You are on page 1of 8

CYBER SECURITY

ASSIGNMENT 03

SUBMITTED TO:
Dr. Muhammad Rizwan
Assistant Professor
Computer Science Department

SUBMITTED BY:
Manahil Zaki (F18BSCS015)
Noveera Zubair (F18BSCS006)
Syeda Daniya Fatima (F18BSCS027)
Computer Science (Semester 6)
COURSE: Computer Networks

DATE:
18th May, 2021.
CYBER SECURITY
Manahil Zaki, Noveera Zubair, Syeda Daniya Fatima
Department of Computer Science
Kinnaird College for Women University
Lahore, Pakistan.

maha6309@gmail.com , noveerazubair26@gmail.com , sdf.df.dano@gmail.com

Abstract - The worldwide cyber threat and attack keeps on software and the information in which data is contain in
advancing at a quick speed, with a rising number of information order to protect it need to take measures of that data
penetrates every year. There has been an upsetting pattern in
network protection with attackers improving a lot quicker than
second is giving the guarantee of protecting the data from
protectors do. Cybercrime incorporates single entertainers or several threats and the third is implementing and
gatherings focusing on frameworks for monetary profit or to cause improving these tasks. It is important to understand the
disturbance. Perhaps, the most perilous kinds of malware makers concept of the cybersecurity as many people doesn’t get
are the hackers that make malevolent software programs with an the concept of it so that’s why it is misunderstood by them.
end goal to meet their own particular criminal targets. With Concept in which scope, application and its proper usage
cybercriminals utilizing such countless strategies to assault
clients' PCs and information, multi-layer protections are a need.
are included. In online system, cybersecurity can secure
The main challenge is to cater all the nature of attacks and issues. existing hardware, software, data and information in any
Implementing compelling cyber security protection measures is form of breach. As cybersecurity is not confined to
especially challenging today on the grounds that there are a bigger securing information in the IT industry but also to various
number of gadgets than individuals, and hackers are getting more other fields like cyberspace, restriction cannot be applied
inventive. In the present associated world, everybody profits from in the scope of cybersecurity. In present time, the scope of
cutting edge cyber defense programs. At a single level, a cyber-
security assault can bring about everything from fraud, to
cybersecurity is extended. It secures the electronic devices
coercion endeavors, to the deficiency of significant information and equipment. Moreover, the capacity of cybersecurity is
like family photographs. Everybody depends on basic foundation also extended towards by using advanced machine learning
like force plants, emergency clinics, and monetary help techniques, where it can identify cyber warfare and
organizations. Getting these and different associations is vital for individuals can be protected from cyber bulling. Nowadays
keeping our general public working. This paper presents the strict laws on cyber securities are being applied by many
importance of cyber security in multiple phases and explains man
risks which can be avoided in this world of internet and network.
nations and governments so that information which are
important will not be lost. Every person needs to be trained
on cybersecurity in order to save themselves from these
I. INTRODUCTION
threats [1].
Nowadays, Different kind of data like audio or message or
video that can be sent and received by people. But do you
ever wonder how our data is sent to another people safety
without leakage of any personal information? The answer
is well Cybersecurity [1]. The growth of topic that is
cybersecurity has been increased. It is a global concern
that is receiving sufficient awareness by citizens and users
of digital technologies [2]. The internet, information and
computer security that are assigned by the generic term
that is called cybersecurity. Cyber Security offers security,
from unauthorized access or exploitation, through online
services to the massive data, associated appliances and
network that is used for communication. Cloud computing,
mobile computing-commerce that are innovative
technologies also need security of high level as security of
data will always be top priority measures of the
organization. As these technologies contain information
about people so their security is a must thing that need to
take care as soon as possible. In order to protect the data
from attacks, mean that to prevent the loss of any private,
personal or government data then cybersecurity needs to
focus on three main tasks that are first the equipment,
Figure 1. Architecture Diagram

