Professional Documents
Culture Documents
ASSIGNMENT 03
SUBMITTED TO:
Dr. Muhammad Rizwan
Assistant Professor
Computer Science Department
SUBMITTED BY:
Manahil Zaki (F18BSCS015)
Noveera Zubair (F18BSCS006)
Syeda Daniya Fatima (F18BSCS027)
Computer Science (Semester 6)
COURSE: Computer Networks
DATE:
18th May, 2021.
CYBER SECURITY
Manahil Zaki, Noveera Zubair, Syeda Daniya Fatima
Department of Computer Science
Kinnaird College for Women University
Lahore, Pakistan.
Abstract - The worldwide cyber threat and attack keeps on software and the information in which data is contain in
advancing at a quick speed, with a rising number of information order to protect it need to take measures of that data
penetrates every year. There has been an upsetting pattern in
network protection with attackers improving a lot quicker than
second is giving the guarantee of protecting the data from
protectors do. Cybercrime incorporates single entertainers or several threats and the third is implementing and
gatherings focusing on frameworks for monetary profit or to cause improving these tasks. It is important to understand the
disturbance. Perhaps, the most perilous kinds of malware makers concept of the cybersecurity as many people doesn’t get
are the hackers that make malevolent software programs with an the concept of it so that’s why it is misunderstood by them.
end goal to meet their own particular criminal targets. With Concept in which scope, application and its proper usage
cybercriminals utilizing such countless strategies to assault
clients' PCs and information, multi-layer protections are a need.
are included. In online system, cybersecurity can secure
The main challenge is to cater all the nature of attacks and issues. existing hardware, software, data and information in any
Implementing compelling cyber security protection measures is form of breach. As cybersecurity is not confined to
especially challenging today on the grounds that there are a bigger securing information in the IT industry but also to various
number of gadgets than individuals, and hackers are getting more other fields like cyberspace, restriction cannot be applied
inventive. In the present associated world, everybody profits from in the scope of cybersecurity. In present time, the scope of
cutting edge cyber defense programs. At a single level, a cyber-
security assault can bring about everything from fraud, to
cybersecurity is extended. It secures the electronic devices
coercion endeavors, to the deficiency of significant information and equipment. Moreover, the capacity of cybersecurity is
like family photographs. Everybody depends on basic foundation also extended towards by using advanced machine learning
like force plants, emergency clinics, and monetary help techniques, where it can identify cyber warfare and
organizations. Getting these and different associations is vital for individuals can be protected from cyber bulling. Nowadays
keeping our general public working. This paper presents the strict laws on cyber securities are being applied by many
importance of cyber security in multiple phases and explains man
risks which can be avoided in this world of internet and network.
nations and governments so that information which are
important will not be lost. Every person needs to be trained
on cybersecurity in order to save themselves from these
I. INTRODUCTION
threats [1].
Nowadays, Different kind of data like audio or message or
video that can be sent and received by people. But do you
ever wonder how our data is sent to another people safety
without leakage of any personal information? The answer
is well Cybersecurity [1]. The growth of topic that is
cybersecurity has been increased. It is a global concern
that is receiving sufficient awareness by citizens and users
of digital technologies [2]. The internet, information and
computer security that are assigned by the generic term
that is called cybersecurity. Cyber Security offers security,
from unauthorized access or exploitation, through online
services to the massive data, associated appliances and
network that is used for communication. Cloud computing,
mobile computing-commerce that are innovative
technologies also need security of high level as security of
data will always be top priority measures of the
organization. As these technologies contain information
about people so their security is a must thing that need to
take care as soon as possible. In order to protect the data
from attacks, mean that to prevent the loss of any private,
personal or government data then cybersecurity needs to
focus on three main tasks that are first the equipment,
Figure 1. Architecture Diagram
Content
Servers
We studied a research paper about the past of cyber understand. The conversation concerning cybersecurity
security and how it began in the mid 1980s. It has been has reached every social levels and classifications. Once,
more than half a century since the issue of Cybersecurity a long time back, security was related with the
is developed. In the mid-1980, a famous cuckoo’s egg earthbound, sea, and flying powers, mechanical
incident happened where foreign spies had found new advancement and the digitalization of life has directed to
ways to acquire information so the question is what was the mix of the everyday and business zones of the
new? [9] (The substructure and technological internet in the security banter. Legislators, planners and
environment). As it was mid 1990’s, the evolution of security specialists concur that a worldwide war is at
information technology from moderate use of standalone present on-going, a war that expects to be a distinctive
systems to internet development and networks piece, and that drives its battles through enlightening and
connecting all over the world. There were cyber-crimes innovative weapons. The potential casualties are not just
incidents of 21000 cases. Cybersecurity and privacy the public foundations or official sites but also standard
issues are of big concern for end users. In this way, there people. Burkell, J, Fortier, A, Wong, LYC. (2014) in
is a string of logical research that tries to distinguish their research paper, Facebook: public space, or private
sorts of perspectives, abilities and practices with data space, talked about how safe or unsafe people are on
protection available on the Internet. The cybersecurity social platforms like Facebook [10]. They aimed to
banter as far as we might be concerned today began in comprehend how power we have on the information we
the US during the 1990s, from where it consequently share on online social places. They interviewed multiple
spread to other developed nations and showed itself on groups of people to understand their interest towards the
security strategy plans in an assortment of structures [9]. respective application, and asked what expectations they
Protection and security of the information will have when they post their pictures, give personal
consistently be top safety efforts that any association information, or anything related to their privacy. And all
takes care of. We are as of now living in a world where of them had different concerns related to it. The people
all the data is kept up in an advanced or a digital who are very social wanted to have an “image control”
structure. Social Networking sites give a space where whereas the ones who were a little more private wanted
clients have a sense of security as they connect with to keep their data only to themselves or close friends and
loved ones. On account of home clients, digital crooks family [13]. We went through the different research
would proceed to target online media locales to take papers. After analyzing these papers, we get to know the
individual information. Social networking as well as most commonly trends that has massive impact on cyber
during bank exchanges an individual should take all the security are the following [11]:
required safety efforts. The point of our paper is to Web servers
notice the public discernments towards network safety, Mobile network
the degrees of information in regards to the potential Blueberry infrastructure
dangers experienced in the online circle, and Cloud computing
furthermore the customary preventive exercises they
These trends have been used in research publications messages entering or leaving the web go through the
dated from 2016 to 2021. We can prevent these cyber- firewall present, which looks at each message and
crimes by using some technique like: squares those that do not meet the predefined security
Firewalls rules. Subsequently firewalls assume a significant part
Access control and password security
in detecting and taking out the malware.
Authentication of data
Protecting the information in an encrypted Anti-Virus Software
As the quantity of
applications accessible in the
A Study of Cyber The world is slowly moving
cloud develops, strategy
Security Challenges towards the clouds. So it
Moving data on cloud and controls for web applications
and Its Emerging data will be gathered at one
2017 protecting a specific and cloud administrations
Trends On Latest place and will be easy to
network. will likewise have to
Technologies handle.
advance to prevent the loss
of significant data.