated that personal information that is provided in the operational process will be secured
in nature and hence this increases the efficiency of the operational process. The employees of the
work place also stay protected from the getting affected from the cyber attack that takes place. It
have also been seem that viruses have been slowing down the operational process. Hence there is
an issue in the operational process and this affects the functional processing of business
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]