Cyber Security: An Analysis of Threats, Risks, and Solutions

Verified

Added on  2021/11/05

|9
|2867
|2114
Essay
AI Summary
This essay provides a comprehensive overview of cyber security, defining it as the protection of computer systems and networks. It explores the growing importance of cyber security due to increased reliance on wireless devices and the challenges of protecting consumer data from malicious attacks. The essay delves into the key aspects of cyber security, including people, processes, and technology, emphasizing the role of processes in mitigating cyber threats. It examines the various elements of cyber security, such as network, application, and data security, and discusses the common security threats like denial of service attacks, malware, and ransomware. The essay highlights the importance of technologies like one-time passwords, cryptography, and encryption in enhancing data security. It also explores the limitations of cyber security and presents solutions such as encryption, robust techniques, and firewall software to enhance data protection and improve the overall security posture of computer networks.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY
1
Cyber Security
A cybersecurity is defined as a protection of internet system involving
hardware's, software, and other computer networks. The use of cyber security is
growing very fast due to increasing computer system and devices and it is observed that
most of users use wireless devices for communication purpose that are very less secure
(Abawajy, 2014). Security of consumer’s data is one of the major challenges in this
modern generation because hackers use complex malicious software to block the user’s
mobile networks. The main aim of this research essay is to understand the concept of
cyber security and analysis limitation of the cyber security system. There are main three
aspects of cyber security such as people, process, and technology. Processes are the
main key factors to implement an effective cyber security and most of the organizations
used this type of strategy to reduce cyber threats and attacks. This essay is explaining
the concept of cyber security, key factors that influence security threats and risks, and
limitations of cyber security.
Cyber security plays a significant role in the field of computer networks because
most organizations collects and process a large amount of data on computers and other
peripheral devices. an organization transmit data and relevant information from one
location to another by using wireless networks and hackers use malware software to
hack all personal information of any user. In the year 2016 around 2 million people
have faced the problem of cyber-attack in which attackers produce a large number of
traffic signals and transferred to the consumer personal accounts (Abomhara, & Køien,
2015).
There are various elements of cyber security, for example, network security,
application security, endpoint security, data security, cloud security, and mobile
security. The major challenge faced by the cyber security addresses the security related
threats and vulnerabilities. Most organizations and communities focus on their personal
details and they adopted advanced computer networks and devices to protect data from
attackers. According to recent survey it is identified that lack of security is very common
problem because consumers use unauthentic servers and websites which are developed
by the hackers (Baig, et al., 2017) Cybersecurity is one of the most important methods
to protect human private data and it has the ability to detect the cyber threats and
Document Page
CYBER SECURITY
2
issues. Most of the information was hacked during the sharing process because hackers
detect the location of the user by using botnet and flooding process.
For which information and communication technology developed advanced
protection systems such as one-time password, cryptography, and encryption
techniques. There are many authors researched on this topic and they identified that
people and employees use unauthentic websites and they use simple passwords which
can be easily detected by attackers. There are main three security threats occur in the
computer networks such as denial of service attack, malicious attack and ransomware.
Bertino, (2016) described a onetime password technique to protect the human personal
details which are a part of cyber security. In which a pin number are transferred to the
users registered mobile numbers which are used only one time and it is observed that
this technique can reduce the issue of hacking or data breaching.
Every transaction a new pin number produced by computer algorithm and users
receive new password every time that improve the security of data. Malware attack is
very common cyber threats which occur due to lack of security and hackers attacks on
the user’s computer networks. In which hacker generate a complex algorithm and after
that, they identify the IP address of the user peripheral device. Generally, they block the
computer devices and encrypt the user’s personal information after that they demand
money to restore back their details. In the year 2013, the European Union developed a
cyber security strategy that is an open safe and secure cyberspace. This strategy
reduces the cybercrimes and other security-related issues and it is studied that
consumers use third-party application which are developed by malicious software that
records the private information of consumers (Boulos, Sargolzaei, Ziaei, & Sargolzaei,
2016).
