What Are The Devices And Activities Which Should Be Protected Against The Occurrence Of Cyber-Criminal Offence?
What Is The Reason Behind The Success Of The Intrusion?
What The Issues Rose By The Cyber Threats?
Why The Security Threats Are Not Detected Proactively?
What Are The Punishment Standards For The Digital Offence?
What Are The Risks Associated With The Security Of The Digital Information?
The cyber-security is the set of standards and principles used for securing digital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Tong, 2013). The step should be taken to provide prevention control mechanism for overcoming and resolving the issues associated with the digital activities performed on the internet. The cyber security strategies should be built for getting best quality result of resolving security issues. The technological devices should be placed with the international standards for preventing the system for cyber-criminal activities.
The objective of the project is to research on the need of cyber security parameters. The increasing rate of cyber-crime affects the working of the organization. The research should be organized which helps in developing the key parameters of security for preventing loss of data due to the occurrence of cyber-crime activity. The research helps in determining the prevention methods which plays an important role in providing solution to the security problems.
The research scope is to analyse the cyber-security system and the prevention methods which should be taken to make secure the system with the deployment of vulnerabilities and other associated attacks. The focus should be given on analysing the cyber-crimes occurrence and the impact, countermeasures used for securing the system, and cyber threats associated with the security infrastructure.
The analysis of various research papers and articles has been done to carry over the research study on determining the facts and figures associated with the cyber-security (Faris, 2010). The online and offline resources are used for collecting data on cyber –crimes and proactive action plan which should be taken by the experts. The cyber-crime can be conducted at international level by the cyber-criminals. The innovation in the field of digital life increases the activity of cyber-crime. Hacking and phishing are the major attacks which are associated with digital world. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Edgar, 2010). The contamination of the system can be resolved with the use of cyber security system. The capacity of the system can be enhanced with the use digital security method. The one time password generation is the effective technique used for securing the system. The cyber security guidelines and principles should be used for expanding the security policies of the organization. The innovation in the cyber-security helps in resolving the issues of cyber-crime. The risks management plan helps in identifying the threats and risks associated with the digital network. The cyber-security is the set of standards and principles used for securing digital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The subsequent risks mitigation plans should be developed according to the identified risks. The expertise in cyber security helps in managing the security issues of the digital tools and technologies. The cyber security strategies should be built for getting best quality result of resolving security issues. The cyber security challenges which come forth are categorised as hacking, phishing attack, virus and malware attack, and other. The intrusion detection and prevention method should be used for developing the security framework for the organization. The loss of the data can be minimized with the use of intrusion detection and prevention method and other security measures within the curriculum of the organization
The research questions helps in taking the research in right direction. The research questions which are undertaken to perform the research activities are depicted below:
The progress and completion of the research helps in developing security credentials to overcome the problem of threats and vulnerabilities which are associated with the system. The use of innovative thinking helps in bringing significant changes in the security infrastructure of the organization (Caesar, 2012).
The hypothesis which is undertaken is that the preventive measure taken by the expert to overcome the situation of cyber threats. The innovation in the cyber-security helps in resolving the issues of cyber-crime. The risks management plan helps in identifying the threats and risks associated with the digital network. The test matrix should be prepared for analysing the precaution method taken for securing the system (Brown, 2010). The following is the analysis matrix related with the inclusion of threats and security measures taken:
Analysis of the Cyber-Threats |
Preventive measures for cyber security |
How to spoof user identity |
The strong authentication protocols should be used The credentials of the User should not be leaked Authentication cookies should be protected |
How to protect data tampering |
The hashing and signing function should be used for protecting data (Shodhganga, 2010) The strong authorization protocol should be developed The protocols should be used for removing tampering from the communication links The security methods should be used for managing integrity in the communication links |
How to prevent repudiation of the data |
The audit trails should be created for security Digital signature should be used for preventing data repudiation |
How to prevent disclosure of information |
The strong authorization protocol should be developed The hashing and signing function should be used for protecting data (Bailey, 2013) Digital signature should be used for preventing disclosure of information (Gasser, 2015) The strong authentication protocols should be used |
How to prevent system from denial of service attack |
Throttling techniques are used for managing utilization of resources and associated bandwidth of the network used (Brien, 2015) Filtering the input for validation |
Gathering of information |
The routers should be used for the configuration of the request Configuration of the operating system should be done periodically |
How to prevent sniffing attack on the network |
The physical security parameters should be used The encryption and cryptographic procedures should be used for managing authentication credential |
How to prevent hijacking of the complete session |
The session should be made in the encrypted format Communication channels should be used in the encrypted format |
How to secure system from viruses and malware attack |
The ports of the firewall should be blocked Anti-malware and anti-virus should be installed in the system |
The qualitative research was undertaken by using the methods like observation, arrangement of in-depth interviews, document review system, formulation of theory, analysis of the text based documents, and others which are summarised below:
The quantitative research was undertaken by using the methods like honey pots, numerical analysis statistical testing, and others.
