Cyber Security Report: Analysis of Web Attacks and Security
VerifiedAdded on 2022/08/26
|22
|6545
|16
Report
AI Summary
This report provides a comprehensive analysis of cyber security, focusing on web attacks. It explores the evolutionary view of web attacks, covering their past, present, and future, and discusses the implications of these trends in today's world. The report delves into the application of legal and legislative considerations within the realm of cyber security, offering insights into how laws and regulations impact the field. It also offers predictions about future developments and potential challenges in cyber security. The report examines various aspects of cyber security, including critical infrastructure, application, network, and cloud security. Specific web attacks like SQL injection, Cross-Site Scripting (XSS), and others are also discussed. The report draws on information from the Dimension Data Global Threat Intelligence Report, and includes a look at the education sector's vulnerabilities. The report concludes with a synthesis of the key findings and a forward-looking perspective on the evolving cyber security landscape.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author note
CYBER SECURITY
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................2
Evolutionary view............................................................................................................................2
Implication of the trend in today’s world........................................................................................8
Application of legal and legislative consideration.........................................................................11
Prediction for future.......................................................................................................................13
Conclusion.....................................................................................................................................14
References......................................................................................................................................16
CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................2
Evolutionary view............................................................................................................................2
Implication of the trend in today’s world........................................................................................8
Application of legal and legislative consideration.........................................................................11
Prediction for future.......................................................................................................................13
Conclusion.....................................................................................................................................14
References......................................................................................................................................16

2
CYBER SECURITY
Topic chosen: The topic that have been chosen for completion of the report is Cyber security
and the domain that have been chosen is Web attacks.
Introduction
Cyber security have been one of the major strategy that is being implemented by business
organizations. This itself states the fact that there is an increase in the cyber attacking process.
Hence providing proper security system will be ensuring that there will be high stability in the
data security process. Web based attacks have been increasing in a rapid rate due to the increase
in usage of internet platform. Excess usage of internet have been leading to this kind of attacks.
With an increase in the cyber security process. This increase in the cyber security process
includes the fact that better management of the data that are present in the database will be made.
Cyber security have been affecting the processing of business process. It have been seen that data
breach have been one of the major aspect that is to be performed. This report discusses about the
evolutionary view of the cyber security process. Past, present and future of cyber security have
been stated as well. This report also states about the implications of cyber security in the process.
This implication helps in proper description of the use of cyber security in the process. This
section is considered as one of the most important section of the report. Application of legal and
legislative section of the cyber security implementation is also stated in the system. With the help
of legal and legislative sectioning and understanding proper assessment of the law
implementation can be performed.
Evolutionary view
Past
CYBER SECURITY
Topic chosen: The topic that have been chosen for completion of the report is Cyber security
and the domain that have been chosen is Web attacks.
Introduction
Cyber security have been one of the major strategy that is being implemented by business
organizations. This itself states the fact that there is an increase in the cyber attacking process.
Hence providing proper security system will be ensuring that there will be high stability in the
data security process. Web based attacks have been increasing in a rapid rate due to the increase
in usage of internet platform. Excess usage of internet have been leading to this kind of attacks.
With an increase in the cyber security process. This increase in the cyber security process
includes the fact that better management of the data that are present in the database will be made.
Cyber security have been affecting the processing of business process. It have been seen that data
breach have been one of the major aspect that is to be performed. This report discusses about the
evolutionary view of the cyber security process. Past, present and future of cyber security have
been stated as well. This report also states about the implications of cyber security in the process.
This implication helps in proper description of the use of cyber security in the process. This
section is considered as one of the most important section of the report. Application of legal and
legislative section of the cyber security implementation is also stated in the system. With the help
of legal and legislative sectioning and understanding proper assessment of the law
implementation can be performed.
Evolutionary view
Past

3
CYBER SECURITY
It have been seen that the very first instance regarding cyber security was a research
project that was developed by Bob Thomas. He then believed that it was possible for a computer
program to move across a computing network. It have been seen that the cyber crimes had a
beginning in form of academic research. It have been observed that the first worm that was
created was due to a mistake that have taken place. In the year 1988, Robert Morris was trying to
gauge the size of internet (Kent 2016). This is the very first known web attack as well. Hence
wise he wrote a program that ensured that he could propagate across the network. He was using
the Unix terminal. However there have been sections where Morris wanted to multiply the bug.
This is the section where the entire programming got wrong and the Morris worm aggressively
replicated itself and hence wise this led to slowdown of internet. This also caused slowing down
of internet and hence wise this ensured that there is crawling of internet and damage in the
operational process. Since 1987, there was a distinct growth in the processing of the antivirus
company. After the growth of the Morris worm, the importance of the antivirus company have
been increasing in a rapid rate. There have been a growth in the AV industry since then. In the
mid 80’s and 90’s as there have been a certain increase in the number of AV companies. The
cyber security technique that is used in the operational process includes scanning of the binary
data that are present in the database system. Initially there have been computation of hashes in
the processing. In this process proper list of the strings that are suspected are considered in the
process. This section ensures that malware processing was not getting solved entirely. This have
been affecting the user productivity.
25 years ago there was no such part named conventional information technology. Since
last 10 years there have an increase in the impact of the cyber attacks (Finnemore and Hollis
CYBER SECURITY
It have been seen that the very first instance regarding cyber security was a research
project that was developed by Bob Thomas. He then believed that it was possible for a computer
program to move across a computing network. It have been seen that the cyber crimes had a
beginning in form of academic research. It have been observed that the first worm that was
created was due to a mistake that have taken place. In the year 1988, Robert Morris was trying to
gauge the size of internet (Kent 2016). This is the very first known web attack as well. Hence
wise he wrote a program that ensured that he could propagate across the network. He was using
the Unix terminal. However there have been sections where Morris wanted to multiply the bug.
This is the section where the entire programming got wrong and the Morris worm aggressively
replicated itself and hence wise this led to slowdown of internet. This also caused slowing down
of internet and hence wise this ensured that there is crawling of internet and damage in the
operational process. Since 1987, there was a distinct growth in the processing of the antivirus
company. After the growth of the Morris worm, the importance of the antivirus company have
been increasing in a rapid rate. There have been a growth in the AV industry since then. In the
mid 80’s and 90’s as there have been a certain increase in the number of AV companies. The
cyber security technique that is used in the operational process includes scanning of the binary
data that are present in the database system. Initially there have been computation of hashes in
the processing. In this process proper list of the strings that are suspected are considered in the
process. This section ensures that malware processing was not getting solved entirely. This have
been affecting the user productivity.
