0% found this document useful (0 votes)
120 views4 pages

Research Paper

Uploaded by

Maryam Rizwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views4 pages

Research Paper

Uploaded by

Maryam Rizwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

19-028-CE

RESEARCH PAPER

CYBER SECURITY

MARYAM RIZWAN
Student , Dept. of Electrical Engineering , Usman Institute of Technology

Abstract— Cyber Security plays an important role in the


field of information technology. Securing the information Application security is the process of making apps
have become one of the biggest challenges in today’s world. more secure by finding, fixing and enhancing the
When ever we think about cyber security the first thing that security of apps. Much of this happens during the
comes to our mind is cyber crimes that are increasing day development phase , but it includes tools and
by day . The objective of cyber security is to protect methods to protect apps once they are deployed.
programs , applications , networks and data from attack. Application security is important because today’s
In this paper we proposed study of cyber ethics , cyber applications are often available over various
security and its elements and also various security aspects networks and are connect to the cloud increasing
related with cyber security. Cyber incidents emphasize the vulnerabilities to security threats. Different types of
importance of staying up-to-date on global cyber crime Application security include authentication ,
trends , especially concerning the use of mobile phones and authorization , encryption , logging and application
computing devices. security testing.

Keywords— Cyber security , Cyber Crimes , Cyber Ethics ,  Information Security


It protects the privacy of data both in storage and in
Social media.
transit.
I. INTRODUCTION
 Email Security

Email security describes different techniques for


keeping sensitive information in email
communication and accounts secure against
unauthorized access , loss or compromise.

 Mobile device Security

This security refers to the measures taken to protect


sensitive data stored on portable devices. It is also
the ability to prevent unauthorized users from using
mobile devices to access the enterprise network.
Cyber security is the practice of protecting computers ,
servers , mobile devices , electronic systems , networks and data
from malicious attacks. It’s also known as information
 Web Security
technology security or electronic information security. The
cyber security can be divided into few common categories :
Web security is the branch of information security
 Network Security
that deals specifically with security of websites ,
web applications and web services.
Any security designed to protect the usability and
integrity of your network and data. It includes both
hardware and software technologies. It stops others  Wireless Security
from entering or spreading your data.
Wireless security revolves around the concept of
 Application Security securing the wireless network from malicious

Dept. of Electrical Engineering , UIT


19-028-CE
RESEARCH PAPER

attempts and unauthorized access. Typically , information and the data they require. Hence people must take
Wireless security is delivered through wireless appropriate measures especially in dealing with social media in
devices ( usually a wireless router) that secures all order to prevent the loss of their information. The ability of
communication by default. Some of the common individuals to share information with an audience of millions is
algorithms and standards to ensure wireless at the heart of the particular challenge that social media
network security are Wired Equivalent Policy presents to businesses. In addition to giving anyone the power
(WEP) and Wireless Protected Access (WPA). to disseminate commercially sensitive information, social
media also gives the same power to spread false information,
which can be just being as damaging. The rapid spread of false
II.CYBER SECURITY PARAMETERS information through social media is among the emerging risks
The parameters for cyber security are as follows : identified in Global Risks 2013 report. Though social media
can be used for cyber crimes these companies cannot afford to
1. Identify threats stop using social media as it plays an important role in publicity
2. Identify vulnerabilities of a company. Instead, they must have solutions that will notify
3. Access risk explore them of the threat in order to fix it before any real damage is
4. Establish Contingency plan done. However companies should understand this and
5. Respond to cyber security accident recognize the importance of analyzing the information
especially in social conversations and provide appropriate
security solutions in order to stay away from risks. One must
handle social media by using certain policies and right.

IV. CYBER SECURITY TECHNIQUES


 Access control and password security

The concept of user name and password has been


fundamental way of protecting our information.
This may be one of the first measures regarding
cyber security.

 Authentication of data
The documents that we receive must always be
authenticated before downloading that it should be
checked if it has originated from a
trusted and a reliable source and that they are
not altered. Authenticating of these documents
is usually done by the anti virus software present in
Fig. Parameters of cyber security
the devices. Thus a good anti virus software is also
III. ROLE OF SOCIAL MEDIA IN CYBER essential to protect the devices from viruses.
SECURITY
Social media plays a huge role in cyber security and will  Malware Scanners
contribute a lot to personal cyber threats. Since Social media or
Social networking sites are almost used by most of them This is a software that usually scans all the files
everyday it has become a has become a huge platform for the and documents present in the system for
cyber criminals for hacking private information and stealing malicious code or harmful viruses. Viruses,
valuable data. worms, and Trojan horses are examples of
malicious software that are often grouped
In a world where we’re quick to give up our personal
together and referred to as malware.
information, companies have to ensure they’re just as quick in
identifying threats, responding in real time, and avoiding a
breach of any kind. Since people are easily attracted by these  Anti-virus Software
social media the hackers use them as a bait to get the