The cyber security or information security is a kind of process that protects
user’s peripheral devices such as mobile phones, computer system and networks. Today
many organization use information security system that protects employees personal
details and it also identifies the threats and issues faced by the cyber security. There are
main two technologies used in cyber security such as authentication, and cryptography.
The network security is used to protect the computer networks from malware attacks
Document Page
CYBER SECURITY
3
and an effective network security approach addresses the threats or issues by detecting
the unwanted signals from the network.
There are many steps involve into the network security process such as
antivirus, firewall software that block the unauthorised signals, and intrusion
prevention system that detect the fast spreading risks, for example, zero-hour attacks
and virtual private network that provide security to wireless devices.
For the reduction of security threats and issues in cybersecurity information and
communication implemented various methodologies and steps such as one-time
password, encryption, cryptography, and robust technique. It is analysed that if any
organization adopt all these methods than they can improve the security and
performance of their computer networks (Carr, 2016). One time password is a very
popular step which is used by many banking industries, organization, and other
government communities. In which a unique OTP is generated by the IT sector and
transferred to the user’s registered mobile numbers.
It is valid only for one time after that users are not able to apply again with the
same OTP and it reduced the problem of hacking and improves the efficiency of the
mobile banking and other. After that modern antivirus software developed by the
information technology that is a firewall and it has the ability to detect the spam emails
and malware signals. If any person uses firewall and antivirus in their computer system
then they can address malicious attack and DOS attack. Cryptography is an advanced
technology which is used by many banking industries and other online retailer
communities (De Bruijn, & Janssen, 2017). This technique provides a platform to secure
the information and communication system between two or more people. There are
many applications of cryptography technique for example e-commerce, digital
currencies, computer passwords, and military communication. With the help of
cryptography and encryption people can improve the security of their personal data
and most of the organizations implementing these methods to avoid the problem of
denial of service attack, and other malware attacks.
The relevant data and information are collected from various resources such as
journal articles, online websites and books. In this investigation, secondary research
approach will be used and a literature review will be conducted to improve the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY
4
effectiveness of the research. The researchers, writers and experts will collect data
about cyber security and a survey will be produced to gather all relevant information
and their views on the topic of cyber security (Holm, Shahzad, Buschle, & Ekstedt,
2015).
There are numbers of authors that provided their views and journal paper on the
topic of cyber security and they observed that consumers share their data or
information from one location to another by using wireless networks and Social Media
that can be easily hacked. Jang-Jaccard, Nepal, (2014) provided the overview of cyber
security threats and challenges and also analysed the basic problems that occur during
communication. According to this journal, there are many kinds of security threats
occur in the computer and mobile networks, for example, denial of service attack,
configuration conflict, ransom ware evolution, and block chain revolution, spyware
threats, hackers and predators, phishing, DDOS attack and infiltrate.
According to Kruse, Frederick, Jacobson, & Monticone, (2017) security of
information is the very crucial point in this modern generation because consumers
share their data from one location to another by using their party applications which
are developed by the malicious software. There are many similarities between the
journal paper produced by Kruse, Frederick, Jacobson, & Monticone, (2017) and Luna,
Rhine, Myhra, Sullivan, & Kruse, (2016) both explained the concept of cyber security,
used a mixed method to gather the information about research topic, provided different
types of challenges faced by cyber security, and prevention methods or processes to
improve the security of data. The main difference between these papers is that Kruse,
Frederick, Jacobson, & Monticone, (2017) provided the OTP and cryptography
techniques for the prevention of data breach but Luna, Rhine, Myhra, Sullivan, & Kruse,
(2016) provided many other techniques such as antivirus, firewall, encryption and
cryptography.
In the year 2015, the United State developed many strategies and methods to
address the security-related issues and established a cyber-security act to protect the
country from cyber threats and attacks. In this act, the relevant information about the
treat identified on a system may be transferred with the aim of addressing the attacks.
With the help of this strategy, the U.S. government reduce the problem of cybercrimes
Document Page
CYBER SECURITY
5
by 30% (Roman, Lopez, & Mambo, 2018). It is implicated that most of the users log in
their personal accounts in another computer system by which they lose their privacy
and hackers detect the IP address of their peripheral devices. If consumers adopt the
security programmes and techniques then they can secure their private details. They
can use modern communication system like the internet of thing and cloud computing
to protect data and it is estimated that around 2 million people are suffering from the
issue of cyber-attacks.