Content
Servers

iOS or Wifi access point BlackBerry Firewall


Web Servers
Android Infrastructure
device Universal
Device
Services

iOS or Mobile Microsoft


Android Networks ActiveSync
device

II. LITERATURE REVIEW

We studied a research paper about the past of cyber understand. The conversation concerning cybersecurity
security and how it began in the mid 1980s. It has been has reached every social levels and classifications. Once,
more than half a century since the issue of Cybersecurity a long time back, security was related with the
is developed. In the mid-1980, a famous cuckoo’s egg earthbound, sea, and flying powers, mechanical
incident happened where foreign spies had found new advancement and the digitalization of life has directed to
ways to acquire information so the question is what was the mix of the everyday and business zones of the
new? [9] (The substructure and technological internet in the security banter. Legislators, planners and
environment). As it was mid 1990’s, the evolution of security specialists concur that a worldwide war is at
information technology from moderate use of standalone present on-going, a war that expects to be a distinctive
systems to internet development and networks piece, and that drives its battles through enlightening and
connecting all over the world. There were cyber-crimes innovative weapons. The potential casualties are not just
incidents of 21000 cases. Cybersecurity and privacy the public foundations or official sites but also standard
issues are of big concern for end users. In this way, there people. Burkell, J, Fortier, A, Wong, LYC. (2014) in
is a string of logical research that tries to distinguish their research paper, Facebook: public space, or private
sorts of perspectives, abilities and practices with data space, talked about how safe or unsafe people are on
protection available on the Internet. The cybersecurity social platforms like Facebook [10]. They aimed to
banter as far as we might be concerned today began in comprehend how power we have on the information we
the US during the 1990s, from where it consequently share on online social places. They interviewed multiple
spread to other developed nations and showed itself on groups of people to understand their interest towards the
security strategy plans in an assortment of structures [9]. respective application, and asked what expectations they
Protection and security of the information will have when they post their pictures, give personal
consistently be top safety efforts that any association information, or anything related to their privacy. And all
takes care of. We are as of now living in a world where of them had different concerns related to it. The people
all the data is kept up in an advanced or a digital who are very social wanted to have an “image control”
structure. Social Networking sites give a space where whereas the ones who were a little more private wanted
clients have a sense of security as they connect with to keep their data only to themselves or close friends and
loved ones. On account of home clients, digital crooks family [13]. We went through the different research
would proceed to target online media locales to take papers. After analyzing these papers, we get to know the
individual information. Social networking as well as most commonly trends that has massive impact on cyber
during bank exchanges an individual should take all the security are the following [11]:
required safety efforts. The point of our paper is to  Web servers
notice the public discernments towards network safety,  Mobile network
the degrees of information in regards to the potential  Blueberry infrastructure
dangers experienced in the online circle, and  Cloud computing
furthermore the customary preventive exercises they
These trends have been used in research publications messages entering or leaving the web go through the
dated from 2016 to 2021. We can prevent these cyber- firewall present, which looks at each message and
crimes by using some technique like: squares those that do not meet the predefined security
 Firewalls rules. Subsequently firewalls assume a significant part
 Access control and password security 
in detecting and taking out the malware.
 Authentication of data
 Protecting the information in an encrypted Anti-Virus Software

An Antivirus is a sort of programming used to forestall,


III. CYBERSECURITY TECHNIQUES check, recognize and erase infections from a PC. Once
Organizations should utilize diverse cybersecurity introduced, most antivirus programming runs
measures to keep their business information, their consequently behind the scenes to give continuous
capital and their clients safe on the web. These actions insurance against infection assaults. Most antivirus
should mean to keep chances from different sources, programs incorporate an auto-update highlight that
including, web borne assaults, i.e, dangerous attacks, empowers the program to download profiles of new
like malware. client created shortcomings, e.g infections so it can check for the new infections when
effectively speculated secret key or lost data innate they are found. An enemy of infection programming is
framework or programming defects and weaknesses an unquestionable requirement and fundamental need
undercut framework or programming highlights. for each framework.
Network protection is acquiring conspicuousness in the Digital Signatures
light of expanding number of unapproved endeavors to
burst into private information with the express point of Computerized marks or Digital Signature can be raised
taking something similar to threaten or force clients out of the very numerical calculations that are utilized
into information blackmailing. So to keep the in asymmetric encryption. A client can test that he has
information intact and secure with the safety of the a private key by getting some data encoded with it.
client multiple techniques are used which are explained Anybody can get the equivalent decoded by having the
below. public key that will confirm the individual's
qualifications. This interaction is basically the specific
Passwords and Access Controls proportional of public key encryption and similarly
This crucial network safety and cybersecurity works with the understanding that the approved client
procedure means to check the identity of client just has the private key.
dependent on the qualifications put away in the security
area of the framework. The most well-known method
of administration is password technology as a facility. IV. WORKING
Although, there are various different executions like
Cybersecurity is intended to give various layers of
the SIM card embedded in anybody's phone. SIM cards
assurance across the entirety of the PCs, organizations,
are furnished with special ID numbers which are
and projects utilized by a business. To make a brought
ignored a protected correspondence line for ID of a
together protection against potential cyberattacks, it is
specific PDA. The primary test experienced in
significant that the business, representatives, cycles, and
confirming interaction is upsetting endeavors of
innovation are intended to work flawlessly together.
unapproved individuals to snoop on the verifying
Online protection frameworks that capacity
message. The secret word sent over a shaky medium is
appropriately will actually want to recognize, explore,
at risk to be captured by untrustworthy individuals who
and resolve likely shortcomings and weaknesses in the
can utilize it to camouflage as the first client. This issue
framework before they can be misused by a programmer
is countered by encryption.
or vindictive programming.
Firewalls

A firewall is a software or piece of equipment that


assists window with hackers and dangerous
programmers, infections, furthermore, worms that
attempt to arrive at your PC over the Internet. All
YEAR TOPIC PROPOSED SOLUTION STRENGTH WEAKNESS

To prevent and reduce the


damage from cyber-attack These laws are not effective
Using laws for preventing
Build an effective by responding to it and enough ,these needs to be
2016 the cybersecurity and
and secure protecting information via modify ,international
[14] creating secure cyber
cybersecurity combination of people, cooperation is need in order
ecosystem.
cooperation and to handle cyber threats.
institutional structure.
CERTs will be set up
mainly at national and
governmental levels, and Most of the CERTs are in
Overview of Cyber
these organizations are communication with each But that leads to unwanted
2016 Security
involved in incident other. and false information
response management and
advisories at higher levels

Some very important


changes to the protocol
IPv6 is a wholesale which need to be considered
Competitive Cyber-
IPv6: New internet protocol replacement in making more in security policy because
security
2016 IP addresses available that may affect the
performance and have a
increase

As the quantity of
applications accessible in the
A Study of Cyber The world is slowly moving
cloud develops, strategy
Security Challenges towards the clouds. So it
Moving data on cloud and controls for web applications
and Its Emerging data will be gathered at one
2017 protecting a specific and cloud administrations
Trends On Latest place and will be easy to
network. will likewise have to
Technologies handle.
advance to prevent the loss
of significant data.

