Cyber Security and Its Challenges to Society

In: Computers and Technology

Submitted By abdulmajidqayyum
Words 3707
Pages 15
Cyber security and its challenges to society
Final Project Report

Group Members
Abdul Majid Qayyum
Umair Arshad
Hasnat Ahmed
Gulraiz Shabbir
Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16

Cyber Security and its Challenges to Society
Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years. The act of protecting internet, computer systems and their contents has come to be known as cyber security. Abroad and arguably somewhat fuzzy concept, cyber security can be a useful term but tends to defy precise definition. It usually refers to one or more of three things: * A set of activities and other measures intended to protect—from attack, disruption, or other threats—computers,…...

Similar Documents

Cyber Security

...Testing ACC 626: IT Research Paper Emily Chow 20241123 July 1, 2011 I. Introduction Due to the increasing vulnerability to hacking in today’s changing security environment, the protection of an organization’s information security system has become a business imperative . With the access to the Internet by anyone, anywhere and anytime, the Internet’s “ubiquitous presence and global accessibility” can become an organization’s weakness because its security controls can become more easily compromised by internal and external threats. Hence, the purpose of the research paper is to strengthen the awareness of ethical hacking in the Chartered Accountants (CA) profession, also known as penetration testing, by evaluating the effectiveness and efficiency of the information security system. 2 1 II. What is Ethical Hacking/Penetration Testing? Ethical hacking and penetration testing is a preventative measure which consists of a chain of legitimate tools that identify and exploit a company’s security weaknesses . It uses the same or similar techniques of malicious hackers to attack key vulnerabilities in the company’s security system, which then can be mitigated and closed. In other words, penetration testing can be described as not “tapping the door” , but “breaking through the door” . These tests reveal how easy an organization’s security controls can be penetrated, and to obtain access to its confidential and sensitive information asset by hackers. As a result, ethical hacking is......

Words: 11999 - Pages: 48

Cyber Security

.... Does the definition of cyber security change when the situation/environment changes? For example, is there a difference between home, government, and private industry? 2. What have you learned in this module that you plan to put into practice? What have you learned that reinforces habits you're already practicing? 1. Cyber security definition does indeed change when the situation/environment changes. In the paper “An evolving threat” of m-trends, it talks about different organizations working to keep their information safe. At home, only the individuals in the household are at risk of getting their personal information exposed and possibly stolen. Government would have information that can affect not just a household but an entire city, state, or even country that terrorist can get a hold of to gain money or power. A private industry would have private secrets or blueprints that can be seen. The security software may differ depending on the information needed to protect. Overall, cyber security is very necessary for all groups to keep their assets protected. 2. I was amazed to learn about the HTTPS and did not think twice when I connected to hot spots or any free wireless if my information would be protected and safe. I know I am not the only person who is distracted with the new technology and forgets to worry about cyber security, but I feel that the best practices has helped me gain better understanding on why it is important to stay current on the......

Words: 303 - Pages: 2

Cyber Security Act

...Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and cooperation 4.0 Enabling technologies –......

Words: 7888 - Pages: 32

Cyber Security

...UNIVERSITY | Cyber Security | | Patrice Brockington | 4/20/2013 | | Cyber Security The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief. Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet. “The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national......

Words: 645 - Pages: 3

Cyber Security

...Escalating cyber-attacks on the general public and distinct divisions such as the immediate neighborhood, nationwide, and worldwide level have stimulated an increase in financing and support for the examination of increased cyber security enhancements. The purpose of this paper is to discuss the new technologies for boosting cyber security in a local level, national level and in the Global level. The paper focuses on pointing out the mandate of the government to fight cyber insecurity. New technologies need to dynamically assess networks in real-time such as with the use of Remote Agents for real time reports. These technologies also need to make the probability of attack less predictable and constantly evolving such as through the use of moving target defense. Introduction Cybercriminals still create new routes in which to exploit and victimize people and In as much as country state programmers trade off with firms, government organizations, and non-administrative associations to make undercover work systems secure, information is still being stolen. As the social world gets to a new paradigm where use of sophisticated devices and gadgets and technology go mainstream, we end up putting our privacy into the brink of attack. This is because the cyber criminals too are advancing in their technology to exploit victims in the new paradigm. For instance, a large number of staff today now carry versatile gadget that are able to detect their location using the......