25 years ago there was no such part named conventional information technology. Since
last 10 years there have an increase in the impact of the cyber attacks (Finnemore and Hollis
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
CYBER SECURITY
2016). This is one of the main reason that proper assessment of the cyber security have been
increasing. With increase in cyber crime there has been an increase in need of cyber security.
In the year of 1971, discovery of creeper virus was done. This was the precedence of
computer networks. In the year of 1982, the first U.S. Patent for cyber security was documented.
In this time a patent regarding cryptographic communication system was documented as well. In
the process, RSA algorithm was introduced (Nazir, Patel and Patel 2017). Again in the year
1993, the first DEF conference was made. This is one of the most popular cyber security
technical conference was help. In the year 1995, there was a birth of Secure Sockets Layer (SSL)
have been seen. Netscape began to develop SSL protocol for not a prolonged period. This is the
brief history of cyber security.
In the year 2002, internet and web platforms were getting directly affected due to cyber
attacks. Thirteen Domain Name System were directly getting affected in the root servers. In the
mean time the DDoS attack also took place. This was one of the most sophisticated cyber attack
that had taken place till date. Again in the year 2009, Church of Scientology took place. In this
attack, the aspect that is to be considered is that DDoS attack was implemented on the website of
the church of Scientology. A total of 500 DDoS attack was incorporated in the process. These
were the recent as well as the primitive history of web attacks.
Present
In the present scenario there are different techniques that are used for performing cyber
security. There are 5 major types of cyber security techniques that are used in today’s society.
They are namely Critical infrastructure security, Application Security, Network Security, Cloud
Security and Internet of Things Security. It have been seen that the cyber security projects have
CYBER SECURITY
2016). This is one of the main reason that proper assessment of the cyber security have been
increasing. With increase in cyber crime there has been an increase in need of cyber security.
In the year of 1971, discovery of creeper virus was done. This was the precedence of
computer networks. In the year of 1982, the first U.S. Patent for cyber security was documented.
In this time a patent regarding cryptographic communication system was documented as well. In
the process, RSA algorithm was introduced (Nazir, Patel and Patel 2017). Again in the year
1993, the first DEF conference was made. This is one of the most popular cyber security
technical conference was help. In the year 1995, there was a birth of Secure Sockets Layer (SSL)
have been seen. Netscape began to develop SSL protocol for not a prolonged period. This is the
brief history of cyber security.
In the year 2002, internet and web platforms were getting directly affected due to cyber
attacks. Thirteen Domain Name System were directly getting affected in the root servers. In the
mean time the DDoS attack also took place. This was one of the most sophisticated cyber attack
that had taken place till date. Again in the year 2009, Church of Scientology took place. In this
attack, the aspect that is to be considered is that DDoS attack was implemented on the website of
the church of Scientology. A total of 500 DDoS attack was incorporated in the process. These
were the recent as well as the primitive history of web attacks.
Present
In the present scenario there are different techniques that are used for performing cyber
security. There are 5 major types of cyber security techniques that are used in today’s society.
They are namely Critical infrastructure security, Application Security, Network Security, Cloud
Security and Internet of Things Security. It have been seen that the cyber security projects have

5
CYBER SECURITY
been dealing with the integrity of the computer’s internet connected systems. Hardware as well
as software based data have been generating data that are vulnerable to the cyber attacks
(Almeshekah and Spafford 2016). In case proper security measures are not considered, data
vulnerability will be on an increasing node. With an increase in dependency in the computing
devices, it have been considered to be affecting the likelihood of the cyber attacks. This is one of
the major aspect that will be affecting the business in a negative manner. Without proper cyber
security measures a business acts to be highly vulnerable and hence wise proper inclusion of
cyber security cell in each and every business organization acts important.
Critical Infrastructure Security is one of the main cyber security technique that is to be
considered for maintaining the security process. Critical Infrastructure security consists of the
cyber physical systems on which the modern society have been relying on. There are certain
examples that can be considered for performing the cyber security, the examples includes the
likes of electricity grid, shopping centers as well as hospitals (Khatoun and Zeadally 2017). It is
considered that the infrastructure that is based on electricity grid on internet have been making
the entire process vulnerable to different cyber attacks. Organizations that possess critical
architecture ensures that proper measures in the field of cyber security is to be considered.
Developing a contingency plan have been one of the major aspect that is to be considered. With
the help of critical infrastructure security these issues can be eliminated.
Application security is yet another cyber security model that is to be considered as this
cyber security model have been considered. This cyber security model acts as an important
model that ensures that provisioning of the security system. Application security model have
been using the likes of software and hardware methods for eliminating different external threats.
This section is considered in the development stage of the application that is considered for
CYBER SECURITY
been dealing with the integrity of the computer’s internet connected systems. Hardware as well
as software based data have been generating data that are vulnerable to the cyber attacks
(Almeshekah and Spafford 2016). In case proper security measures are not considered, data
vulnerability will be on an increasing node. With an increase in dependency in the computing
devices, it have been considered to be affecting the likelihood of the cyber attacks. This is one of
the major aspect that will be affecting the business in a negative manner. Without proper cyber
security measures a business acts to be highly vulnerable and hence wise proper inclusion of
cyber security cell in each and every business organization acts important.
Critical Infrastructure Security is one of the main cyber security technique that is to be
considered for maintaining the security process. Critical Infrastructure security consists of the
cyber physical systems on which the modern society have been relying on. There are certain
examples that can be considered for performing the cyber security, the examples includes the
likes of electricity grid, shopping centers as well as hospitals (Khatoun and Zeadally 2017). It is
considered that the infrastructure that is based on electricity grid on internet have been making
the entire process vulnerable to different cyber attacks. Organizations that possess critical
architecture ensures that proper measures in the field of cyber security is to be considered.
Developing a contingency plan have been one of the major aspect that is to be considered. With
the help of critical infrastructure security these issues can be eliminated.
Application security is yet another cyber security model that is to be considered as this
cyber security model have been considered. This cyber security model acts as an important
model that ensures that provisioning of the security system. Application security model have
been using the likes of software and hardware methods for eliminating different external threats.
This section is considered in the development stage of the application that is considered for

6
CYBER SECURITY
provisioning of the data system. It have been observed that applications have been highly
accessible over the networks. Security measures are also considered in the development stage of
the application. There are certain types of application security that are considered, they are
namely antivirus programs, firewall and encryption programs. These cyber security models helps
in performing proper assessment of the unauthorized access to the data that have is performed. It
have been seen that companies have been detecting sensitive data and hence wise protecting
them via specific application security model have been a major advantage.
Network security is another cyber security model that is considered. It have been seen
that with there have been presence of outside threats and hence wise this ensures that better
assessment of unauthorized intrusion is required. There have been internal networks that have
been getting affected due to the malicious intent (Yousefi-Azar et al 2017). Network security
considers the aspect that proper protection of infrastructure is provided and hence wise inhibiting
the access to the system is also provided. This cyber security model that is used implements the
fact that internal networks are well secured and protected. This section also ensures that
infrastructure is also kept protected. Managing network security model is also considered as an
important aspect. Performing machine learning for flagging abnormal traffic have been one of
the major aspect that is to be considered. There are certain examples of network security (Taylor
et al 2019). They are namely extra logins, encryptions, antispyware software, firewalls and
monitored internet access.
Data storage have been one of the major aspect that is to be considered. Cloud platform
have been yet another aspect that is considered for performing management of the data storage.
Hence implementation of cyber security have been yet another aspect that is to be considered.
The cloud security tool is considered as an important cyber security tool that ensures that proper
CYBER SECURITY
provisioning of the data system. It have been observed that applications have been highly
accessible over the networks. Security measures are also considered in the development stage of
the application. There are certain types of application security that are considered, they are
namely antivirus programs, firewall and encryption programs. These cyber security models helps
in performing proper assessment of the unauthorized access to the data that have is performed. It
have been seen that companies have been detecting sensitive data and hence wise protecting
them via specific application security model have been a major advantage.
Network security is another cyber security model that is considered. It have been seen
that with there have been presence of outside threats and hence wise this ensures that better
assessment of unauthorized intrusion is required. There have been internal networks that have
been getting affected due to the malicious intent (Yousefi-Azar et al 2017). Network security
considers the aspect that proper protection of infrastructure is provided and hence wise inhibiting
the access to the system is also provided. This cyber security model that is used implements the
fact that internal networks are well secured and protected. This section also ensures that
infrastructure is also kept protected. Managing network security model is also considered as an
important aspect. Performing machine learning for flagging abnormal traffic have been one of
the major aspect that is to be considered. There are certain examples of network security (Taylor
et al 2019). They are namely extra logins, encryptions, antispyware software, firewalls and
monitored internet access.
Data storage have been one of the major aspect that is to be considered. Cloud platform
have been yet another aspect that is considered for performing management of the data storage.
Hence implementation of cyber security have been yet another aspect that is to be considered.
The cloud security tool is considered as an important cyber security tool that ensures that proper
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
CYBER SECURITY
security is provided to the data that are stored in the cloud. Hence with the help of cloud security,
this issue of cyber attacks that occur on the cloud platform can be eliminated. It have been
observed that the attack that have been occurring in a regular manner and this issue can be
eliminated with the help of cloud security.
The 3 major web attack that is to be considered in the process are namely SQL injection,
Cross Site scripting as well as Path traversal. These 3 have been marked as the major issues that
have been detected in the process. It have been seen that half of the detected cyber attacks have
been performed with the help of this process. Half of the affected web application was affected
by the control issues and three forth of the web applications are affected by XSS attack. This is
the present day scenario of the cyber attacks that are based on web applications. The other web
attacks that takes place are namely Local File Inclusion, Information Leakage, OS Commanding,
Brute Force and Remote Code Execution. However, SQL injection remains the main issue that is
to be considered as the major attack that is present.
Future
It can be stated that the future of cyber security lies entirely on the target that will be set
by the hackers. The target of the hackers will ensure the direction of the cyber attacks and hence
forth cyber security techniques will be getting enhanced as per the attacks. It is expected that the
attacks will be targeting majorly 2 sectors, namely health sector and wealth sector. Personalized
data is gathered from the documents of these 2 sectors. Implementation of EU's General Data
Protection Regulation as well as California Consumer Privacy act have been the new path way
which cyber security have been paving through (Li, Shahidehpour and Aminifar 2017). There
will be a motive of not only ensuring that cyber attacks do not occur internally but also
externally and hence wise strategy development will be performed accordingly. This is one of
CYBER SECURITY
security is provided to the data that are stored in the cloud. Hence with the help of cloud security,
this issue of cyber attacks that occur on the cloud platform can be eliminated. It have been
observed that the attack that have been occurring in a regular manner and this issue can be
eliminated with the help of cloud security.
The 3 major web attack that is to be considered in the process are namely SQL injection,
Cross Site scripting as well as Path traversal. These 3 have been marked as the major issues that
have been detected in the process. It have been seen that half of the detected cyber attacks have
been performed with the help of this process. Half of the affected web application was affected
by the control issues and three forth of the web applications are affected by XSS attack. This is
the present day scenario of the cyber attacks that are based on web applications. The other web
attacks that takes place are namely Local File Inclusion, Information Leakage, OS Commanding,
Brute Force and Remote Code Execution. However, SQL injection remains the main issue that is
to be considered as the major attack that is present.
Future
It can be stated that the future of cyber security lies entirely on the target that will be set
by the hackers. The target of the hackers will ensure the direction of the cyber attacks and hence
forth cyber security techniques will be getting enhanced as per the attacks. It is expected that the
attacks will be targeting majorly 2 sectors, namely health sector and wealth sector. Personalized
data is gathered from the documents of these 2 sectors. Implementation of EU's General Data
Protection Regulation as well as California Consumer Privacy act have been the new path way
which cyber security have been paving through (Li, Shahidehpour and Aminifar 2017). There
will be a motive of not only ensuring that cyber attacks do not occur internally but also
externally and hence wise strategy development will be performed accordingly. This is one of

8
CYBER SECURITY
the major reason that there will be a startegic development in the cyber security planning
process. Inclusion of automation have been another aspect that is to be considered for performing
better cyber security. With the help of automation axing of cyber attacks that occur internally can
be eliminated. Hence a complete section of cyber attack can be prohibited. This will be
benefitting the entire business operational process and robustness of business will be on a higher
node. This is one of the major reason that acceptance of automation in business processing have
been on a higher end. With the help of introduction of automation the data handling section will
be performed by the automated computing system. This reduces the chances of data breach (de
Bruijn and Janssen 2017). This reduction in data handling issues will be increasing the
robustness of the system.
It have been seen that tools that help in automation of the network context, provides
proper security analysis and detect the probable loop holes that are present in the networking
system. With the help of proper segmentation policies abnormal flow of traffic can be well
understood. This ensures that proper assessment of data security can be performed. Visibility as
well as gaining insight have been the major works that are performed by the automation tools.
Self propagating as well as network based attacks are detected before hand and hence wise
prevention of these can take place.
