Cyber the most problematic elements of cybersecurity
CyberSecurity: Is it safe?One of the most problematic elements of cybersecurity is thequickly and constantly evolving nature of security risks. Rouse, M. (2016,May 11).
cybersecurity. Retrieved fromhttp://whatis.techtarget.com/definition/cybersecurity The traditional approach has been toconcentrate most assets on the most urgent framework parts and ensure againstthe greatest known dangers, which required abandoning some less imperativeframework segments undefended and some less unsafe dangers not secured against.
Such an approach is insufficient in the current environment. Adam Vincent,CTO-public sector at Layer 7 Technologies (a security services provider tofederal agencies including Defense Department organizations), describes theproblem as “to deal with the current environment, advisory organizations arepromoting a more proactive and adaptive approach”. The National Institute ofStandards and Technology (NIST), for example, recently issued updatedguidelines in its risk assessment framework that recommended a shift toward continuousmonitoring and real-time assessments. Cybersecurity isthe body of technologies, processes and practices designed to protect networks,computers, programs and data from attack, damage or on the other hand unapprovedaccess. Cybersecurity investigators help avert assaults through their aptitudeand learning of databases, systems, equipment, firewalls and encryption. Theykeep PC frameworks running smoothly, prevent the theft of financial andpersonal information, and block intruders from accessing and divulging proprietarydata.The main issue with the online web especially at this dayand age when technology is rapidly improving, is the question whether is itsafe? This is the issue that will be investigated to check and ensure how safeis the internet with the introduction of cyber security. There has been a riskof cyber hacking where an unknown individual infiltrates your technologicaldevice and gains control and access to personal and sensitive information.
Hencethe introduction of cyber security, a form of barrier that can stop or at leastmake the life of hackers more difficult was put in place. However the questionarises asking how well does cyber security fare against this hackers astechnology and people are getting smarter as each day passes. This are theproblems that will be answered.This problem has been faced ever since the technological erabegun. This allowed individuals to gain access to personal information thatpeople store in their computer or phones. Not only that, this information canbe used for monetary gain or can be used to ruin someone’s life. This problemwas initially said to be resolved by cyber security but after some time thehackers have found a way pass cyber security and are still capable ofinfiltrating your computer or phone the internet, online downloads or evenuploads.
This problem is a very intriguing issue as there are many perspectivesthat can be addressed. The perspective that will be addressed is whether cybersecurity is safe and whether it can prevent hackers from gaining informationthrough infiltrating someone’s computer or phone. Cyber security has raised alot of questions from the public such as whether it is effective or just adelay for hackers instead of a prevention. Not only that, cyber security hasalso been theorized as a way for the government to keep track of the publicsantics and activities. A vast majority of the society feels that cyber securitywas introduced to allow the government to keep track of transactions andcommunication between individuals to prevent any outbreak or rebelliousness bythe public. In this study all this questions shall be answered as this study isbeing conducted to answer the question of whether cyber security is safe or isit just a scam. MethodologyThis research will be studying howeffective cyber security is in this modern day and age where the risk of cyberattacks is at and all time high and personal information of individuals can beaccessed from anyone at anytime from anywhere. This research will have a surveyform given to random individuals of both genders(male and female) between theages of 18 to 25.
This survey form is filled with a series of question that willprovide the research with adequate information from a sample size of 100 to 150individuals that are studying in Sunway College. This research chose SunwayCollege students because they are IT savvy students that have experience withtechnology as does the real world during this era. This will allow us to get arealistic view on how effective is cyber security in this modern day and age. This research will be usingquantitative methods to obtain the information required to make support myhypothesis on this topic which is cyber security is effective and are reducingthe cyber attacks drastically. Quantitative method will be used for thisresearch as the statistics of the amount of people that have the cyber securitysoftware will be placed in a graph against the amount of people that have beenhacked. This will show the relationship on how effective cyber security isagainst cyber attacks. This research will have to collectdata on the individuals personal experience with cyber security and how itreduces the possible cyber attacks from hackers.
This will be done by a surveythat will be given to random individuals of mixed genders between the age of 18to 25. The survey will have a series of questions that will give the researchthe adequate amount of information needed to form a conclusion. Example of thesurvey is :The data for this research will be analyzedby a graph that will compare and contrast the amount of individuals that havecyber security software against the amount of people that have faced cyberattacks before. This will show the relationship whether cyber security actuallyhelps against cyber attacks. This will also help the research form a conclusionfor this topic on cyber security.
This research will figure out howeffective is cyber security against cyber attacks. This will prove important asthis will allow us to improve our cyber security software to deal with threatssuch as cyber attacks. This research will also allow us to understand the riskof cyber attacks and how hackers can infiltrate personal information of anyindividual and anytime and place without any problems. These are the questionsthis research will solve. References (Wolters, 2017) Singer, P. W. (2014).
Cybersecurity and Cyberwar. Wolters, P. T. (2017). The security of personal data under the GDPR: a harmonized duty or a shared responsibility? . nternational Data Privacy Law, Volume 7, Issue 3,, 165-178. Findings andDiscussions This chapter of the research paperwill show the results of the study and further discussion based on the study.
To start off, we will read the overall data received from the findings throughstatistical calculations and will then look into the research questions thestudy wants to answer. The goal of the survey was to gain knowledge about cybersecurity to answer the question whether it is safe and also to answer how safeis it. Through the survey method used these questions were answered.
Quantitative analysis was used toidentify and study the percentages to answer the questions in the survey. Allparticipants answered all the questions put forth therefore all questions willbe deduced and analyzed in a percentage based chart to help understand theresults better.A total of 87 surveys were handed outbut only 50 will be used for this study. The selected forms met the requiredhypothesis previously mentioned which is ,is cyber security safe?.
Thisrepresents 57.5% of the expected population. Thus, the response rate issuccessful. A total 12 surveys were not fullycompleted therefore they were disregarded from the study.
Furthermore, 15surveys were omitted as the participants did not answer the questions withadequate answers. The survey form contained 10questions that were separated into 3 sections. The first section was to knowthe participants age and whether or not the participant understood the topic.The second section was to get the participants opinion on the topic of study.
Lastly, the third section was to see whether the participants did what wasrequired to do to allow the cyber security software to run efficiently.For the first section participantswere required to state their age, how often do they use technological devices,have they ever been connected to public or open wi-fi and have they encounteredsuch cases such as hacking of social media accounts or virus implants to theirdevice. All participants responded to these questions. 30 participants were inthe age group of 18 to 19 years old (78.5%) and made up the majority of the samplewhereas 21.3% was above the majority age group with ages ranging from 20 to 25years old. In response to what participantsopinions were based on cyber security and how they felt towards to ever growing technological side ofthings, majority of participants did not feel threatened by the pace technologywas growing at whereas 30 % of participants felt threatened by the fact thatpersonal information could be leaked at any moment by anyone at anytime.
” Cybersecurity is concerned with the study ofprotection of information — stored and processed by computer-based systems —that is vulnerable to unintended exposure and misuse.” (Tyler Moore, 2016). For the third section theparticipants were asked if they had the required software and took the requiredprecautionary steps to allow the cyber security software to run efficiently andkeep the device safe from cyber attacks. The first thing required to preventcyber attacks is to have an anti virus software in their device to help stop orget rid of virus implants or cyber attacks that may occur. 70% of participantshave anti virus software in their device whereas 30% of the participants eitherdid not know how to get an anti virus software in their device or were just lazyto download an anti virus software.
Furthermore, the participants wereasked if they run regular virus scans on their device. This ensures there areno dormant viruses in their device and the software can run withoutinterruptions. Majority of the participants ran regular virus checks whereas42.5% of the participants did not run regular virus checks as they felt it wastoo much work. Regular virus checks has to be made to ensure that the antivirus program may do its job by stopping virus attacks. Lastly, the participants were askedif their antivirus systems had ever failed them before. For example, as theparticipant was browsing the internet their computer gets implanted with avirus that was caused by a pop up. Majority of the participants stated thattheir antivirus systems is yet to fail them, with the minority of 2% statingthat their antivirus software has not detected a virus that stayed dormant inthe devices mainframe.