Words: 590 - Pages: 3

Cyber Security

...Research Paper – Cyber Security From the growing use of smart phones to access the Internet to rogue employees in the workplace, the threat of cyber terrorism is increasingly on the minds of C-suite executives. At a recent conference sponsored by the Raritan Valley Community College Foundation, security experts addressed the threats, the exposures and the legal issues and best practices to bolster cyber defenses. Virginia Bauer, CEO of East Rutherford-based security company GTBM, explained that many people, like herself, first became familiar with security threats on 9-11(Bauer's husband was killed in the attacks and she has since been a 9-11 families advocate). "To combat the threat, better private and public partnerships are needed to develop solutions, something the 9-11 Commission recommended," she explained. GTBM's main product is Info-Corp(TM), a system that conducts real-time identification checks, scanning local, state, and federal National Crime Information Center (NCIC) databases, the Federal Terrorist Screening Watch List and all 50 states' motor vehicle databases. The identification checks are important to companies because the biggest cyber threat to businesses can be its employees. "Most cyber attacks happen internally," Bauer said. "The people who can be the most threatening to you are sitting in your offices, or are your consultants and vendors." Govi Rao, chairman of the New Jersey Technology Council and president and CEO of Noveda Technologies (a......

Words: 527 - Pages: 3

Cyber Security

...An Opinion on DoD Organization or Direction Cyber 200 H 11 Jun 2014 Layer 2 Switch The Army’s current force modernization proponent structure lacks the institutional unity of effort needed to effectively determine Doctrine, Organizational, Training, Material, Leadership/education, Personnel, and Facility (DOTMLPF) requirements, to execute force management responsibilities, and conduct integrated force and capability development for Cyberspace Operations, Signal/Communications Networks and Information Services, and Electronic Warfare (EW) across all domains and warfighting functions. The United States Army Cyber Center of Excellence (Cyber CoE) will train, educate, and develop highly skilled Cyber, Signal, and EW Soldiers and Leaders. They will also design, develop and integrate capabilities, concepts, and doctrine in order to build versatile Cyber, Signal, and EW Professionals that enable the Army of the 21st Century. The vision for the organization is to lead change in the U.S. Army and enable all warfighting functions by developing agile and adaptive DOTMLPF solutions that support unified land and cyberspace operations. According to Booz, Allen, Hamilton, “The US seems to have only a short window of opportunity remaining to prepare for major cyber incidents that, if successful, could be as physically and economically devastating as severe hurricanes or other natural disasters.” Key stakeholders & Combatant Commanders from Department of Defense (DoD) must......

Words: 503 - Pages: 3

Cyber Security in the Usa

...Cyber Security in the USA In this current age, computers and online connectivity have become a common ground for the majority of people living in America. Emails, instant messengers and social media are phasing out hand written letters. Physical salary checks, bills and bank statements are available online and the majority of these services communicate with each other for a more convenient experience to the users. With the rapid growth of technology additionally comes growing concerns of this nation’s ability to defend itself from attacks. It is extremely important to keep security in mind while actively utilizing the many features of the cyber world. There are many malicious software and people online that send out numerous threats every day. Therefore, because of the amount of connectivity and information being shared online, cyber security is one of the most significant issues facing America today and moving into the future. Cyber Security involves a numerous amount of steps, one of the most important being a person’s ability to understand the different types of attacks that they are liable to encounter. The implementation of computers in the classroom has grown significantly over the years. According to University of South Florida, one computer classrooms will face more challenges than a class with several computers. Classrooms with laptops and wireless network connectivity yield the best results. Students can take them on field trips, bring them home for assignments......

Words: 366 - Pages: 2

Cyber Security

...INTRODUCTION: This research report conducts analysis on security. Technology these days is going up very fast and technology has been changed the route business administered by giving online services to their customers, to secure data in to “cloud” and allowing them to get their data from smart phones and tablets. This process of securing data has given many benefits to small and large business alike. But where the benefits are there will be some risk present. Risk will be like lost of data or to protect data by any attack of security. According to a survey which took place in 2012 about security, the graph of crimes and security attacks is gradually going up every year. As we talk about security it’s a very huge field to do research on it. Security has many different units in a field. One can’t do a research on this topic. The topic I am going to discuss in my research is cyber security. Cyber security these days is important everywhere. Where ever the data is, we need cyber security to protect and maintain our data according to our requirements Cyber crime is far reaching, general and continually joined with different parts of the criminal natural gathering. It runs from the thievery of a specific's character to the complete interruption of a nation's Internet compromise in light of a huge trap against its masterminding and taking care of assets. The definite focus of cybercrime divisions is on information-the information which is stored electronically for resulting......

