ETI pro2
ETI pro2
INDEX
Sr no NAME
1 INTRODUCTION
8 CONCLUSION
Overview of Cyber Security
Abstract : Cyber security are techniques generally set forth in
published materials that attempt to safeguard the cyber environment
of a user or organization. It manages the set of techniques used to
save the integrity of networks, programs and data from unauthorized
access. It refers to the body of technologies, processes, and it may
also be referred to as information technology security. The field is
of growing importance due to increasing reliance on computer
systems, including smart phones, televisions and the various tiny
devices that constitute the Internet of Things .
Micro-Project Report
INTRODUCTION
The internet has made the world smaller in many ways but it has also opened us up to
influences that have never before been so varied and so challenging. As fast as security
grew, the hacking world grew faster. There are two ways of looking at the issue of cyber
security. One is that the companies that provide cloud computing do that and only that
so these companies will be extremely well secured with the latest in cutting edge
encryption technology.
There are some additional reasons for that threat is overrated. First, as combating cyber-threats has become a
highly politicized issue, official statements about the level of threat must also be seen in the context of different
bureaucratic entities that compete against each other for resources and influence. This is usually done by stating
an urgent need for action (which they should take) and describing the overall threat as big and rising. Second,
psychological research has shown that risk perception is highly dependent on intuition and emotions, as well as
the perceptions of experts (Gregory and Mendelsohn 1993). Cyber-risks, especially in their more extreme form,
fit the risk profile of so-called „dread risks ,‟ which appear uncontrollable, catastrophic, fatal, and unknown. There
is an inclination to be afraid of low probability risks, which translates into pressure for serving an action with all
sorts of willingness to bear high costs of uncertain benefit. Only the system attacks sufficiently destructive or
disruptive need the attention of the traditional national
security apparatus. Attacks that interrupt the services or that cost mainly a nuisance to the computer
REDUCING CYBER – IN - SECURITY
The three different debates have been taken over the many concepts and counter measures have been
produced with their focus. The computer network which owns a entities have a common practice to
take a responsible for protecting it. However, there are some assets considered so crucial in the private
sector to the functioning of society and governments have to take additional measures to ensure the
level of protection. These efforts are usually included under the label of critical (information).
Information assurance is guide for the infrastructure protection and to the management of risk, which
is essentially about accepting that one is (or remains) insecure: the level of risk can never be reduced
to zero. This means that minor and probably also major cyber-incidents are bound to happen because
they simply cannot be avoided even with perfect risk management.
CONCLUSION
Depending on their (potential) severity, however, disruptive incidents in the future will
continue to fuel the military discourse, and with it fears of strategic cyber-war.
Certainly, thinking about (and planning for) worst-case scenarios is a legitimate task of
the national security apparatus. However, for the favour of more plausible and more
likely problems they should not to get more attention Therefore, there is no way to study
the „actual level of cyber-risk in any sound‟ way because it only exists in and through
the representations of various actors in the political domain.
REFERENCES
[1]. Daniel, Schatz,; Julie, Wall, (2017). "Towards a More Representative Definition of Cyber Security" .
Journal of
Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215 . Archived from the original on 28 December 2017. [2].
Rouse, Margaret. "Social engineering definition". Tech Target. Archived from the original on 5 January 2018.
Retrieved 6 September 2015.
[3]. Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber
Security" . Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215 .
[4]. "Reliance spells end of road for ICT amateurs", 7 May 2013, The Australian
[5]. Stevens, Tim. "Global Cyber security: New Directions in Theory and Methods". Politics and Governance. 6 (2).
doi :10.17645 /pag.v6i2.1569 . [6]. "Computer Security and Mobile Security Challenges". researchgate.net.
Archived from the original on 12 October 2016. Retrieved 4 August 2016. [7]. "Distributed Denial of Service
Attack" . csa.gov.sg. Archived from the original on 6 August 2016. Retrieved 12 November 2014. [8]. Wireless
mouse leave billions at risk of computer hack: cyber security firm Archived 3 April 2016 at the Way back
Machine. [9]. "Multi-Vector Attacks Demand Multi-Vector Protection" . MSSP Alert. July 24, 2018.
[10]. Millman, Renee (December 15, 2017). "New polymorphic malware evades three quarters of AV
scanners" . SC Magazine UK.
[11]. Turner, Rik (May 22, 2018). "Thinking about cyber attacks in generations can help focus enterprise security plans".
Informa PLC. Ovum. [12]. "Identifying Phishing Attempts" . Case. Archived from the original on 13 September
2015.
[13]. Arcos Sergio. "Social Engineering" (PDF). Archived (PDF) from the original on 3 December 2013.
[14]. Scannell, Kara (24 February 2016). "CEO email scam costs companies $2bn". Financial Times (25 Feb 2016).
Archived from the original on 23 June 2016. Retrieved 7 May 2016.
[15]. "Bucks leak tax info of players, employees as result of email scam" . Associated Press. 20 May
2016. Archived from the original on 20 May 2016. Retrieved 20 May 2016. [16]. "What is Spoofing? – Definition
from Techopedia". Archived from the original on 30 June 2016. [17]. "spoofing" . Oxford Reference. Retrieved 8
October 2017.
[18]. Marcel, Sébastien; Nixon, Mark; Li, Stan, eds. (2014). Handbook of Biometric Anti-Spoofing: Trusted
Biometrics under Spoofing Attacks (PDF). London: Springer. doi :10.1007/978-1-4471-6524-8 . ISBN
978-14471-6524-8. ISSN 2191-6594 . LCCN 2014942635 .
Retrieved 8 October 2017 – via Penn State University Libraries.