Dept. of Electrical Engineering , UIT


19-028-CE
RESEARCH PAPER

Antivirus software is a computer program that f. Backdoor Attacks


detects, prevents, and takes action to disarm or
remove malicious software programs, such as These attacks are used to bypasses normal authentication to
viruses and worms. Most antivirus programs allow remote access. These attacks are added in software by
include an auto-update feature that enables the design. They are added in the Programs or created by altering
program to download profiles of new viruses so that an existing program. Backdoors is less common types.
it can check for the new viruses as soon as they are g. Botnet attacks
discovered. An antivirus software is a must and
basic necessity for every system. These attacks are hijackers. They are computers that are
controlled remotely by one or more malicious actors. Attackers
V. SECURITY ATTACKS AND TYPES use botnets for malicious activity, or rent the botnet to perform
malicious activity for others. Millions of computers can be
Security Attack is any action that compromises the security of caught in a botnet’s snare.
information owned by an organization using any process that
designed to detect. There are several types of attacks, but most In 2015 McAfee reported that these attacks are detected and
common security attacks are described below: percentages of their attack are shown with the help of table.
a. Denial of Service Attacks
These attacks are mainly used to unavailable some resources
Table. Percentages of Various Attacks
like a web server to users. These attacks are very common
today. They used overload to resource with illegitimate Name of Attacks Percentage of Attack
requests for service. The resource cannot process the flood of
requests and either slows or crashes. Denial of service attacks 37%
Brute force attacks 25%

b. Brute Force Attacks Browser attacks 9%

These attacks try to kick down the front door. It’s a trial- Shellshock attacks 7%
anderror attempt to guess a system’s password. One in four
SSL attacks 6%
network attacks is a brute-force attempt. This attack used
automated software to guess hundreds or thousands of Backdoor attacks 2%
password combinations.
Botnet attacks 2%
c. Browser Attacks
VI. CYBER ETHICS
These attacks target end users who are browsing the internet. Cyber ethics are nothing but the code of the Internet. When we practice
The attacks may encourage them to unwittingly download these cyber ethics there are good chances of us using the internet in a
malware. These attacks used fake software update or proper and safer way. The below are a few of them :
application. Websites are also force to download malwares.  DO use the Internet to communicate and interact with
The best ways to avoid browser-based network attacks is to other people.
regularly update web browsers.  Don’t be a bully on the Internet. Don’t call people
names , lie about them , send embarrassing pictures
d. Shellshock Attacks of them or don’t try anything else to hurt them.
These attacks are refers to vulnerabilities found in Bash, a  Don’t operate others accounts using their
common command-line shell for Linux and UNIX systems. passwords.
Since many systems are never updated, the vulnerabilities are  Never try to send any kind of malware to other’s
still present across the Web. The problem is so widespread that systems and make them corrupt.
Shellshock is the target of all networks.  Never share your personal information to anyone as
there is a good chance of others misusing it and
e. SSL Attack finally you would end up in a trouble.
These attacks are intercept data that is sent over an encrypted  Internet is considered as world’s largest library with
connection. These attacks successfully access to the information on any topic in any subject area, so
unencrypted information. These attacks are also very common using this information in a correct and legal way is
today. always essential.

Dept. of Electrical Engineering , UIT


19-028-CE
RESEARCH PAPER

 Always adhere to copyrighted information and


download games or videos only if they are
permissible.
The above are a few cyber ethics one must follow while using
the internet. We are always thought proper rules from out very
early stages the same here we apply in cyber space.

VII. CONCLUSION
Computer security is a vast topic that is becoming more
important because the world is becoming highly
interconnected, with networks being used to carry out critical
transactions. Cyber crime continues to diverge down different
paths with each New Year that passes and so does the security
of the information. The latest and disruptive technologies,
along with the new cyber tools and threats that come to light
each day, are challenging organizations with not only how
they secure their infrastructure, but how they require new
platforms and intelligence to do so. There is no perfect
solution for cyber crimes but we should try our level best to
minimize them in order to have a safe and secure future in
cyber space.

VII. REFERENCES
1. (https://www.researchgate.net/publication/322
852405_Cyber-
Security_Incidents_A_Review_Cases_in_Cyb
er-Physical_Systems, n.d.)
2. (https://www.researchgate.net/publication/283
967866_Cyber-Attacks_-
_Trends_Patterns_and_Security_Countermeas
ures, n.d.)
3. (https://arxiv.org/ftp/arxiv/papers/1402/1402.
1842, n.d.)
4. (https://www.academia.edu/Documents/in/Cy
ber_Security, n.d.)
5. (https://www.researchgate.net/publication/321
528686_A_Recent_Study_over_Cyber_Securi
ty_and_its_Elements, n.d.)
6. (https://www.sciencedirect.com/topics/compu
ter-science/cyber-security-research, n.d.)
7. (https://www.researchgate.net/publication/260
126665_A_Study_Of_Cyber_Security_Challe
nges_And_Its_Emerging_Trends_On_Latest_
Technologies, n.d.)
8. (https://www.kaspersky.com/resource-
center/definitions/what-is-cyber-security, n.d.)

Dept. of Electrical Engineering , UIT

You might also like