0% found this document useful (0 votes)
19 views

Quantum Computing paper PDF.pdf (2)

Uploaded by

jishnua970
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Quantum Computing paper PDF.pdf (2)

Uploaded by

jishnua970
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CYBER SECURITY AND

JISHNU A
CYBER CRIMES
VISHNU R
PRAMOD B
PRASHANTH M
Department of Computer
science East West College of
Engineering, Bengaluru.

Abstract— research Cyber Security accepts a vigorous role in the area of information technology. 1.1 purpose
Safeguarding the information has become an enormous problem in the current day. The cybersecurity the
main thing that originates in mind is 'cyber crimes' which are aggregate colossally daily. Different The paper provides information about cyber security and cyber terrorism. It covers various information about these
governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other topics in its subsections. Trends of cybersecurity and the role of social media in cybersecurity define in this paper.
than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases The paper provides some necessary information about cyber terrorism. The components of “cyber terrorism” and
the consequences of this terrorism also explain in this paper. There are some examples of case studies those related
on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of to cybersecurity. The paper also provides some solutions regarding cyber security and cyber terrorism. It provides
cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in the some techniques for preventing cyber terrorism. The future study and scope of cybersecurity define in it.
region of organizations. The paper also explains the components of cyber terrorism and motivation of it. Cybersecurity has become a major concern over the last 10 year in the IT world. In the present world, everybody is
Two case studies related to cybersecurity also provide in this paper. Some solution about cyber security facing a lot of problems with cybercrime. As hackers are hacking major sensitive information from government and
and cyber terrorism also explain in it. Keywords: Cybersecurity; cyberspace; cyber terrorism; Information some enterprise organizations the individuals are very much worried as cybersecurity assault can bring about
security everything from wholesale fraud, to blackmail big companies. They are many varieties of cyber-crimes emerging
where everyone

Entanglemen needs to be aware of the scams and they are different measures and tools which can be used for avoiding the cyber-crimes.

Keywords: Cybersecurity; cyberspace; cyber terrorism; Information security. Every organization wants to secure their confidential data from getting hacked. Getting hacked is not just about losing the confidential

data but losing the relationship with customers in the market (Bendovschi, 2015). The Internet is today's fastest growing infrastructure.

In today's technical environment many new technologies are changing mankind. But due to these emerging technologies, we are unable to

protect our private information in an efficient way, so the cyber-crimes are drastically increasing on daily basis. Majority of the

transactions both commercial and personal are done using the means online transaction, so it is important to have an expertise who

require a high quality of security maintaining a better transparency to everyone and having safer transactions. So cybersecurity is the

1 . I NTRODUCTION latest issue. Advanced technologies like cloud services, mobiles, E-commerce, internet banking and many more they require a high

standards and safer process of security. All the tools and technologies involved for these transactions hold the most sensitive and

Today an individual can receive and send any information cruicial user information. So providing the necessary security to them is very important. Improving the cybersecurity and safeguarding

may be video, or an email or only through the click of a the sensitive data and infrastructures are important to every countries top priority security (Panchanatham, 2015)

button but did s/he ever ponder how safe this 1.2 Trends of Cyber Security
information transmitted to another individual strongly
with no spillage of data? The proper response lies in Cyber Security assumes a critical role in the area of data
cybersecurity. Today more than 61% of full industry technology. Safeguarding the data have become the greatest
exchanges are done on the internet, so this area difficulty in the current day. The cybersecurity the main thing
prerequisite high quality of security for direct and best that raids a chord is cybercrimes which are increasing
exchanges. Thus, cybersecurity has become a most tremendously step by step (Samuel, & Osman, 2014).
recent issue (Dervojeda, et. all., 2014). The extent of Different administrations and organizations are taking many
cybersecurity does not merely restrict to verifying the measures to keep these cybercrimes. Additional the
data in IT industry yet also to different fields like different measures cybersecurity is as yet an enormous
cyberspace and so forth. Improving cybersecurity and worry to numerous. Some main trends that are changing
ensuring that necessary data systems are vital to each cybersecurity
country's security and financial prosperity 1.3 Web servers
The risk of assaults on web applications to separate
information or to circulate malicious code perseveres.
Cybercriminals convey their code using good web
servers they have traded off. In any case, information
taking attacks, a considerable lot of which get the
deliberation of media, are also a significant risk.
Currently, individuals need a more unusual
accentuation on securing web servers
A web server is a computer system and software that stores and delivers web content to users over the

internet. When a user visits a website, their browser requests the web page's contents from the web