There are many limitations of cyber security such as data conflict, cannot be used
for a large computer network, used for identifying the security threats, firewall process
is very complex to configure properly, make the system slower as compare to before,
very costly and complex to design. Due to their limitation, this is not much popular and
information technology provided advanced technique like cryptography and robust
technology to handle the problem of malicious attack. There are few advantages of
cyber security such as protects the system by viruses and unwanted programs, protects
the computer devices from hacking, and provide privacy to users.
There are main three solution and processes to enhance cyber security such as
encryption, robust technique and firewall software. Encryption is a very popular
technology which is used by many organizations to secure employees personal
information’s. In this technique, the information converts into a form of code which
cannot be easily read by the hackers after that this code transfer from one person to
another. At the receiver end decryption process is used that convert this code into
original form and receiver will get proper information. Recent studies show that many
hackers send spam emails to the users after that users click on fraud links by which they
receive the information of user computer devices (Sandberg, Amin, & Johansson, 2015).
To reduce this kind of problem information technology developed a process that is
robust by which problem of hacking can be reduced. These techniques identified the
spam and unwanted signals from the computer and block the malicious traffic signals.
Another technique is firewall software that is a very common step to address security
threats and risks. Firewall work as an antivirus that detects the traffic signals and
malware attack from the computer and provide a notification on the screen of the
computer by which users can safe their private information (Tweneboah-Koduah,
Skouby, & Tadayoni, 2017). If any person uses all these processes then they can safe
Document Page
CYBER SECURITY
6
their personal data like bank details, debit and credit card and other account
information.
This essay is completely based on cyber security threats and challenges and with
the help of this research reader can enhance their knowledge in the area of cybercrimes.
In the last few years, the use of information technology has increased due to which
numbers of security issues and attacks also occurred. This essay described the role of
cyber security in the field of computer science and how this technique protects human
personal data from hackers. There are few limitations and disadvantages of cyber
security which are described in this essay and it is identified that many business
industries and government communities are facing the issue of hacking and data breach
because hackers attack their authentic servers and block their communication system.
People should ensure that they use only authorized servers and security system by
which they can reduce the issue of malicious attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY
7
References
Abawajy, J. (2014). User preference for cyber security awareness delivery methods.
Behaviour & Information Technology, 33(3), 237-248.
Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), 65-
88.
Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., ... & Syed, N.
(2017). Future challenges for smart cities: Cyber-security and digital
forensics. Digital Investigation, 22, 3-13.
Bertino, E. (2016). Security threats: protecting the new cyberfrontier. Computer, (6), 11-
14.
Boulos, P., Sargolzaei, A., Ziaei, A., & Sargolzaei, S. (2016). Pacemakers: a survey on
development history, cyber-security threats and countermeasures. Int. J. Innov.
Stud. Sci. Eng. Technol, 2(8), 12-14.
Carr, M. (2016). Public-private partnerships in national cyber-security strategies.
International Affairs, 92(1), 43-62.
De Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for
evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7.
Holm, H., Shahzad, K., Buschle, M., & Ekstedt, M. (2015). P $^{2} $ CySeMoL: Predictive,
Probabilistic Cyber Security Modeling Language. IEEE Transactions on
Dependable and Secure Computing, 12(6), 626-639.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in
cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993.
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in
healthcare: A systematic review of modern threats and trends. Technology and
Health Care, 25(1), 1-10.
Document Page
CYBER SECURITY
8
Luna, R., Rhine, E., Myhra, M., Sullivan, R., & Kruse, C. S. (2016). Cyber threats to health
information systems: A systematic review. Technology and Health Care, 24(1), 1-
9.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey
and analysis of security threats and challenges. Future Generation Computer
Systems, 78, 680-698.
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked
control systems: An introduction to the issue. IEEE Control Systems, 35(1), 20-23.
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to
IoT applications and service domains. Wireless Personal Communications, 95(1),
169-185.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]