Words: 1426 - Pages: 6

Cyber Security

...CYBER SECURITY NAME ISNTITUTION Cyber security plays an important part in managing information for various functions. In hospitals for example where doctors need to share information about several patients and all other important information about emergency and non-emergency access of this information. The security and privacy of a patient is one of the key points in the doctors’ profession. There are several ways in which patient’s information can be secured online through the internet and the intranet as used by various health facilities. This information regarding health care, patient, and administrator records need to be secure for a credible healthcare system (Shoemaker & Conklin, 2012). While designing any system it is necessary to determine the security risk that is generated while developing any platform that is used. In understanding the security risks estimation, one has to carefully analyze the intensity of the risk and classify them accordingly. One of the ways in which you can classify the risks is to look at the impact in which the risk may put to the information. This can be low impact and high impact. Low impact risk will be given lowest priority while responding to risk while that with the high impact will be given the highest priority. One of the ways used in analyzing the risks is by using the protection poker for software risk assessment. This analyzes the ease of attack. Ease of attack looks at the vulnerability of the site and......

Words: 596 - Pages: 3

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist......

Words: 1810 - Pages: 8

Cyber Security

...In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning cyber security. Cyber security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. Most of the threats to computer networks come from the internet and these are often intentional, having been developed by people with malicious intent. Cyber security is, therefore, an attempt by individuals to protect their personal information and other digital assets from attacks from the internet. Cyber security involves various steps the most important of these being an individual’s understanding of the different forms of attacks that they are likely to encounter. Once one has knowledge of this, then it is his or her responsibility to ensure that they have put in place the best security system they can get their hands on. There exist different types of threats and these can be considered to be of varying levels and risks to an individual’s personal information in their computers. The higher the possibility of an attack, the more advanced the security system that is to be put in place to ensure that the threat is minimized. Cyber security involves dealing with threats that range from malicious codes, which are known as malware and spyware, to computer viruses. Some of these viruses are so serious that they have the ability to erase entire operating systems of computers.......

Words: 374 - Pages: 2

Cyber Security

...CYBER SECURITY INTRODUCTION It is also known as “Computer Security or IT security”. It is applied to the security of computer, computer network and the data stored and transmitted over them. Today the computer system are used in wide variety of “smart devices, including Smartphone’s,  televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other networks. Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest. There are the various elements of the cyber security which are as: 1. Application Security 2. Information Security 3. Network Security 4. Mobile Security 5. Internet Security 6. Cyberwarfare One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected. "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no......

Words: 3559 - Pages: 15

Cyber Security

...6 20 Cyber crime:Law Enforcement And E-Government Transnational Issues Individ ual Assignment #1 Leggett,Ronnell 3/3/13 2 Table Of Content Introduction ................................................................. 3-5 Current Government Interventions/ Methods............. 5-7 linpact/Effects .............................................................. 7-8 Private Industry Rcsponsibilit)' ............................... 8-9 Conclusion ........................................................................ 9-10 Reference Page ........................................................... 11 3 Introd uction Over the last several years we have witnessed many changes and transformations occur in tcclmology including advances in phone. television, and compu ter comm unication outlets. Being able to use and ma nipulate technology has now become an essential part of everyday lifo, this is especiall y important with the use of the World Wide Web and the plentiful resources it has to offer. With these new advances of technology we often find an apparent generation gap where more and more Americans arc born into new technology \'1hi lc others arc still trying lo figure it ou t. Most impo11 y. with these tech nological advances. crime has adapted to thi s new age as antl well. Consumers are pu t at new and higher risks when purchasi ng goods (Baker. 2006). Several decades ago the crimes reported by the news w1::re of a physical natu......

Words: 2550 - Pages: 11

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat”......

Words: 2041 - Pages: 9