While Creating the Internet safer (and safeguarding Internet clients) has become to be essential to the server, which then sends the requested web pages back to the user.
improvement of new management just as a legislative strategy. The encounter against cybercrime needs an
extensive and more secure practice (Gross, Canetti & Vashdi, 2017). The particular estimates alone cannot
keep any crime; it is essential that law authorization offices are allowable to investigation and indict
Web servers can perform a number of functions, including:
cybercrime efficiently. Nowadays numerous countries and administrations are compelling strict rules on
Storing and protecting website data
cyber safeties to keep the loss of some vital data. Each should be equipped on this cybersecurity and save
themselves from these increasing cybercrimes. Cyber-security is both about the insecurity made by and Web servers can store and protect critical website data from unauthorized users.
through this new space and about the practices or procedures to make it (progressively) secure (Kumar, & Controlling bandwidth
Somani, 2018). It alludes to a lot of exercises and measures, both specialized and non-specialized, expected
Web servers can help eliminate downtime caused by high web traffic.
to ensure the bioelectrical condition and the information it contains and transports from all possible threats.
Server-side web scripting
This research aims to gather all the information and overview related to cyber-crime and provide the
historical facts and perform reports on the analyzed data of different attacks reported everywhere in the last Web servers can enable users to create dynamic web pages using scripting languages such as Ruby, Python, and PHP.

five years. Based on the analyzed information, we would like to provide all the countermeasures that Virtual hosting
organizations may undertake in order to ensure improved security that would support in defending the Web servers can be used to run multiple applications, websites, data, and other services
organizations from being attacked by the hackers and provide a cyber-security to avoid all risks. 2. Purpose
The paper provides information about cyber security and cyber terrorism. It covers various information about
these t

1
1.4 mobile nettworks Original information, or plain text, might be something as simple as "Hello, world!" As cipher text, this might
appear as something confusing like 7*#0+gvU2x—something seemingly random or unrelated to the original
plaintext.
The risk of assaults on web applications to separate information or Encryption, however, is a logical process, whereby the party receiving the encrypted data—but also in possession
to circulate malicious code perseveres. Cybercriminals convey their of the key—can simply decrypt the data and turn it back into plaintext.
For decades, attackers have tried by brute force—essentially, by trying over and over again—to figure out such
code using good web servers they have traded off. In any case, keys. Cybercriminals increasingly have access to stronger computing power such that sometimes, when
information taking attacks, a considerable lot of which get the vulnerabilities exist, they are able to gain access.
deliberation of media, are also a significant risk. Currently,
individuals need a more unusual accentuation on securing web
servers as well as web applications (Bendovschi, 2015). Web servers
are mainly the preeminent stage for these cybercriminals to take the
information. Thus, one should reliably utilize an additional secure
program, mainly amid vital exchanges all together not to fall as a
quarry for these defilements.

The most common example of a cellular network is a mobile phone (cell


phone) network. A mobile phone is a portable telephone which receives
or makes calls through a cell site (base station) or transmitting tower.
Radio waves are used to transfer signals to and from the cell phone.

2.2 TRENDS OF CYBER SECURITY

Cyber Security assumes a critical role in the area of data


technology. Safeguarding the data have become the
greatest difficulty in the current day. The cybersecurity
the main thing that raids a chord is cybercrimes which
are increasing tremendously step by step (Samuel, &
Osman, 2014). Different administrations and
organizations are taking many measures to keep these
cybercrimes. Additional the different measures
cybersecurity is as yet an enormous worry to numerous.
Some main trends that are changing cybersecurity give
as follows:

The Covid-19 pandemic forced most organizations to shift their


2.1 ENCYRIPTION
workforces to remote work, often quite rapidly. Many surveys
It is the method toward encoding messages so programmers cannot scrutinize it. In encryption,
the message is encoded by encryption, changing it into a stirred-up figure content. It commonly suggest that post-pandemic, a high proportion of the workforce
completes with the use of an “encryption key,” that demonstrates how the message is to
encode. Encryption at the earliest reference point level secures information protection and its
respectability (Sharma, 2012). Additional use of encryption obtains more problems in
will continue to work remotely.
cybersecurity. Encryption is used to ensure the information in travel, for instance, the
information being exchanged using systems (for example the Internet, online business), mobile Working from home poses new cybersecurity risks and is one of
phones, wireless radios and so on.

decoherence—the gradual loss of quantum information. the most talked-about new trends in cyber security. Home offices
n even simpler terms, encryption is a way to render data unreadable to
are often less protected
an unauthorized party. This serves to thwart cybercriminals, who may

have used quite sophisticated means to gain access to a corporate 2.3 Role of Social Media in Cyber Security
network—only to find out that the data is unreadable and therefore