To protect data, privacy and Not providing a guidelines


A survey on
security we need to install about parental locking and
cybersecurity To provides whole
antivirus with firewall. website blocking as it is
2019 awareness concerns, understanding on cyber
There they tries to guide us most affected cause of
practices and security awareness
how to secure our data from cybercrimes are cookies and
conceptual measures
cybercrime. macros.
Trusting recommendations is
Provides a useful look into not helpful if the people who
initial cyber security recommend them are unwise
Providing different
adoption behavior in private themselves. Technical
Trust in cyber methods to create public
contexts and that communicators in cyber
2019 security cyber security awareness
professional communicators security find ways to
recommendations through professional
may find it useful to design establish themselves as
communication.
strategies to heighten cyber experts to differentiate
security awareness. themselves from fake
advisors.
Deep Clustering, a machine
Unable to determine the
Deep Self- learning method combines Use machine learning to
difference in the
Supervised auto-encoder and extract threat intelligence
2020 characteristic of the clusters
Clustering of the clustering, is applied to the efficiently from the dark
[15] that have a mix of posts
Dark Web for Cyber extracted features by which web as an active defense
related to malware and other
Threat Intelligence posts are classified into against cyberattacks.
posts.
each clusters.
References

[1] G. Nikhita Reddy and G. J. Ugander Reddy, “A Study of Cyber


Security Challenges and Its Emerging Trends on Latest Technologies,”
International Journal of Engineering and Technology,4, 2014.

[2] R.-G. Zamfirescu, C. Rughinis, A. Hosszu, and D. Cristea, “Cyber-


security profiles of European users: A survey,” in 2019 22nd International
Conference on Control Systems and Computer Science (CSCS), 2019.

[3] K. Thakur, M. Qiu, K. Gai, and M. L. Ali, “An Investigation on


Cyber Security Threats and Security Models,” 2015, p. 71. 2nd
International Conference on Cyber Security and Cloud Computing.

[4] R. M. A. Mohammad and M. M. Abdulqader, “Exploring cyber


security measures in smart cities,” in 2020 21st International Arab
Conference on Information Technology (ACIT), 2020.

[5] H. Suryotrisongko and Y. Musashi, “Review of cybersecurity


research topics, taxonomy and challenges: Interdisciplinary perspective,”
in 2019 IEEE 12th Conference on Service-Oriented Computing and
Applications (SOCA), 2019.

[6] S. S. Tirumala, M. R. Valluri, and G. A. Babu, “A survey on


cybersecurity awareness concerns, practices and conceptual measures,” in
2019 International Conference on Computer Communication and
Informatics (ICCCI), 2019.

[7] S. Z. Sajal, I. Jahan, and K. E. Nygard, “A survey on cyber security


threats and challenges in modem society,” in 2019 IEEE International
Conference on Electro Information Technology (EIT), 2019.

[8] J. Nakayama, N. Plettenberg, P. Halbach, L. Burbach, M. Ziefle,


and A. Calero Valdez, “Trust in Cyber Security Recommendations,” in
2019 IEEE International Professional Communication Conference
(ProComm), 2019.

[9] Myriam Dunn, “Background paper: A comparative analysis of cyber


security initiatives worldwide”, itu.int.

[10] R.-G. Zamfirescu, C. Rughinis, A. Hosszu, and D. Cristea, “Cyber-


security profiles of European users: A survey,” in 2019 22nd International
Conference on Control Systems and Computer Science (CSCS), 2019.

[11] G. Nikhita Reddy and G. J. Ugander Reddy, “A study of Cyber


Security challenges and its emerging trends on latest technologies,” 2014.

[12] H. Aldawood and G. Skinner, “Educating and raising awareness on


cyber security social engineering: A literature review,” in 2018 IEEE
International Conference on Teaching, Assessment, and Learning for
Engineering (TALE), 2018.

[13] G. Nikhita Reddy and G. J. Ugander Reddy, “A study of cyber


security challenges and its emergning trends on latest technologies,”
Arxiv.org.

[14] Seymour E. Goodman and Herbert S. Lin, editors. Toward a


Saferand More Secure Cyberspace. National Academies Press, 2007.

[15] M. Kadoguchi, H. Kobayashi, S. Hayashi, A. Otsuka, and M.


Hashimoto, “Deep self-supervised clustering of the dark web for cyber
threat intelligence,” in 2020 IEEE International Conference on
Intelligence and Security Informatics (ISI), 2020,

You might also like