Another terminology that will be gaining importance in the future of the cyber security
process is namley machine learning. Machine learning will be helping in detecting the known
risks that might occur as per the knowledge that have been gained previously. However the main
importance of machine learning is that it helps in performing proper monitoring of the threats
and malware familiarities (Lamba et al 2017). Detection of new threats as well as existing threats
before facing massive loss due to attack have been one of the major advantage that is faced due
CYBER SECURITY
the major reason that there will be a startegic development in the cyber security planning
process. Inclusion of automation have been another aspect that is to be considered for performing
better cyber security. With the help of automation axing of cyber attacks that occur internally can
be eliminated. Hence a complete section of cyber attack can be prohibited. This will be
benefitting the entire business operational process and robustness of business will be on a higher
node. This is one of the major reason that acceptance of automation in business processing have
been on a higher end. With the help of introduction of automation the data handling section will
be performed by the automated computing system. This reduces the chances of data breach (de
Bruijn and Janssen 2017). This reduction in data handling issues will be increasing the
robustness of the system.
It have been seen that tools that help in automation of the network context, provides
proper security analysis and detect the probable loop holes that are present in the networking
system. With the help of proper segmentation policies abnormal flow of traffic can be well
understood. This ensures that proper assessment of data security can be performed. Visibility as
well as gaining insight have been the major works that are performed by the automation tools.
Self propagating as well as network based attacks are detected before hand and hence wise
prevention of these can take place.
Another terminology that will be gaining importance in the future of the cyber security
process is namley machine learning. Machine learning will be helping in detecting the known
risks that might occur as per the knowledge that have been gained previously. However the main
importance of machine learning is that it helps in performing proper monitoring of the threats
and malware familiarities (Lamba et al 2017). Detection of new threats as well as existing threats
before facing massive loss due to attack have been one of the major advantage that is faced due

9
CYBER SECURITY
to implementation of machine learning. With the help of machine learning the main benefit that
will be received is that there the computing device will be having a constant updates regarding
the new threats that might occur and hence wise this will be bettering the entire operational
process. Thus it can be stated that the entire process of data handling will be having a better
understanding and the threats that might occur will be well known and this will be increasing the
robustness of the system. This is one of the main reason that proper assessment of the data
security will be assessed.
These are the future technologies that can be implemented in future of the project. Hence
it can be stated that the cyber security techniques will be getting updated and hence wise this will
be imposing a challenge in front of the cyber attackers as with constant updates provided in the
process ensures that security system gets better and hence robustness of the system will be
getting better. Again with the usage of artificial intelligence, the entire processing of cyber
security will be having a constant change (Schatz, Bashroush and Wall 2017). With the help of
AI proper understanding of the data flow can be made. This is one of the major reason that
proper assessment of the data flow will be checked and will be monitored in a constant manner.
In case the data is monitored in a proper manner, the entire security process will be having a
check over the entire scenario and this will be providing a better result for the business
organizations that have been suffering from cyber attacks.
Implication of the trend in today’s world
Cyber Security have been acting to be the most important trend at this time. It have been
seen that there used be an average cost of $7.91 million charge for data breaching. However in
case of data breaching in 2020, the estimated cost is $150 million (Sun et al 2018). Hence it can
CYBER SECURITY
to implementation of machine learning. With the help of machine learning the main benefit that
will be received is that there the computing device will be having a constant updates regarding
the new threats that might occur and hence wise this will be bettering the entire operational
process. Thus it can be stated that the entire process of data handling will be having a better
understanding and the threats that might occur will be well known and this will be increasing the
robustness of the system. This is one of the main reason that proper assessment of the data
security will be assessed.
These are the future technologies that can be implemented in future of the project. Hence
it can be stated that the cyber security techniques will be getting updated and hence wise this will
be imposing a challenge in front of the cyber attackers as with constant updates provided in the
process ensures that security system gets better and hence robustness of the system will be
getting better. Again with the usage of artificial intelligence, the entire processing of cyber
security will be having a constant change (Schatz, Bashroush and Wall 2017). With the help of
AI proper understanding of the data flow can be made. This is one of the major reason that
proper assessment of the data flow will be checked and will be monitored in a constant manner.
In case the data is monitored in a proper manner, the entire security process will be having a
check over the entire scenario and this will be providing a better result for the business
organizations that have been suffering from cyber attacks.
Implication of the trend in today’s world
Cyber Security have been acting to be the most important trend at this time. It have been
seen that there used be an average cost of $7.91 million charge for data breaching. However in
case of data breaching in 2020, the estimated cost is $150 million (Sun et al 2018). Hence it can
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
CYBER SECURITY
be stated that it will be a huge loss in revenue. It is expected that the cyber crime cost will be
increasing to $2 trillion and the entire crime activities will be increasing by 4 fold within this 4
years. Beyond the financial aspect that is considered the main issue that is considered in the
process is that there occurs incalculable harm which will be disrupting as well as ruining several
lives and here lies the importance of introduction of Cyber Security.
However it can be stated that cyber threats are not the only reason that requires
implementation of cyber security. Implementation of regulations namely HIPAA and EU’s
GDPR have been another reason that cyber security have been gaining importance. These are the
regulation that forces the business organizations to implement the cyber security process. This
ensures that the data that are being transacted are transacted in a safe manner (Hemilä, Mikkola
and Salonen 2019). In case of failing to maintain a proper cyber security proposition, these legal
laws will be penalizing the organizations. These laws are introduced in today’s world is to
protect the data that are stored in data set. Safeguarding the personal data have been one of the
major aspect that is considered. In today’s world of cloud data storage system the main aspect
that is to be considered in the process is that’s the data that are stored in the cloud platform are
interconnected amongst each other and hence wise this ensures that in case one of the data set is
breached, information about the other data sets are received as well and hence wise proper
securing of every single data set is required (Van Schaik et al 2017). The fact that the data that
are stored in the system are interconnected importance of cyber security have been on an
increasing node.
With the initial implementation of cyber security in the system, then main benefit that is
received in the process is that better analysis of the traffic flow can be made. This better analysis
of traffic flow will be helping in ensuring the path that proper analysis of the traffic flow gate
CYBER SECURITY
be stated that it will be a huge loss in revenue. It is expected that the cyber crime cost will be
increasing to $2 trillion and the entire crime activities will be increasing by 4 fold within this 4
years. Beyond the financial aspect that is considered the main issue that is considered in the
process is that there occurs incalculable harm which will be disrupting as well as ruining several
lives and here lies the importance of introduction of Cyber Security.