useless. Social media has turned into a lifestyle for some


individuals. We use it to stay in contact, plan occasions,
Encryption not only ensures the confidentiality of data or messages
share our photographs and comment on recent
but it also provides authentication and integrity, proving that the developments. It has replaced email and telephone
requires a ton of us. However, similarly as with whatever
underlying data or messages have not been altered in any way from else on the web, it is imperative to know about the
dangers. PCs, cell phones, and different gadgets are
their original state. priceless assets that furnish people of any age with the
s extraordinary capacity to connect and collaborate with
whatever remains of the world. Individuals can do this in
various ways, including the utilization of social media or
networking sites.
3
3.2 Cyber Terrorism
The term “terrorism” can allude to the illegal
utilization of power or viciousness against people in
3.1 ROLE OF SOCIAL MEDIA IN order to threaten an administration or its residents and
CYBER CRIME associations which might be to accomplish a political or
Courtesy of social media, people can share musings, pictures,
exercises, or any part of their lives (Gross, Canetti & Vashdi, 2017). a malicious site [10]. Terrorism has transformed from
They can bring an unknown look into the lives of others, regardless of the conventional structure to the cyber type of
whether they live nearby or over the globe. Unfortunately, these
networks additionally represent security toward one's PC, protection, innovation supported terrorism recognized as cyber
and even their security. Social media collection among faculty is
soaring as is the risk of assault (Sharma, 2012). Since social media terrorism. It stays vital issues of the present society.
sites are nearly utilized by the majority of them reliably, it has
become an excellent stage for cybercriminals for hacking private data Not just that the battle against terrorism is falling
and taking significant data.
behind, current cybercrime assaults are ending up
The organizations need to assure they are likewise as fast in progressively forceful and confrontational (Sharma,
recognizing dangers, reacting increasingly, and keeping away 2012). This terrorism is the utilization of cyber word to
from a rupture of any sort. Subsequently, individuals must take dispatch an assault to the essential foundations that
suitable measures particularly in managing social media to keep the presence of associations and countries entirely
the loss of their data. The capacity of persons to impart data to a depended after that can prompt its shut down.
group of persons of millions is at the core of the exact test that
social media offerings to organizations (Cabaj, Kotulski,
Księżopolski, & Mazurczyk, 2018). Nevertheless, enabling
anyone to disperse financially delicate data, social media
3.3Components of Cyber Terrorism
additionally gives a comparable ability to range false data. It can
be merely being as harming. The rapid spread of incorrect
information by social media is among the growing dangers. A few attacks as cyber terrorism have a few parts
Though social media can utilize for cybercrimes, these which have been distinguished by numerous
organizations cannot stand to quit utilizing social media as it observational researchers in the exploration network.
assumes an essential role in the attention of an organization. In As indicated by Samuel and Osman (2014) in their
its place, they should have arrangements that will inform them of hypothetical model recognize the five sections that a
the risk to fix it before any actual harm is done Dervojeda, Verzijl, “cyber-terrorism” classified they are; the objective of
Nagtegaal, Lengton, & Rouwmaat, 2014). Anyway, organizations the violence, inspiration and dedication towards the
should understand this and observe the meaning of breaking mission to be accomplished when such incident takes
down the data chiefly in social deliberations and give good place, impact, instruments are utilized to dispatch such
security plans to avoid dangers. One must contract with social assault
media by using specific plans and the right technologies.

4. Conclusion

Cyber-security is both about the insecurity


made by and through this new space and about
the practices or procedures to make it
(progressively) secure. Exertion to verify the
cyberspace should give a definitive need else
the "information technology" will not be viably
used by clients. The terrorist of things to come
will win the wars without discharging a shot just
by crushing the country's necessary
substructure if steps are not taken to handle the
pervasiveness of the expansion in such a cyber-
attack. They can bring an unknown look into the
lives of others, regardless of whether they live
nearby or over the globe. The “cyber-terrorism”
can in one method or alternate prompts the
death toll just as causing severe harms. Though
social media can utilize for cybercrimes, these
organizations cannot stand to quit utilizing
social media as it assumes an essential role in
the attention of an organization. Cyber terrorism
has guaranteed numerous innocent lives and in
the meantime render numerous homes to a
condition of the problem that is occasionally
coming about to mental injury to the influenced
families. Cyber terrorism stays vital issues of
the present society. Not just that the battle
against Cyber terrorism is falling behind, current
cybercrime assaults are ending up progressively
forceful and confrontational. Cybersecurity has
an intriguing parallel to terrorism. Guaranteeing
the security of information, data, and
correspondence is impressively harder than
hacking into a systeme considerable progress
has been made
in recent years, building large-scale, fault-
tolerant quantum
computers remains a distant goal.

3
REFERENCES
ACKNOWLEDGMENTS
[1] Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and
Security Countermeasures. Procedia Economics and Finance, 24-31.
doi:10.1016/S2212-5671(15)01077-

The authors would like to thank the CYBER SECURITY [2] Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczyk, W. (2018).
Cybersecurity: trends, issues, and challenges. EURASIP Journal on
research community for their continuous contributions and Information Security. doi:10.1186/s13635- 018-0080-0
innovative insights, which have significantly influenced this [3] Dervojeda, K., Verzijl, D., Nagtegaal, F., Lengton, M., &
Rouwmaat, E. (2014). Innovative Business Models: Supply chain
work. We are also grateful to our mentors and colleagues finance. Netherlands: Business Innovation Observatory; European
for their valuable feedback and support throughout the Union.
research process. Finally, we acknowledge East West [4] Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security
College of resources and environment to conduct this study. Challenges And Its Emerging Trends On Latest Technologies.
Engineering,BENGALURU for providing the necessary Retrieved from
https://www.researchgate.net/publication/260126665_A_Study_
Of_Cyber_Security_Ch
allenges_And_Its_Emerging_Trends_On_Latest_Technologies [5]
Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its
effects on psychological well-being, public confidence and political
attitudes. Journal of Cybersecurity, 3(1), 49–58.
doi:10.1093/cybsec/tyw018

You might also like