As majority suggest cyber security which can also becalled antivirus software is effective against cyber attacks or virus.To answer the research questions,which are how effective is cyber security against cyber attacks and the risk ofcyber attacks and how hackers can infiltrate personal information. To answerthe first, as shown by these findings and discussions it proves that cybersecurity is extremely effective against cyber attacks as it shows that 98% ofthe participants did not suffer from cyber attacks due to their cyber securitysoftware.
In addition to that, this study also shows us that hackers can usepop ups from websites and illegitimate downloading to infiltrate our personaldevices to gain personal information but this can be overcome as antivirussoftware also known as cyber security will notify us and clear the device ofthis hackers and their viruses.Literature ReviewThis section of this research paperwill discuss a general overview of past papers that studied Cyber Security andits safety and efficiency. While considering the nature of this paper, a totalof eight past research papers have been used as reference for this study.
However, in this section, only five research papers will be reviewed, andopinions and suggestions will be commented on regarding the quality of thearticle. English on Antivirus SoftwareThe first research paper used was apaper written by Hisyam Syarif. In this paper, the aim was to understand thesoftware on the computer, especially in discussing about the antivirus is veryimportant to protect the computer. The benefits in this paper are knowing theantivirus software on the computer and whether it is effective and efficient.Antivirus is a type of software used to detect existing viruses on the computersystem. Antivirus software also known as virus protection software. With thissoftware we can find out whether a computer system is exposed to a virus ornot. In general, this software runs in the background or the background, andalso perform a scan of all files that are accessed.
In today’s antivirusProgress has been transformed and has many uses associated with the virus. Butalso the computer’s performance. The virus code also usually always updated bythe antivirus developer.
So the computer is ensured its empowering. Even by newviruses though. Other uses of the antivirus is detecting or scanning the dataon a computer as a whole.
Furthermore, the data is processed and sorted whenthere is a virus or a file in which if harmful, then the antivirus will give asignal to the user.Based on the results ofthe issue of antivirus discussed, the writer took the conclusion that we asuser / users to be more aware of the software, and the problems on thecomputer, especially the antivirus software because it is an important role toprotect. On completion of this paper the writer concluded that the bestantivirus is, Bit defender Antivirus plus Anti-Virus is an antivirus that isnumber 1 in the world. Excellent prowess in dealing with viruses that are verydifficult to destroy. AntiVirus that leads to a user who has a problem on thePC in case of a virus.. Benefits antivirus on your computer are, preventviruses and spyware attacks, both attacks through the internet or throughremovable media such as flash or memory card. In this research paper, the varioussources of references used for the study were listed.
Overall, the paper waswell organised and easy to understand. The researcher reflected back on passstudies and improved on the limitations of other researches, improving theirexperiment in the process. A Privacy-Preserving Approach forCollecting Evidence in Forensic InvestigationThis paper was written by Shuhui Hou, Siu-Ming Yiu, Tetsutaro Uehara and Ryoichi Sasakis.
Computer-related and cyber crimes arebecoming rampant and caused a lot of damages to business, the public and thegovernments. Collecting digital evidence from storage device(s) is a crucialstep in the investigation phase. However, with the development of computingtechnology (e.g., cloud system), evidence collection techniques developed forsingle PC or small-scale systems such as cloning the harddisks becomeinfeasible as potential evidence may be distributed on a large number ofservers. Moreover, the privay issue is another major concern.
The servers underinvestigation may store data from thousands or even more irrelevant users. Theinvestigator may have no rights to access the irrelevant data, in particular,some of them may involve confidential information. A trivial solution is to askthe server administrator to retrieve only the data relevant to the crime (orthe suspect) and hand this to the investigator. This simple solution also maynot work since the investigator may not want the administrator to know what heis looking for due to specific nature of the crimes. This motivates us to studythe problem of how to efficiently retrieve relevant data (i,e., evidential data)from a huge amount of data while preserving the privacy of irrelevant users.
