Professional Documents
Culture Documents
Cyber Security MGT
Cyber Security MGT
It cannot be denied that nowadays information is a very important asset for any
attained. During the research the menace caused by cyber security was
1
1.0 INTRODUCTION
In recent times, our society is increasingly relying on the internet and other
also create a loophole which may totally destroy an organization. The term
Although cyber security is not merely about the Internet; our dependence on
vital need to ascertain a proper and secured means of securing our data over the
is cybercrime that brings the need for cyber security (Chun Lee, 2000).
The modern techniques that are proliferating towards the use of internet activity
(Macki, 2009).
The activity involves like attacking on Information center Data System, theft,
child pornography built images, online transaction fraud, internet sale fraud and
2
also deployment in internet malicious activities such as virus, worm and third
party abuse like phishing, email scams etc. The universal approach of network
like internet at all levels of network needs to recover from committing illegal
activity in all over the world and to stop the criminal nature by protecting
offline control for every nation in order to monitor and prevent crimes carried
out in cyberspace. Network security controls are used to prevent the access of
encryption algorithms. Out of these, the virtual private network plays a vital role
(VPN) provides end users with a way to privately access information on their
network over a public network infrastructure such as the internet (Baure, 2001).
It is believed the first recorded cybercrime took place in the year 1820.This can
be true with the fact that, computer did exist since 3500 BC in India, China and
Japan. The modern computer began with the analytical engine of Charles
is visual. Cybercrime has gradually crippled our economy. It has hindered the
nation from progressing; many youth in Nigeria are now into cyber bullying and
3
2.0 LITERATURE REVIEW
who study cyber security are turning more of their attention to the two areas in
things (IoT) devices, such as smart TVs, voice assistants, connected baby
connected home not only gain access to users’ Wi-Fi credentials, but may
also gain access to their data, such as medical records, bank statements
ii. The Explosion of Data: Data storage on devices such as laptops and cell
phones makes it easier for cyber attackers to find an entry point into a
network through a personal device. For example, in the May 2019 book
4
Consequently, companies and government agencies need maximum cyber
security to protect their data and operations. Understanding how to address the
drive (spyware)
ii. Emotet: The Cyber security and Infrastructure Security Agency (CISA)
5
distributed DoS (DDoS) does the same thing, but the attack originates
disrupt the “handshake” process and carry out a DoS. Several other
techniques may be used, and some cyber attackers use the time that a
the traffic, they can filter and steal data, according to Cisco. MITM
network. Attackers insert themselves between the visitor and the network,
and then use malware to install software and use data maliciously.
trick the receiver into opening it and carrying out the instructions inside,
data like credit card and login information or to install malware on the
6
vi. SQL Injection: A Structured Query Language (SQL) injection is a type
vii. Password Attacks: With the right password, a cyber-attacker has access
attack that Data Insider defines as “a strategy cyber attacker’s use that
1) Educate Staff: Human error was the cause of 90% of data breaches in
2019. This concerning statistic, however, has a silver lining. If staffs are
taught how to identify and correctly respond to cyber threats, the majority
could also increase the value of all cyber security solution investments
2) Protect Your Sensitive Data: Invest in tools that limit information loss,
continuously scan for data exposure and leaked credentials. Data leaks, if
7
left unattended, could help cybercriminals gain access to internal
practices are sufficient to comply with GDPR and other regulation and to
8
3.0 METHODOLOGY
the threat, manage resources and implement solutions. The study will therefore
The above listed will be explored using various existing literatures, articles and
journals in order to save time and resources. This procedure involves the use of
9
4.0 RESULT AND DISCUSSION
Dealing with the adversary is one of the most challenging, yet intriguing and
that we can share about our own limitations, assumptions, and conditions, the
better for other researchers to pick up the mantle and move the research
forward.
Indeed quite the contrary, far too often, much research is done in the absence of
your own users) is doomed to fail. Cyber security research and development can
leverage the body of work that has gone before in other domains that study
10
context. In the end, this field is fraught with limitations and challenges, but as
interactions, the entire field is advanced and development can continue its
11
12
CONCLUSION
level for our great nation to break even. Several prominent cybercrimes and
causes have been discussed in this paper. Numerous ways have been proposed
on how to detect and prevent cybercrime, however much can still be done by
13