Wednesday, December 11, 2019
Cyber Security-Can Really Be Safe-Free-Samples-Myassignmenthelp
Question: Discuss about Cyber Security: Can Really Be Safe. Answer: The safety in the Cyber world is a most important aspect to protect an online data from undesirable interventions. The cyber-attacks in present decade are a common issue because it is exposing a threat in the official data of a government as well sensitive data of an individual. The research states the significance of the cyber security and responds that the cyber security is simply not safe in present time. However its effective strategies can safeguard the future trends of cyber security. The exploration of cyber space is a greatest necessity in the present era. Almost half of the population currently spend lives in the usage of cyber technology. It is considered as a practical reality of the individual to operate the cyber world in order to establish to experience virtual knowledge. Availability of all services in one touch makes every individual life as easy going. However the accessibility of cyber world is facing a major issue on safety. In the report of RSA (Rivest-shamir-Adleman) cryptosystem, almost 40-50 per cent online transactions were hacked and introduced a high level of online malware and virus. Unfortunately, the user datas are sheltered by the weakest secured mechanism. Hacking of any individual user online identification and password is a common unsafe procedure (Byres and Justin). According to former secretary of US Cyber department Michael Chertoff, the common theme in the cyber security is that attacking of vector in the individual password. The complicated data mechanism does not equip with any softwares of anti-viruses or fire walls. One of the latest reports of the cyber-crime states that approximate 1800 users identifications were embezzled due to weak link on protection. Thus, the protection of the individuals password is a must condition to uphold the trust in cyber world (Pfleeger and Deanna, 597-611). In the month of last September 2016, National Institute of Standards and technology (NIST) of United States published a negative view on a threat of cyber security. The negative view states the SMS and E-mails are not considered as safe method of communication because it aids in leak of users data from their cell phones. The Short Message Service (SMS) are now officially treated as a compromised data. For instance- any online transaction which is confirmed through SMS are not safe anymore, the hackers are able to access the online transaction by joint merger of users data with its own data (Probst et al. 1-15). The most threats of cyber security are denial access of service attacks (Dos attack), attacks on social engineering, backdoor Trojan malwares and spoofing attack. Firstly, the Dos attack deals with a non-accessing of any legitimate user due to attackers attempts to prevent entry. Secondly, the social engineering is the psychological method to influence the user for a purpose to extract their credential information. Thirdly, the backdoor attack in a situation of leak in users encrypted data by the undocumented portal. Lastly, the spoofing is the cyber offence in the context of information technology where an invader attempts to acquire any credential data of the user by unauthorised access in the system (Elmaghraby and Michael, 491-497) In spite of many positive reforms or measures in the cyber security, the recommended strategies and policies are unfortunately does not implement properly in present time. Still, there is a lack of affirmative measures to secure the cyber world. The affirmative measures should not contain any illusory picture of cyber security. It must implement such strategy which safeguards every minute details of the user. It is important to take an effective measure so that a user faith can be built again. The unique implementation of securing cybercrime is a must. Such implementation should include users own fingerprinting or eye balls identifications. Hence, it is a vital step to target on highly systematic and secured data over cyber world. The increasing level in the threat of cyber security needs to be cut down by its roots. The best illustration is that the Canadian government implement the positive measures through the legislature aid. The object of Canadian technology law mainly concern with a protection of every citizens credential online information. It provides an implementation of proper standardisation and protocols to curb the existence factors of threats in cyber security. The central role of government and legislation plays a vital role in preservation of any cyber threats and challenges. The legal framework regulates the risk of cyber security by proper implementation of an effective strategies and policies like the departments of Homeland Security (DHS). It mainly focuses on preserving the individual information in a uniform and transparent level. The department of justice (DOJ) also plays the significant role in enforcing the legislation in context of information technology (Chan and Adrian, 103-105). According to Global cost of cybercrime, almost 400 billion expend for the development of ICT department and its infrastructure. Almost 15 to 20 per cent funds are spending on the IT agency by the federal government (Crdenas). The effective legislation on cyber security increasing a faith in the user like data-breach notification where users data is preserved by the unique entity number allocated by the portal sites or FISMA Reforms brought major changes in the information technology department. These changes are exclusion of antiquated report in order to improve the secured zone. The more informed and systematic policies are introduced in the field of advancement in Information Technology existing strategies (Clifton and Don) Therefore, the research paper concludes that the framework of cyber security must permit the critical information technology infrastructure by new blog entry. It must also focus on updating and advancement the cyber security through proper implementation of technical policies of system to develop a defect free or virus free computer systems (Hoffman). Ultimately, the draft of cyber security must strengthen by the proper awareness in the public in order to curb exploitation of any delicate and sensitive individuals data and information. References Byres, Eric, and Justin Lowe. "The myths and facts behind cyber security risks for industrial control systems."Proceedings of the VDE Kongress. Vol. 116. 2007. Crdenas, Alvaro A., "Research Challenges for the Security of Control Systems."HotSec. 2008. Chan, Haowen, and Adrian Perrig. "Security and privacy in sensor networks."computer36.10 (2009): 103-105. Clifton, Chris, and Don Marks. "Security and privacy implications of data mining."ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery. 2014. Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security challenges in Smart Cities: Safety, security and privacy."Journal of advanced research5.4 (2014): 491-497. Hoffman, Lance J.Modern methods for computer security and privacy. Englewood Cliffs, NJ: Prentice-Hall, 2007. Pfleeger, Shari Lawrence, and Deanna D. Caputo. "Leveraging behavioral science to mitigate cyber security risk."Computers security31.4 (2012): 597-611. Probst, Christian W., et al. "Aspects of insider threats."Insider Threats in Cyber Security. Springer US, 2010. 1-15.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment