Tuesday, May 5, 2020

Graphs Representing Security Relationship -Myassignmenthelp.Com

Questions: What Do You Mean By Cyber Security? What Are The Major Effects Of Cyber Crimes? What Are The Challenges Faced During Security Breaches? What Security Measures Are To Be Undertaken For Securing Systems? Answers: Introduction In the modern world, there is always a problem regarding viruses and malwares which is the leading cause for all types of computational problems. For a long period of time, these types of problems were not noticed and unethical users continued their works. Until the recent discovery of the internet and the virtual world, various awareness methods have been undertaken to help secure the processes. Along with storing data from the internet, devices now-a-days could perform specific options with ease. This resulted in an increasing population of hackers who wanted to access this information along with get resources from these devices. This is the very definition of cyber crime. Research aims and objectives The main aim for this research is to explore the impacts of cyber security on the lives of common people. In addition, the aim of this research paper also includes the identification of the processes by which cyber crimes exist and the necessary steps that can be undertaken for mitigating them. The main objectives of the research paper are: To determine the impact of cyber security To determine the types of attacks which make up for cyber crime To influence awareness for addressing cyber security Research scope Awareness against cyber crimes are increasing in a rapid rate across the world. However, there are various devices being made generally which have security flaws and is the leading contributor for cyber crimes. This is the main scope of this research paper which utilizes the information available and then mitigates the problem associated with cyber security. It can be said that the scope of cyber security is a large portion and the mitigation strategies are a few which is mainly dependent on the hardware and the software of the systems. The attacks are usually targeted towards the underlying structures that provide facilities for communications, electricity and transport so that it can be possible to bring down the entire network and bring the place to a halt. Literature review Fraudulent tools and techniques are becoming easily accessible in the internet which is leading to an increase in the cyber crimes. Ransom wares are one such program which affects the integrity and the security of a system. These types of malicious software encrypt any files in a system. When the user of the system tries to open the file, a message is shown asking for payments. This is the most common type of attack considered in case of any ransom wares. These payments are doubled for each 6hours delay in payment (Gordon et al., 2015). As a result, the files and the system become un-recoverable. These programs mainly destroy the faith of a user for recovering the files so that a payment will be made. In addition the payment address is always in bitcoin such that it cannot be tracked. Cyber threats also arise due to multi-vectored attacks. This type of attack provides the attacker access to the various levels of an organization in order to provide information access. The scam of Leoni AG was a big example of multi-vector attacks which led to a loss of 40 million (Liu et al., 2015). Similarly, identity theft is another type of cyber crimes which involves cyber crime. This type of attack is usually followed by stealing identities from users. This not only helps them to get access to their financial accounts but also lets the attacker get access to various channels and does unethical treatments in place of the victim. According to a research that was conducted by Javelin Strategy and Research, it was seen that during the year 2014, 12.7 million customers lost around $16 billion due to the theft of identity. Cyber crime is constantly being committed by using internet and the computers by addressing the advancements in technology. These crimes are mainly due to denial of service attacks (Buczak Guven, 2016). In addition, botnets are also other types of malicious tools which help in hacking procedures. These tools and other malicious programs are mainly sourced from the underground black market which is the root cause for such actions. Threats and vulnerabilities The major threats in using these types of activities can range from large-scale impacts to small-case ones. Hackers get unethical access to systems which in turn lead to information theft. These hackers also try to act as spies where they sell all these information available in return for money or other resources (Cunningham Zissman, 2016). In addition, governments try to get information from these hackers regarding other countries. This results in an endless cycle of hacking related activities. Moreover, the attackers also do these activities for helping increase the level of warfare among nations. The attack that occurs mainly utilizes the vulnerabilities present in the operating system of the devices. As a result, the security breaches are mainly due to this reason. The main use of information systems result in the formation of a constant need for protecting the systems from attackers (Noel et al., 2015). In addition, inside jobs like employees having access to the systems can disclose the information related which will lead to potential threats. Impacts Attacks due to unethical access are mainly used to compromise the confidentiality and integrity of the system. These attacks are used to steal the personal information from various aspects including financial and physical resources resulting in gaining of various parameters which the victim is usually unaware of (Gil, Kott Barabsi, 2014). In a similar manner, the denial-of-service attacks are also will also be used by attackers to prevent access to the systems unless their demands are met. The impacts of cyber attacks can range from small-range attacks to large-scale attacks. The small-scale attacks can include disruptions in the general activities like hacking of phone or social media accounts (Holm et al., 2015). In a similar manner, large-scale attacks may range from disrupting the services in a large organization or causing massive data breach from a government agency. Figure 1: Cyber security awareness (Source: Ben-Asher Gonzalez, 2015, pp 55) Research design and methodology This section of the research paper includes an analysis of the research design methodologies that will be used in this paper. The method of collecting data in a sequential manner is known as research methodologies (Mackey Gass, 2015). The research methods are used to integrate various hypothetical issues and trial techniques which help in the selection of the accurate records to be used in the research. For conducting this research, the researcher has utilized various researching methods. In this research paper, the researcher has undertaken the positivism ideologies such that the research can be successfully carried out. In addition, the research approach is selected to be deductive in nature. Research philosophy The concept of gathering data and analyzing it is termed as research philosophy. The research philosophy consists of two different types of beliefs, the concepts of doxology and the concepts of epistemology (Taylor, Bogdan DeVault, 2015). Out of the three different types of research philosophy, interpretivism, realism and positivism, the researcher has applied the positivism philosophy for this research paper. This is mainly because in the positivism aspects, the research is conducted by using present information in the internet. As a result, a successful research is carried out by considering all the analyzed data. Figure 2: Research philosophy (Source: Silverman, 2016, pp 39) Research approach The research approach is defined by a set of methods which is utilized in case of detailed analysis of the information available from various sources. In addition, the detailed methods of analysis and collection are utilized in this section. As mentioned by Smith, (2015), the adopted research approach is the utilized for considering the nature of the problem. This approach is divided into two different categories. These are the data collection and the data analysis methods. The research approach is divided into two different types. These are the deductive and the inductive approach. However, in case of this research paper, the deductive approach is considered for analysis. Figure 3: Research approach (Source: Knobe Nichols, 2013, pp 42) Data collection methods The process of data collection involves collecting the information which will help in data analysis for the research paper. There are mainly two types of data collection processes. These are the primary and the secondary methods of collecting data (Mackey Gass, 2015). The primary method of data collection is utilized by conducting researches, surveys or other respondent related programs. Similarly, the secondary source of data collection is utilized in collecting information from journals, e-books or other web related sources. For the analysis conducted in this research paper, the secondary sources will be considered. Data collection methods For collecting the information from various sources, the researcher included various online informative sources. These are online journals which can be accessible from the internet. In addition, websites are also other sources of information which clearly depicts the need for addressing cyber security. Sampling and sample size In this paper, the researched have selected the simple random probability sampling processes. This process is defined by setting up equal probability such that all the files are chosen in a random manner. This helps in assigning the process of randomness to the sample sizes (Clemence et al,. 2014). The sample size includes the number of online sources that will be used for the analysis made in this research. Data analysis techniques This paper has included the qualitative data analysis methods. This type of research method is more focused on the quality of the information rather than the quantity of it. The interviews and observatory cases are considered to be a part of the qualitative data analysis. This information is considered to be descriptive and is usually comprised of images and objects. According to Clemence et al,. (2014), the qualitative data analysis is usually comprised of interpretive philosophies of the researchers. The qualitative data analysis helps in examining the complex questions that helps in answering the research based analytical perceptions. Variable specification For the conduction of research related to cyber security, there can be two different types of variables to be considered. One is the dependent variable and the other is the independent variable. The independent variable does not depend on any parameter while the dependent variable depends on the independent variable. In case of the impacts of cyber security, impacts are the dependent variable which depends on the issues in cyber security. Research limitations There are various research limitations which imposed problems while analysis. As the collection of the data is involved from other sources, there will be no ethical demands of these sources claiming for objections. This is the first limitation which is followed in case of the research. Another research limitation is the conduction of the data analysis process. The collection of information needed much time as data regarding cyber security is not easily to be found. Moreover, the various effects of the selective hacking programs can only be theoretically determined as the practical use cannot be done. Research plan Figure 4: Research plan (Source: Created by the author) Conclusion Thus, it can be concluded from the analysis conducted in this research paper is that cyber security is an important aspect. It is an important aspect which helps to utilize the various threats and vulnerabilities so that they can be fixed. This paper lists all the various types of risks associated to cyber security. In addition, the various types of attacks that can be possible are also covered in this paper. Moreover, this paper lists the research methodologies that are to be used for making a successful data analysis of the topic mentioned. Lastly, this paper also includes a discussion of the secondary data collection methods and the qualitative method of analysis. References Ben-Asher, N., Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection.Computers in Human Behavior,48, 51-61. Buczak, A. L., Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys Tutorials,18(2), 1153-1176. Carr, M. (2016). Publicprivate partnerships in national cyber?security strategies.International Affairs,92(1), 43-62. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and Engineering Ethics,20(3), 701-715. Clemence, A., Doise, W. Lorenzi-Cioldi, F., (2014).The quantitative analysis of social representations. Routledge: Routledge. Cunningham, R. K., Zissman, M. A. (2016).Cyber Security Research at Lincoln Laboratory. MIT Lincoln Laboratory Lexington United States. Gil, S., Kott, A., Barabsi, A. L. (2014). A genetic epidemiology approach to cyber-security.Scientific reports,4. Gordon, L. A., Loeb, M. P., Lucyshyn, W., Zhou, L. (2015). Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(1), 24. Gupta, B., Agrawal, D. P., Yamaguchi, S. (Eds.). (2016).Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global. Holm, H., Shahzad, K., Buschle, M., Ekstedt, M. (2015). P $^{2} $ CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language.IEEE Transactions on Dependable and Secure Computing,12(6), 626-639. Hong, J., Liu, C. C., Govindarasu, M. (2014). Integrated anomaly detection for cyber security of the substations.IEEE Transactions on Smart Grid,5(4), 1643-1653. Kent, A. D. (2016). Cyber security data sources for dynamic network research. InDynamic Networks and Cyber-Security(pp. 37-65). Knobe, J. Nichols, S. eds., (2013).Experimental philosophy (Vol. 2). Oxford University Press. Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection,9, 52-80. Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., Liu, M. (2015, August). Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. InUSENIX Security Symposium(pp. 1009-1024). Mackey, A. Gass, S.M., (2015).Second language research: Methodology and design. Abingdon: Routledge. Noel, S., Harley, E., Tam, K. H., Gyor, G. (2015). Big-Data Architecture for Cyber Attack Graphs Representing Security Relationships in NoSQL Graph Databases. Silverman, D. ed., (2016).Qualitative research. London: Sage. Smith, J.A. ed., (2015).Qualitative psychology: A practical guide to research methods. London: Sage. Taylor, S.J., Bogdan, R. DeVault, M., (2015).Introduction to qualitative research methods: A guidebook and resource. New Jersey: John Wiley Sons

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.