However it can be stated that cyber threats are not the only reason that requires
implementation of cyber security. Implementation of regulations namely HIPAA and EU’s
GDPR have been another reason that cyber security have been gaining importance. These are the
regulation that forces the business organizations to implement the cyber security process. This
ensures that the data that are being transacted are transacted in a safe manner (Hemilä, Mikkola
and Salonen 2019). In case of failing to maintain a proper cyber security proposition, these legal
laws will be penalizing the organizations. These laws are introduced in today’s world is to
protect the data that are stored in data set. Safeguarding the personal data have been one of the
major aspect that is considered. In today’s world of cloud data storage system the main aspect
that is to be considered in the process is that’s the data that are stored in the cloud platform are
interconnected amongst each other and hence wise this ensures that in case one of the data set is
breached, information about the other data sets are received as well and hence wise proper
securing of every single data set is required (Van Schaik et al 2017). The fact that the data that
are stored in the system are interconnected importance of cyber security have been on an
increasing node.
With the initial implementation of cyber security in the system, then main benefit that is
received in the process is that better analysis of the traffic flow can be made. This better analysis
of traffic flow will be helping in ensuring the path that proper analysis of the traffic flow gate

11
CYBER SECURITY
will be known and hence wise preventive measures can be taken. This will be increasing the
robustness of the system. Hence data security will be in an increasing node. Implementing
correct firewall and antivirus packages have been another aspect that is to be considered for
storing data. This section ensures proper management of hosted app security and hence wise this
is one of the major reason that proper operation of organization.
Hence it can be stated that Cyber Security have been playing an important role in the
operation of the business organization. The major benefits that are considered in this case are
namely communicate and operate against data breach (Edgar and Manz 2017). Keeping a
constant track over the traffic control have been another benefit that can be considered in the
process. Cyber security also helps in securing financial systems. These includes the likes of bank
account, paychecks as well as loaning systems.
The major benefit that is received in this case is that this terminology has been protecting
business in a proper manner. With the help of cyber security the main advantage that is received
is that the employees can perform proper research and this ensures that the data management will
be getting easier. The cyber security tools will be helping in proper development analysis of the
flow of traffic and hence wise this will ensure that potential threats will be identified and this
will help in better and secured operation (Kostopoulos 2017). Another aspect that is to be
considered in the process is that personal information is also well protected and secured. Hence it
can be stated that personal information that is provided in the operational process will be secured
in nature and hence this increases the efficiency of the operational process. The employees of the
work place also stay protected from the getting affected from the cyber attack that takes place. It
have also been seem that viruses have been slowing down the operational process. Hence there is
an issue in the operational process and this affects the functional processing of business
CYBER SECURITY
will be known and hence wise preventive measures can be taken. This will be increasing the
robustness of the system. Hence data security will be in an increasing node. Implementing
correct firewall and antivirus packages have been another aspect that is to be considered for
storing data. This section ensures proper management of hosted app security and hence wise this
is one of the major reason that proper operation of organization.
Hence it can be stated that Cyber Security have been playing an important role in the
operation of the business organization. The major benefits that are considered in this case are
namely communicate and operate against data breach (Edgar and Manz 2017). Keeping a
constant track over the traffic control have been another benefit that can be considered in the
process. Cyber security also helps in securing financial systems. These includes the likes of bank
account, paychecks as well as loaning systems.
The major benefit that is received in this case is that this terminology has been protecting
business in a proper manner. With the help of cyber security the main advantage that is received
is that the employees can perform proper research and this ensures that the data management will
be getting easier. The cyber security tools will be helping in proper development analysis of the
flow of traffic and hence wise this will ensure that potential threats will be identified and this
will help in better and secured operation (Kostopoulos 2017). Another aspect that is to be
considered in the process is that personal information is also well protected and secured. Hence it
can be stated that personal information that is provided in the operational process will be secured
in nature and hence this increases the efficiency of the operational process. The employees of the
work place also stay protected from the getting affected from the cyber attack that takes place. It
have also been seem that viruses have been slowing down the operational process. Hence there is
an issue in the operational process and this affects the functional processing of business

12
CYBER SECURITY
organization. This is one of the major reason that cyber security plays an important role in
bettering the operational process and hence wise increase the efficiency of the entire process.
The excess time that is wasted in the process was considered as a lag. Another major advantage
that is received in this process is that the websites that are used in the operational process gets
affected and hence the websites gets shut down. Hence speed of the operational process
decreases. Cyber security also ensures that there is least spyware attack. With proper
implementation of Fortinet’s FortiGate Firewall, elimination of spyware can be performed. This
is one of the major reason that the actions that are performed by the employees gets performed in
a proper manner (Buczak and Guven 2015). Cyber security terminology also ensures that there is
an elimination of the data breaching of the employees can be eliminated.
The major threats that are considered in the process are namely Adware, Ransomware,
Spyware, Man in the Middle Attack, Drive by Attack, Password Attack, SQL injection, Cross
site scripting XSS attack as well as Eavesdropping attack. These are the major attacks that have
been affecting the efficiency of the operating process. This cyber attacks have been the main
reason of decrease in efficiency of operational process. Cyber security tools are then used in the
operational process for eliminating the resultant of the attack (Dua and Du 2016). This have been
one of the major reason that operational process of different business organizations have been
getting better gradually. Cyber security have been hence wise increasing the good will of the
organization. With an increase in number of cyber attack mediums the importance of the cyber
security platform has been increasing as well.
The major web attacks that occur in the process are namely the Denial of Service and
Distributed Denial of Service attack .Man in the Middle attack is based on the operational
process of the web attacks. SQL injection is also implemented in the process. Eavesdropping
CYBER SECURITY
organization. This is one of the major reason that cyber security plays an important role in
bettering the operational process and hence wise increase the efficiency of the entire process.
The excess time that is wasted in the process was considered as a lag. Another major advantage
that is received in this process is that the websites that are used in the operational process gets
affected and hence the websites gets shut down. Hence speed of the operational process
decreases. Cyber security also ensures that there is least spyware attack. With proper
implementation of Fortinet’s FortiGate Firewall, elimination of spyware can be performed. This
is one of the major reason that the actions that are performed by the employees gets performed in
a proper manner (Buczak and Guven 2015). Cyber security terminology also ensures that there is
an elimination of the data breaching of the employees can be eliminated.
The major threats that are considered in the process are namely Adware, Ransomware,
Spyware, Man in the Middle Attack, Drive by Attack, Password Attack, SQL injection, Cross
site scripting XSS attack as well as Eavesdropping attack. These are the major attacks that have
been affecting the efficiency of the operating process. This cyber attacks have been the main
reason of decrease in efficiency of operational process. Cyber security tools are then used in the
operational process for eliminating the resultant of the attack (Dua and Du 2016). This have been
one of the major reason that operational process of different business organizations have been
getting better gradually. Cyber security have been hence wise increasing the good will of the
organization. With an increase in number of cyber attack mediums the importance of the cyber
security platform has been increasing as well.
