Research Proposal Document by Srinivas Vadthya
GLS 470 Writing the Research Paper
11/04/2015
Cyber Security
Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimes, computer related offenses, federal approaches defenses. The information resources management has the technical matters for which IT are widely known. Cyber resources and cyber power as well as cyber security. We have spent a lot of time talking about many different high level critical infrastructure protection concepts we have general rule stayed away from cyber security explaining the ins and out of how the NIPP and NRF work together to ensure that we can live our daily live in relative comfort.
My research Is on security measures to the software to hardware computer interfaces. Trying to find out the difficulties of cyber security I have usable security, software security and hardware security to relate the cybercrime issues. I have to implement new ways to stop the computer related crimes of software and hardware.
My
The Department of Homeland Security (DHS) is Incharge of shielding our country’s crucial infrastructure from physical and cyber dangers. Of the varied kinds of infrastructure, cyberspace is crucial constituting the information regarding the government and business operations, crisis management and readiness information, and our crucial digital and process control systems. Safeguarding these critical resources and infrastructure is
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, software programs and data from unintended or unauthorized access, change or destruction. Post 9/11 and other terrorist attacks, the United States grows its endeavors to repulse cyberattacks, U.S. corporate organizations and the government agencies wind up in strife over how to adjust to new methods of security and privacy. The current state of security measure protocols and privacy policies placed by the US government in cyberspace raises concerns for the 99%. This is due to the recent cyber-attacks on American corporate organization systems and government alike, where their digital information and network infrastructures within the systems were compromised, and personal data was hacked and stolen.
The author of this response is asked to answer to a few questions relating to cyber-attacks at several different mission-critical or otherwise very sensitive agencies or companies in the area. The ramifications of each incident and who will be affected by the same will be discussed. The outcomes of each will also be mentioned. The author is also asked to identify the steps and recovery path for one of the incidents in particular
The author establish her credibility by evaluating many sources and also being very knowledge able on the subject of cybersecurity and government affairs. Also the author cited all the sources she used with in the article to support his point. The author is a lecturer on strategic security management and political affairs, also has various degrees on foreign policies and computer security.
In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along
With the widespread use of technology becoming more prominent, acts of cyber terrorism pose an increased threat to safety. Cyber terrorists exploit the internet and its users to commit acts that can be increasingly detrimental to their targets. Some of the terrorist activities include large scale corruption of computer networks by using tools like computer viruses. Certain individuals even have the ability of creating severe damage to government systems, national security systems and even hospital servers. Most of the technology made today only has intentions of making life easier for people. However, skilled users can manipulate the cyber world for negative intentions. Staying informed when it comes to cyber terrorism and cybercrime is important to do because of the increased reliance on technology in society. Steps to improve cyber security before an attack ensures the safety of sensitive information. The topic of cyber security and cyber warfare are interesting topics to keep up to date with. Understanding these topics can be beneficial to my dream of being in the FBI, ensuring the safety of others by working to prevent acts of cyberterrorism.
There are several cyber security vulnerabilities that organizations and individuals need to consider to protect the integrity and confidentiality of their computer systems and networks. These vulnerabilities include software and hardware, intranet, enterprise network, wide and local area network, and transmission media. This paper, therefore, focuses on software and hardware vulnerabilities as the most important and the reasons it is the most important. The paper further focuses on the risks associated with these vulnerabilities (software and hardware) and provides the recommendations on ways to manage the risks.
Cyber terrorism has heated up in the political arena thus becoming economically rewarding in relation to career. There are many projects that have been launched to study to study the threat and experts have addressed the congress on the matter and the danger it pauses in a society.
The basic idea of cybercrime can be explained by just one line “Cybercrimes are any crimes that involve a computer and a network.” It is not necessary that the computer is used in order to commit a crime, sometimes it can be target as well. These include crimes such as cyber-stalking, Identity theft, cyber trespass, cyber deceptions etc. In other words cybercrime can be defined as any illegal activity carried out using computer and the network as its means of communication.
The government and industry of the UK developed the UKCES to fulfil two functions. They are all the companies should perform the risk mitigation techniques using the basic controls to eliminate the internet based problems and that should be within the 10 steps to Cyber security by the government. The other one is that the assurance framework, which offers a framework to the organizations to bespeak to the customers, investors that they have taken the essential security precautions. UKCES is a strategy that is planned by the government of UK to make their nation highly secure for the internet trade. By this procedure the cyber nation’s security has been comprehended, addition to it the procedures and steps are chosen for its robustness (Cleveland 2008). The first step if the risk management that the organizations should take care of to eliminate the chance of losing their secured information. Government underscored the requirement for organization Boards and senior administrators to take responsibility for these dangers and revere them inside of their general corporate risk management regime.
On May 25, 2018 the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU. These regulations were designed to create a unified standard for personal data privacy and to simplify the enforcement of data privacy laws throughout all EU countries. What some organizations are surprised to learn, is that these regulations go beyond the physical confines of the EU and apply to any organization that collects or holds information on EU citizens. This means that companies throughout the world need to understand and ensure compliance with GDRP guidelines if they
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
Governments, organizations and companies co-operate to secure cyber space. In fact, the prevention of cyber criminal activities is the most critical aspect in the fight against cyber crime. It’s mainly based on the concepts of awareness and information sharing. A proper security posture is the best defence against cyber crime (Paganini, Perluigi, 2014)
According to Gartner Inc., the market for cloud-security services is expected to reach nearly $4 billion in revenue in 2016, up from $2.1 billion last year. As more businesses move to the cloud, it’s essential that we understand best practices of cloud security and provide transparency when it comes to the solutions. The Cyber security in cloud computing is aimed at reducing the security threats in cloud environment. The project involves building a knowledge base to establish comprehensive research plans for automotive cybersecurity and develop enabling tools for applied research in this area. It is aimed to research the feasibility of developing minimum performance requirements for automotive cybersecurity.
Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access.