Research paper on cyber security pdf




















Remember me on this computer. Enter the email address you signed up with and we'll email you a reset link. Need an account? Click here to sign up. Download Free PDF. A short summary of this paper. Cyber security is concerned with making cyberspace safe from cyber threats.

Recently, everything has been computerized, with cybernetics using various technologies such as cloud computing, smart phones, Internet of Things techniques, etc. Concerns about privacy, security and economic reimbursement are increasing due to cyber-attacks.

Cyber threats pose a lot of socio-economic, environmental, ethical, national and international problems. This paper provides information about various recent trends in cyber-attacks and the vulnerability of infrastructure based on various research articles. Introduction Cybercrime is not a new phenomenon. Lack of information security gives rise to cybercrimes. India is the fourth highest Internet user in the world [29].

Due to the development of new technologies in cyberspace, the users depend more on internet for their daily activities and become more vulnerable too to all kinds of cyber-attacks [22]. In April , G7 Ministerial Conference requested all countries to observe laws and show mutual respect for other countries using ICT devices, declaring cyber security the national responsibility of every country.

Cyber security means protection of information, computer devices, computer resources, hardware, software, network and communication devices from any unofficial access as well as from destruction. The cyber threats evolved as viruses in the year , grew as worms in a decade, metamorphosed into threats such as botnets, Advanced Persistent Threat, Insider attack and so on.

Now there are entirely new types of problems because of the progress brought about by modern technology. This chart identifies financial services 17 percent of respondents as the largest segment, followed by health and pharmaceutical 11 percent of respondents and public sector 10 percent of respondents.

Pie Chart 4. Caveats to this study There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys.

Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument.

Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are IT or IT security practitioners. We also acknowledge that the results may be biased by external events such as media coverage. Finally, because we used a Web-based collection method, it is possible that non-Web responses by mailed survey or telephone call would result in a different pattern of findings.

Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide accurate responses.

All survey responses were captured from lJune through July Screening questions S1. What best describes your level of involvement in using big data analytics for cybersecurity purposes? What best describes your level of familiarity with Apache Hadoop or Cloudera? What best describes your role as a user of big data analytics for cybersecurity? Please choose three top challenges. Who determines the cybersecurity priorities or objectives within your organization?

Please choose only one primary function. If selected increase, what caused this change in demand? Please select all that apply. Where are you seeing the greatest areas for cybersecurity risk? Please select five choices. What are the most promising enabling security technologies? Technologies that. In your opinion, how important is the use of big data analytics for ensuring a strong cybersecurity posture within your organization?

Where is network visibility most important for the detection use cases you find most valuable? If yes, does the cybersecurity platform support the collection and analysis of information for an unlimited timeframe?

Malithi Fernando. A short summary of this paper. Download Download PDF. Translate PDF. Cyber Security: An analysis on awareness on cyber security among youth in Sri Lanka.

Written by R. S Weerasuriya, S. E Fernando and P. The perpetrators and the victims of cyber crimes are reported from all over the world with no particular location, meaning any individual of any part of a region can be subjected to a cyber threat or actively participate in the particular area. As individuals who are living in a highly digitalized society, it is a vital need to be aware of the potential threats that comes with the use of information technology and how to be protected from these threats.

Thus, this research aims at understanding the level of awareness among individuals youth about cyber threats and cyber security, in the Sri Lankan context. The research has been conducted in the context of Socio-legal, analytical and qualitative research formats in order to provide an understanding on the current position of cyber security awareness among youth in Sri Lanka and how the laws and legal institutions serve the needs of the society, and to find reasons and solutions for the facets and factors that are responsible for the tested area in the research.

Since the Information Technology has drastically subjected to changes over the past few years, so are the cyber threats which are evolving from transnational crimes to organized crimes, where the cyber attackers have moved from accessing information illegally to conspiring against state institutions and individuals by threatening and extortion.

The United Nations Office of Drugs and Crime, stresses the need of firm laws and regulations over computer related activities among every nation, for only one third of the countries from the whole world has a well defined legal regime on this field, such as Europe, the United States of America and Singapore. Hence, there is a huge threat to youth, especially in Sri Lanka, where they easily become victims of cyber crimes.

Therefore it is mandatory to analyze the awareness level of cyber security among the youth. Modern cyber attack detection systems monitor either host computers or network links to capture cyber attack data. Signature based Approach Signature based approach of mishandling discovery works just comparable to the existing anti-virus software. In this approach the semantic description of an attack is analyzed and details is used to structure attack signatures. The attack signatures are structured in such a way that they can be searched using information in audit data logs produced by computer systems.

Misuse detection is concerned with discovering intruders who are attempting to break into a system by exploiting some known vulnerability. Ideally, a system security administrator should be aware of all the acknowledged vulnerabilities and eradicate them. Reconnaissance Attacks Reconnaissance attacks is the type of attack which involve unauthorized detection system mapping and services to steal data.

Cyber crime The use of computers and the internet to exploit users for materialistic gain. Cyber espionage The act of using the internet to spy on others for gaining benefit. Cyber terrorism The use of cyber space for creating large scale disruption and destruction of life and property. Cyber war The act of a nation with the intention of disruption of another nations network to gain tactical and military.

Active Attacks An attack with data transmission to all parties thereby acting as a liaison enabling severe compromise. Passive Attacks An attack which is primarily eaves dropping without meddling with the database. Malicious Attacks An attack with a deliberate intent to cause harm resulting in large scale disruption. Non Malicious Attacks Unintentional attack due to mishandling or operational mistakes with minor loss of data.

Attacks on WSN An attack which prevents the sensors from detecting and transmitting information through the network. Cyber Ethics Cyber ethics are nothing but the code of the internet. Practicing cyber ethics are good chances to use the internet in a correct and protected way. The below are a few cyber ethics one must follow while using the internet.

Ethics 1: To communicate and interact people with each other with the assistant of internet. Instant messages and email make it contact to stay in connect with the family members and friends, share knowledge and information with people among the country with the specific organization and all around the world. Ethics 2: Internet is measured as world's leading library with information on all the topic in any specific subject area, hence using this information in a proper and legal way is always essential.

Ethics 3: People are not able to operate other persons mail account with their passwords. Ethics 5: Do not share the personal details to anyone as there is a good opportunity of other persons mishandling the mail account and finally that person must be in a problem.



0コメント

  • 1000 / 1000