The following table shows the timetable of the research proposal:
Research Activity |
Start date |
Completion date |
Description |
Topic selection |
20-Sep-17 |
24-Sep-17 |
The topic of the research is Cyber security |
Selection of the team members |
22-Sep-17 |
24-Sep-17 |
The team members should be selected on the basis of their skills and interest in the research undertaken |
Collection of Relevant literature |
25-Sep-17 |
30-Sep-17 |
The online and offline sources should be used for collecting relevant information |
Reviewing of the literature collected |
01-Oct-17 |
05-Oct-17 |
The literature review is the process which should be used for analysing the undertaken literature to give the clear idea about the research topic |
Development of the primary and secondary research question |
06-Oct-17 |
10-Oct-17 |
The research questions helps in taking the research in right direction. |
Development of the draft of the research proposal |
11-Oct-17 |
20-Oct-17 |
The draft should be prepared before carrying out further research for approval |
Use of Research methodology |
21-Oct-17 |
15-Nov-17 |
The data is collected by using different research methodologies |
Revision of the proposal |
16-Nov-17 |
23-Nov-17 |
Revised the research draft proposal before sending it for approval and do the required changes |
Approval of the research proposal |
24-Nov-17 |
25-Nov-17 |
Proposal approved |
Analysis of the data collected |
26-Nov-17 |
31-Dec-17 |
The data collected from different online and offline sources |
Evaluation of the analysis |
01-Jan-18 |
10-Jan-18 |
Evaluation of the analysis report |
Completion of the research report |
11-Jan-18 |
20-Jan-18 |
The research work is completed |
Conclusion
The research study helps in analysing the steps which should be taken to provide prevention control mechanism for overcoming and resolving the issues associated with the digital activities performed on the internet. The future research study should be carrying on development of framework for the implementation of the cyber laws in the working curriculum of the organization. The cyber security guidelines and principles should be used for expanding the security policies of the organization. The research helps in determining the prevention methods which plays an important role in providing solution to the security problems.
References
Bailey, M. (2013). Cyber security research ethics dialogue and strategy workshop. 1st ed. [ebook]. https://www.caida.org/publications/papers/2014/creds2013_report/creds2013_report.pdf [Accessed 14 Sep. 2017].
Brien, O. (2015). Privacy and cybersecuriy. 1st ed. [ebook]. https://dash.harvard.edu/bitstream/handle/1/28552575/02Cybersecurity.pdf?sequence=1 [Accessed 14 Sep. 2017].
Brown, R. (2010). The state of cyber-security. 1st ed. [ebook]. https://www.bbb.org/globalassets/shared/media/state-of-cybersecurity/cybersecurity-research-report.pdf [Accessed 14 Sep. 2017].
Caesar, M. (2012). Hypothesis Testing for network security. 1st ed. [ebook]. https://publish.illinois.edu/science-of-security-lablet/files/2014/05/022015-Bi-weekly-Presentation-Godfrey.pdf [Accessed 14 Sep. 2017].
Edgar, T. (2010). Research method for cyber security. 1st ed. [ebook]. https://books.google.co.in/books?id=aRl2DQAAQBAJ&pg=PA248&lpg=PA248&dq=Research+paper+pdf+on+research+hypothesis+on+cyber+security+system&source=bl&ots=SkSRWCQCH_&sig=GO13BMyV1GmAdOHFrNRokFiSTDw&hl=en&sa=X&ved=0ahUKEwjWqoPb_6PWAhXEM48KHYODDJY4ChDoAQhWMAY#v=onepage&q=Research%20paper%20pdf%20on%20research%20hypothesis%20on%20cyber%20security%20system&f=false [Accessed 14 Sep. 2017].
Effiong, E. (2010). Cyber-crime control, prevention, and investigation. 1st ed. [ebook]. https://www.academia.edu/4259163/Cyber_Crime_Research_Proposal [Accessed 14 Sep. 2017].
Faris, R. (2010). Progress and research in cyber-security. 1st ed. [ebook]. https://royalsociety.org/~/media/policy/projects/cybersecurity-research/cybersecurity-research-report.pdf [Accessed 14 Sep. 2017].
Gasser, U. (2015). HPE Security Research. 1st ed. [ebook]. https://h20195.www2.hpe.com/V4/getpdf.aspx/4aa5-0858enn [Accessed 14 Sep. 2017].
Hoek, R. (2009). A roadmap for cyber-security research. 1st ed. [ebook]. https://www.dhs.gov/sites/default/files/publications/CSD-DHS-Cybersecurity-Roadmap.pdf [Accessed 14 Sep. 2017].
Levy, Y. (2014). An empirical study on the role of cyber-security skills on perceived need for action to migrate cyber misuse. 1st ed. [ebook]. https://cec.nova.edu/research/winter_2014_poster_session/documents/Anita%20Girton.pdf [Accessed 14 Sep. 2017].
Meushaw, R. (2012). Developing a blueprint for the science of cybersecurity. 1st ed. [ebook]. https://www.nsa.gov/resources/everyone/digital-media-center/publications/the-next-wave/assets/files/TNW-19-2.pdf [Accessed 14 Sep. 2017].
Salem, M. (2011). On the design and execution of cyber security user studies: Methodology, challenges, and lesson learned. 1st ed. [ebook]. https://ids.cs.columbia.edu/sites/default/files/CSET_2011_0.pdf [Accessed 14 Sep. 2017].
Shodhganga, S. (2010). Research Design and methodology. 1st ed. [ebook]. https://shodhganga.inflibnet.ac.in/bitstream/10603/40658/8/08_chapter%203.pdf [Accessed 14 Sep. 2017].
Tonge, A. (2013). Cyber security: challenges for cyber security: A literature review. 1st ed. [ebook]. https://www.iosrjournals.org/iosr-jce/papers/Vol12-issue2/K01226775.pdf?id=15 [Accessed 14 Sep. 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download