The major web attacks that occur in the process are namely the Denial of Service and
Distributed Denial of Service attack .Man in the Middle attack is based on the operational
process of the web attacks. SQL injection is also implemented in the process. Eavesdropping
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
CYBER SECURITY
attack is considered as an important attack that is getting imposed on the web applications. These
are the preset day web based attacks that have been taking place. The cyber attacks that have
been taking place is majorly based on the web applications and this is one of the main reasons
that web attacks have been increasing. This increasing of the web attacks have been leading to
data breaches that are generated from the platform itself. However, security process have been
getting robust. This robustness have been due to the huge investment that is made in the research
and development process. Hence the entire process of security have been maintained.
Application of legal and legislative consideration
It has been a trend of increasing strictness of the cyber security legislation. This is one
with the major aspect that is to be considered as this ensures that the collaboration is public and
private is beneficial for the operational process (Gupta, Agrawal and Yamaguchi 2016). There
have been growth in the cyber security agencies that can be considered and hence wise this
ensures that proper laws regarding cyber security is implemented. The different law makers of
cyber security are area based. The different unions that are considered in this process are namely
European Union, United States, Latin America and Asia Pacific. These are the major governing
bodies that ensures proper assessment of the legal and legislative formulation of cyber security
strategies (Fielder et al 2016). It have been seen that there are several private agencies that try to
get into the legislation formulation of cyber security This ensures that there are proper security
provided to the data transaction process.
European Union is mainly focused on the proper assessment of the security of
information and hence wise this ensures that there will be equipped as well as prepared response
to the promotion of the legislation that ensures that there will be proper remedies to the incidents
CYBER SECURITY
attack is considered as an important attack that is getting imposed on the web applications. These
are the preset day web based attacks that have been taking place. The cyber attacks that have
been taking place is majorly based on the web applications and this is one of the main reasons
that web attacks have been increasing. This increasing of the web attacks have been leading to
data breaches that are generated from the platform itself. However, security process have been
getting robust. This robustness have been due to the huge investment that is made in the research
and development process. Hence the entire process of security have been maintained.
Application of legal and legislative consideration
It has been a trend of increasing strictness of the cyber security legislation. This is one
with the major aspect that is to be considered as this ensures that the collaboration is public and
private is beneficial for the operational process (Gupta, Agrawal and Yamaguchi 2016). There
have been growth in the cyber security agencies that can be considered and hence wise this
ensures that proper laws regarding cyber security is implemented. The different law makers of
cyber security are area based. The different unions that are considered in this process are namely
European Union, United States, Latin America and Asia Pacific. These are the major governing
bodies that ensures proper assessment of the legal and legislative formulation of cyber security
strategies (Fielder et al 2016). It have been seen that there are several private agencies that try to
get into the legislation formulation of cyber security This ensures that there are proper security
provided to the data transaction process.
European Union is mainly focused on the proper assessment of the security of
information and hence wise this ensures that there will be equipped as well as prepared response
to the promotion of the legislation that ensures that there will be proper remedies to the incidents

14
CYBER SECURITY
that have taken place earlier. As per this legislation, Computer Security Incident Response Team
(CSIRT) must be implemented (Ben-Asher and Gonzalez 2015). With the help of this
implementation, the main aspect that is considered in the processing is that there will be rapid as
well as effective cooperation, which will be helping in proper development of culture of security
amongst the sectors that are important. The importance of this security system is present among
the sectors of finance, health as well as digital infrastructure.
United States legislation is considered to be approved by United States Congress and is
known as the Cyber Security Act 2015. This is one of the major act that have been ensuring that
there will be least cyber attacks (Abomhara 2015). This have been focusing on the framework for
promoting exchange for proper gaining of information in the private sector and hence wise there
will be reduction in the computer based threats in both public as well as private sector.
Implementation of coordinate intelligence as well as defensive actions have been one of the
major aspect that is to be considered in the operational process. The major aim of the legislation
is to perform better assessment of the threats that are initially found. The aim is to prevent
attacks and hence wise this will be ensuring the fact that there will be least attacks on the
computing operational process. This process is focused on preventing immediate attacks that
affects the companies and agencies. Defensive actions are also considered in the operational
process. Governing body have been focusing on detecting the threat that have been found in the
operational process.
The Latin America legislation is based on determining the processing of legislative
frameworks and hence wise deals with the electronic evidences that are present in the system.
This ensures the fact that there will be proper assessment of cyber security and hence wise this
ensures that there will be training of judges specially for dealing with cyber security related
CYBER SECURITY
that have taken place earlier. As per this legislation, Computer Security Incident Response Team
(CSIRT) must be implemented (Ben-Asher and Gonzalez 2015). With the help of this
implementation, the main aspect that is considered in the processing is that there will be rapid as
well as effective cooperation, which will be helping in proper development of culture of security
amongst the sectors that are important. The importance of this security system is present among
the sectors of finance, health as well as digital infrastructure.
United States legislation is considered to be approved by United States Congress and is
known as the Cyber Security Act 2015. This is one of the major act that have been ensuring that
there will be least cyber attacks (Abomhara 2015). This have been focusing on the framework for
promoting exchange for proper gaining of information in the private sector and hence wise there
will be reduction in the computer based threats in both public as well as private sector.
Implementation of coordinate intelligence as well as defensive actions have been one of the
major aspect that is to be considered in the operational process. The major aim of the legislation
is to perform better assessment of the threats that are initially found. The aim is to prevent
attacks and hence wise this will be ensuring the fact that there will be least attacks on the
computing operational process. This process is focused on preventing immediate attacks that
affects the companies and agencies. Defensive actions are also considered in the operational
process. Governing body have been focusing on detecting the threat that have been found in the
operational process.
The Latin America legislation is based on determining the processing of legislative
frameworks and hence wise deals with the electronic evidences that are present in the system.
This ensures the fact that there will be proper assessment of cyber security and hence wise this
ensures that there will be training of judges specially for dealing with cyber security related

15
CYBER SECURITY
aspects. This have been affecting the decision making process. Adherence to international
conventions are also included in the judgment making process (Bada Sasse and Nurse 2019.).
Inclusion of Budapest Convention have been one of the major factor that have been influencing
the cross border agreements for proper cooperation in between the agreement of cooperation as
well as different decisive factors. This have been creating a resilient cyber security in the
process.