In this paper, we assume that theserver administrator is willing to cooperate, search the relevant data, andreturn all located data to the investigator whenever a warrant is provided. Weaim at solutions that can satisfy the following requirements.(1)Privacy – Theinvestigator cannot learn anything related to the irrelevant data stored in thedevices.(2)Confidentiality – Theserver administrator who performs the search does not know what theinvestigator is looking for.
(3)Integrity andauthenticity – The integrity and authenticity of the data need to beguaranteed.(4)Efficiency – Thesolutions must be reasonably fast.(5) Multiple investigators – There are more and more cases thatinvolve multiple investigators.
The solution must be extendable to handlemultiple investigators efficiently.This papers results and data werevery organized and easy to understand. This paper had a logical andprofessional idea on how cyber security can be use for privacy preserving inthe context of collecting evidence for forensic investigations. The SecurityImplications Of the Internet of ThingsThis paper was written by Dr. Chris Rose, a consultant with Rosenco, Inc., Florida.
The major problem we face with the IoT (Internet of Things) is thatcomputing is now embedded into the hardware itself and although these embedded systems have multiple vulnerabilities there is no good method of patching them. The embedded system market ismuch different from the computer market. An embedded system is typicallypowered by a special type of computer chip made by companies, such as Broadcomor Marvel, they are cheap and have very little profit. Since everything is now getting connected to the Internet, this creates an additional security risk for society as a whole. As infrastructure, such as dams andpower plants and as governments, cities, houses and cars get connected there isan increasing risk of a catastrophe.
Weare reaching the point where our systems are getting too big to fail, buteventually they will.This paper was very well made as ithad everything a research paper should have and it was very organized, neat andwell done. This paper was easy to read and easy to use to assist me in myresearch paper. Cybercrime,Hacking and LegislationThis paper was written by Kimberly Pavlik of WaldenUniversity, USA. With increased social networking and the ability to make moreonline purchases, personal information is required in order to utilize these sites.
Personal and private information, such as bank account numbers and credit cards numbers, are linked through individual profiles created by users. Credit card information is stored forpurchases and personal data remains saved within the user’s online account.Consumers assume that their personal information is stored securely when shoppingonline on sites such as Amazon, or interacting on social media sites like Facebook (FB).What consumers fail to realize is that every time they conduct a search online, they are compromising their own privacy if they do notactivate their user settings on social networking sites. As technology continues to evolve around the globe,people should be concerned with the type of information they post on social media and networking sites. Individuals should remain vigilant in an effort to secure their personal information online in order toreduce the chance of being hacked and a victim of criminal activity. It is apparentthat securing personal information, while accessing online social networkingsites, has become a challenge for many users (Henson, Reyns, Fisher, 2011).
Therefore, this article explains what a hacker is and gives an overview of theevolution of cybercrime, and its influence on current legislation. Cyber Security andMobile Threats: The Need for Antivirus Applications for Smart PhonesThis paper was written by Jorja Wright, Maurice EDawson Jr. and Marwan Omar to explain the need for antivirus for smart phonesto ensure its safety of data. Currently,smartphones are the preferred device for web browsing, emailing, using social media andmaking purchases. Unfortunately, thepopularity of smartphones is a breeding ground for cyber attackers. Operatingsystems on smartphones do not contain security software to protect data.
Forexample, traditional security software found in personal computers(PCs), such as firewalls, antivirus, and encryption, is not currently availablein smartphones (Ruggiero, 2011). Cyber attackers can use this gap in securityto their advantage. Thus, this illustratesthe importanceof having a security policy for mobile phones. This paper is very well organized butdoes not follow the format of a research paper as it is missing multiplestages of a research paper and it also lacks proper citations. This research paper is a well donepaper but lacks proper explaining of how its findings and results were found.Yet this paper answered the questions I had regarding this study and assistedme in my research paper.