Legislation in Asia Pacific have been quite different from the other sections and hence
wise the consequences that are considered in the process have been different as well. These
legislations are considered to be updates of the previous legal versions. The main focus have
been on increasing commitment of the private sector as well as in the government sector.
There are certain legal hindrances that are present in the web attacks. This ensures that
UK Financial Conduct Authority must be notified with proper regulated entities and materials of
cyber incidents. It is stated that Financial Conduct Authority considers it to be an attack only
when there is a loss of data in a significant manner. The audience base that gets affected is also
considered in the process. Monitoring of the presence of malicious software system have been
considered in tge section. However there are certain issues that are to be considered. In this
process, the issue that is to be considered is that payment of ransom amount for gaining data
back from the attack is highly prohibited. Banks and different financial institution needs to
consider sections 44-46 which is present in the Serious Crime Act 2007. Another major factor
that is to be considered in the process is that the data that are present in the web application
needs to be protected and the security system is needed to be robust in nature.
Prediction for future
CYBER SECURITY
aspects. This have been affecting the decision making process. Adherence to international
conventions are also included in the judgment making process (Bada Sasse and Nurse 2019.).
Inclusion of Budapest Convention have been one of the major factor that have been influencing
the cross border agreements for proper cooperation in between the agreement of cooperation as
well as different decisive factors. This have been creating a resilient cyber security in the
process.
Legislation in Asia Pacific have been quite different from the other sections and hence
wise the consequences that are considered in the process have been different as well. These
legislations are considered to be updates of the previous legal versions. The main focus have
been on increasing commitment of the private sector as well as in the government sector.
There are certain legal hindrances that are present in the web attacks. This ensures that
UK Financial Conduct Authority must be notified with proper regulated entities and materials of
cyber incidents. It is stated that Financial Conduct Authority considers it to be an attack only
when there is a loss of data in a significant manner. The audience base that gets affected is also
considered in the process. Monitoring of the presence of malicious software system have been
considered in tge section. However there are certain issues that are to be considered. In this
process, the issue that is to be considered is that payment of ransom amount for gaining data
back from the attack is highly prohibited. Banks and different financial institution needs to
consider sections 44-46 which is present in the Serious Crime Act 2007. Another major factor
that is to be considered in the process is that the data that are present in the web application
needs to be protected and the security system is needed to be robust in nature.
Prediction for future
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16
CYBER SECURITY
It is expected that the security of the data will be getting more robust. This section
ensures the fact that prediction process will be increasing. This increase in the security system
have been providing higher robustness to the security process. Predictive analysis have been one
of the major aspect that will be introduced in the operational process. It is expected that tools like
Trend Micro have been providing proper prediction of the vendor size and hence wise it can be
said that better management of data can be made. This tool have been gaining acceptance in
daily basis. The major reason of this increase in acceptance is that the technological development
have been occurring and hence this will be proving a better spot for the process (Knowles et al
2015). Another prediction that can be made is that with an increase in the complex infrastructure,
it will be getting easier for the cyber criminals to impose the attack. As with increase in
complexity of the infrastructure the area of attack also increases. Hence vulnerabilities also
increase. This is one of the major reason that proper assessment of behavioral detection is needed
to be made. User misconfiguration along with third party involvement is to be eliminated (Carr
2016). Tools like FireEye will be required for proper assessment of the security system. This tool
have been acting beneficial in detecting ransom ware and is also used for developing big picture.
It is expected that web attacks will be getting reformed. The reason of this reformation is
the introduction of AI in the web applications. Prototype AI attack is one of the major attack that
might occur in future. This section ensures that financially stable attackers can use this
technology. Etmot Trojan is used in this process. Offensive AI is another aspect that is to be
considered as an attack that have been affecting the security of the data that are generated in the
web based applications. These are the major issues that have detected to be affecting the security
of the web applications in future.
CYBER SECURITY
It is expected that the security of the data will be getting more robust. This section
ensures the fact that prediction process will be increasing. This increase in the security system
have been providing higher robustness to the security process. Predictive analysis have been one
of the major aspect that will be introduced in the operational process. It is expected that tools like
Trend Micro have been providing proper prediction of the vendor size and hence wise it can be
said that better management of data can be made. This tool have been gaining acceptance in
daily basis. The major reason of this increase in acceptance is that the technological development
have been occurring and hence this will be proving a better spot for the process (Knowles et al
2015). Another prediction that can be made is that with an increase in the complex infrastructure,
it will be getting easier for the cyber criminals to impose the attack. As with increase in
complexity of the infrastructure the area of attack also increases. Hence vulnerabilities also
increase. This is one of the major reason that proper assessment of behavioral detection is needed
to be made. User misconfiguration along with third party involvement is to be eliminated (Carr
2016). Tools like FireEye will be required for proper assessment of the security system. This tool
have been acting beneficial in detecting ransom ware and is also used for developing big picture.
It is expected that web attacks will be getting reformed. The reason of this reformation is
the introduction of AI in the web applications. Prototype AI attack is one of the major attack that
might occur in future. This section ensures that financially stable attackers can use this
technology. Etmot Trojan is used in this process. Offensive AI is another aspect that is to be
considered as an attack that have been affecting the security of the data that are generated in the
web based applications. These are the major issues that have detected to be affecting the security
of the web applications in future.

17
CYBER SECURITY
Conclusion
From the above discussion, it can be stated that cyber security have been one of the major
technology that have been gaining importance in the regular operational process. This
technology have been a technology that have been researched on in a rigorous manner. Research
and development process have been one of the major aspect that have been helping in leading the
path. This section will be ensuring the fact that there will be an increase in the innovation in the
security process. This development in the cyber security process have been helping in better
management of the data and increase in robustness of the data center is also shown. From the
above statements, it can also be stated that proper there have been a revolution in the operational
process. This revolution process have been leading the technology of cyber security. With the
increase in the research and development process, the entire section have been getting affected in
a positive manner as the data that are collected will be secured. This security ensures that better
scalability in the data center can be brought in. However, it have been seen that the laws and
legislation of different countries. Following laws and legislation of different counties for
different countries have been one of the major aspect that is considered. Maintaining the laws
and legislation of different countries have been another aspect that is to be considered. This is the
main reason that proper management of the data set is to be performed. This section have been
ensuring that following these laws acts important. It can be concluded that cyber security have
been providing better assessment of the data that are stored in the system.
CYBER SECURITY
Conclusion
From the above discussion, it can be stated that cyber security have been one of the major
technology that have been gaining importance in the regular operational process. This
technology have been a technology that have been researched on in a rigorous manner. Research
and development process have been one of the major aspect that have been helping in leading the
path. This section will be ensuring the fact that there will be an increase in the innovation in the
security process. This development in the cyber security process have been helping in better
management of the data and increase in robustness of the data center is also shown. From the
above statements, it can also be stated that proper there have been a revolution in the operational
process. This revolution process have been leading the technology of cyber security. With the
increase in the research and development process, the entire section have been getting affected in
a positive manner as the data that are collected will be secured. This security ensures that better
scalability in the data center can be brought in. However, it have been seen that the laws and
legislation of different countries. Following laws and legislation of different counties for
different countries have been one of the major aspect that is considered. Maintaining the laws
and legislation of different countries have been another aspect that is to be considered. This is the
main reason that proper management of the data set is to be performed. This section have been
ensuring that following these laws acts important. It can be concluded that cyber security have
been providing better assessment of the data that are stored in the system.

18
CYBER SECURITY
References
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber deception (pp.
23-50). Springer, Cham.
Bada, M., Sasse, A.M. and Nurse, J.R., 2019. Cyber security awareness campaigns: Why do they
fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection.
Computers in Human Behavior, 48, pp.51-61.
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), pp.1153-
1176.
CYBER SECURITY
References
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber deception (pp.
23-50). Springer, Cham.
Bada, M., Sasse, A.M. and Nurse, J.R., 2019. Cyber security awareness campaigns: Why do they
fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection.
Computers in Human Behavior, 48, pp.51-61.
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2), pp.1153-
1176.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19
CYBER SECURITY
Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), pp.43-62.
de Bruijn, H. and Janssen, M., 2017. Building cybersecurity awareness: The need for evidence-
based framing strategies. Government Information Quarterly, 34(1), pp.1-7.
Dua, S. and Du, X., 2016. Data mining and machine learning in cybersecurity. Auerbach
Publications.
Edgar, T.W. and Manz, D.O., 2017. Research methods for cyber security. Syngress.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision support systems, 86, pp.13-23.
Finnemore, M. and Hollis, D.B., 2016. Constructing norms for global cybersecurity. American
Journal of International Law, 110(3), pp.425-479.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Hemilä, J., Mikkola, M. and Salonen, J., 2019, December. Management of Cyber Security
Threats in the Factories of the Future Supply Chains. In 9th International Conference on
Operations and Supply Chain Management, OSCM 2019.
Kent, A.D., 2016. Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security (pp. 37-65).
Khatoun, R. and Zeadally, S., 2017. Cybersecurity and privacy solutions in smart cities. IEEE
Communications Magazine, 55(3), pp.51-59.
CYBER SECURITY
Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), pp.43-62.
de Bruijn, H. and Janssen, M., 2017. Building cybersecurity awareness: The need for evidence-
based framing strategies. Government Information Quarterly, 34(1), pp.1-7.
Dua, S. and Du, X., 2016. Data mining and machine learning in cybersecurity. Auerbach
Publications.
Edgar, T.W. and Manz, D.O., 2017. Research methods for cyber security. Syngress.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision support systems, 86, pp.13-23.
Finnemore, M. and Hollis, D.B., 2016. Constructing norms for global cybersecurity. American
Journal of International Law, 110(3), pp.425-479.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Hemilä, J., Mikkola, M. and Salonen, J., 2019, December. Management of Cyber Security
Threats in the Factories of the Future Supply Chains. In 9th International Conference on
Operations and Supply Chain Management, OSCM 2019.
Kent, A.D., 2016. Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security (pp. 37-65).
Khatoun, R. and Zeadally, S., 2017. Cybersecurity and privacy solutions in smart cities. IEEE
Communications Magazine, 55(3), pp.51-59.

20
CYBER SECURITY
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Kostopoulos, G., 2017. Cyberspace and cybersecurity. Auerbach Publications.
Lamba, A., Singh, S., Balvinder, S., Dutta, N. and Rela, S., 2017. Mitigating Cyber Security
Threats of Industrial Control Systems (Scada & Dcs). In 3rd International Conference on
Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS–July 2017).
Li, Z., Shahidehpour, M. and Aminifar, F., 2017. Cybersecurity in distributed power
systems. Proceedings of the IEEE, 105(7), pp.1367-1388.
Nazir, S., Patel, S. and Patel, D., 2017. Assessing and augmenting SCADA cyber security: A
survey of techniques. Computers & Security, 70, pp.436-454.
Schatz, D., Bashroush, R. and Wall, J., 2017. Towards a more representative definition of cyber
security. Journal of Digital Forensics, Security and Law, 12(2), pp.53-74.
Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y. and Xiang, Y., 2018. Data-driven
cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2),
pp.1744-1772.
Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M. and Choo, K.K.R., 2019. A systematic
literature review of blockchain cyber security. Digital Communications and Networks.
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75,
pp.547-559.
CYBER SECURITY
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Kostopoulos, G., 2017. Cyberspace and cybersecurity. Auerbach Publications.
Lamba, A., Singh, S., Balvinder, S., Dutta, N. and Rela, S., 2017. Mitigating Cyber Security
Threats of Industrial Control Systems (Scada & Dcs). In 3rd International Conference on
Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS–July 2017).
Li, Z., Shahidehpour, M. and Aminifar, F., 2017. Cybersecurity in distributed power
systems. Proceedings of the IEEE, 105(7), pp.1367-1388.
Nazir, S., Patel, S. and Patel, D., 2017. Assessing and augmenting SCADA cyber security: A
survey of techniques. Computers & Security, 70, pp.436-454.
Schatz, D., Bashroush, R. and Wall, J., 2017. Towards a more representative definition of cyber
security. Journal of Digital Forensics, Security and Law, 12(2), pp.53-74.
Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y. and Xiang, Y., 2018. Data-driven
cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2),
pp.1744-1772.
Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M. and Choo, K.K.R., 2019. A systematic
literature review of blockchain cyber security. Digital Communications and Networks.
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75,
pp.547-559.

21
CYBER SECURITY
Yousefi-Azar, M., Varadharajan, V., Hamey, L. and Tupakula, U., 2017, May. Autoencoder-
based feature learning for cyber security applications. In 2017 International joint conference on
neural networks (IJCNN) (pp. 3854-3861). IEEE.
CYBER SECURITY
Yousefi-Azar, M., Varadharajan, V., Hamey, L. and Tupakula, U., 2017, May. Autoencoder-
based feature learning for cyber security applications. In 2017 International joint conference on
neural networks (IJCNN) (pp. 3854-3861). IEEE.
1 out of 22
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.