Article

Research Paper on Cyber Security

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

In the current world that is run by technology and network connections, it is crucial to know what cyber security is and to be able to use it effectively. Systems, important files, data, and other important virtual things are at risk if there is no security to protect it. Whether it is an IT firm not, every company has to be protected equally. With the development of the fresh technology in cyber security, the attackers similarly do not collapse behind. They are consuming better and enhanced hacking techniques and aim the weak points of many businesses out there. Cyber security is essential because military, government, financial, medical and corporate organizations accumulate, practise, and stock unprecedented quantities of data on PCs and other devices. An important quota of that data can be sensitive information, whether that be financial data, intellectual property, personal information, or other various kinds of data for which illegal access or acquaintance could ensure negative concerns.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... An effective cybersecurity process involves numerous layers of protecting tools across networks, computers, programs, or information. The methods, the people, and the tools must all accompany one alternative to generate a reliable defense before or after cyber-attacks (Sheth, 2021). ...
... Under current circumstances of remote working and online usage of financial services, the obligation to ensure safe and fluent processes is becoming one of the top priorities for financial institutions. Moreover, Sheth (2021) also claims that in their research, it is important to identify different layers of tools that are dedicated to protecting networks and information. The attention should be focused especially on the human factor because training and knowledge of employees are the key factors leading to a secure work environment. ...
Article
Full-text available
Constantly evolving high technologies provide new approaches to business development and deliver unknown business risks. Online financial services and operations are integral to everyday life, making cyber risk one of the most relevant risks for the financial sector’s companies. As the survey conducted by the National Bank of Lithuania at the end of 2018 showed, the possibility of cyber threats and presumable effects on the financial system in Lithuania is one of the critical problems that should be prioritized. Therefore, it is essential to clarify what potential cyber threats in financial sector companies are considered the most significant and likely to occur. As well as identify how companies in the financial sector estimate their dispositions and preparedness for this cyber risk management and control. The findings of this research are significant for financial institutions as a tool to adopt their cyber risk management processes, increase preparedness and cyber security, and identify the possible threats to the organization.
... Shrestha and Adhikari (2019) pointed out that if proper security solution is not implemented, the intruder can take advantage and get into the system through faked MAC addresses, unknown stations and illegitimate access points. To address the aforementioned threats, there must be an information security infrastructure mechanism that will offer three essential security objectives which are confidentiality, integrity and availability (Sheth, 2021;Choi, 2008). The three objectives ensure that only authorized users can get into the system, see what is intended for that user and change data and information delegated to change (Parte, 2012). ...
Article
Full-text available
This study conducted a comprehensive analysis of the Wi-Fi security at the National Institute of Transport in Dar es Salaam, Tanzania. The study used the experimental research design. The study involved testing a variety of devices, including 30 traditional Access Points and 10 smartphones, which can act as access points for other devices. The study utilized a total of 40 devices, selected through convenient sampling. Among these devices, 30 were traditional Access Points and 10 were smartphones acting as Access Points. The primary tool used in this study was a software called Instabridge, which was employed to collect information on wireless networks. The software gathered the names of the wireless networks for further analysis. The experimental process was divided into two main phases: Password extraction and Pairing of Devices. In the Password extraction phase, a smartphone equipped with the Instabridge software was used to collect information on the wireless network which are names and assessed the security of the passwords used. The software detected active devices offering wireless services and could easily unveil the passwords with a single click. In the Pairing of Devices phase, the passwords gathered from the wireless devices were used for authentication. The devices were successfully connected to the access points using the extracted passwords. The study indicated lack of proper security measures, with a significant majority of access points using unencrypted passwords for authentication. To address the existing shortcomings, respective recommendations were made.
... Shrestha and Adhikari (2019) pointed out that if proper security solution is not implemented, the intruder can take advantage and get into the system through faked MAC addresses, unknown stations and illegitimate access points. To address the aforementioned threats, there must be an information security infrastructure mechanism that will offer three essential security objectives which are confidentiality, integrity and availability (Sheth, 2021;Choi, 2008). The three objectives ensure that only authorized users can get into the system, see what is intended for that user and change data and information delegated to change (Parte, 2012). ...
Article
Full-text available
This study conducted a comprehensive analysis of the Wi-Fi security at the National Institute of Transport in Dar es Salaam, Tanzania. The study used the experimental research design. The study involved testing a variety of devices, including 30 traditional Access Points and 10 smartphones, which can act as access points for other devices. The study utilized a total of 40 devices, selected through convenient sampling. Among these devices, 30 were traditional Access Points and 10 were smartphones acting as Access Points. The primary tool used in this study was a software called Instabridge, which was employed to collect information on wireless networks. The software gathered the names of the wireless networks for further analysis. The experimental process was divided into two main phases: Password extraction and Pairing of Devices. In the Password extraction phase, a smartphone equipped with the Instabridge software was used to collect information on the wireless network which are names and assessed the security of the passwords used. The software detected active devices offering wireless services and could easily unveil the passwords with a single click. In the Pairing of Devices phase, the passwords gathered from the wireless devices were used for authentication. The devices were successfully connected to the access points using the extracted passwords. The study indicated lack of proper security measures, with a significant majority of access points using unencrypted passwords for authentication. To address the existing shortcomings, respective recommendations were made.
... Por ende, es de suma importancia asistir a este tema de manera minuciosa y contar con estrategias que se adapten a las exigencias actuales permitiendo contrarrestar cualquier diversidad de ciberataques que puedan perturbar o buscar destruir las infraestructuras estatales o hasta generar una ciberguerra (Aguilar, 2019). La propuesta de estrategia para la ciberseguridad del estado peruano se debe caracterizar por estar cimentada en un sistema participativo y cooperativo, alentando e integrando la participación conjunta de diversos agentes, tales como la ciudadanía, instituciones y organizaciones públicas y privadas, así como mi litares activos y hasta la comunidad internacional, todo ello con la finalidad de que se desarrolle un programa Página 69 eficaz ante cualquier ataque y que procure reducir la brecha en la capacidad de respuesta (Sheth, Bhosale y Kurupkar, 2021). Para reforzar la capacidad cibernética nacional es necesario que exista la separación de las redes internas del Estado de la Internet pública. ...
Article
Full-text available
La ciberdefensa y la ciberseguridad se han convertido en pilares para mantener la estabilidad y el normal funcionamiento de cualquier país, por ende, se consideran áreas claves dentro de los estudios estratégicos. Frente a esa demanda, el Perú no ha sabido desarrollar este sector. Actualmente, el país no cuenta con una inversión destinada a promover los sistemas de seguridad y la defensa cibernética. Si bien la región Latinoamericana tiene poca incidencia en conflictos cibernéticos a gran escala, es importante destacar que la seguridad nacional podría verse vulnerada de no nivelarse a las exigencias actuales. La metodología empleada para el desarrollo del presente constó en la revisión documental, concluyéndose que para alcanzar eficientes estrategias de ciberdefensa y ciberseguridad es necesario un sistema que permita la integración y cooperación de los sectores públicos, privados y militares, lo que hace posible la unión de fuerzas aisladas para alcanzar los objetivos de seguridad nacional.
Conference Paper
Full-text available
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by novel incorporation of three techniques: Support Vector Machine (SVM), Natural Language Processing (NLP) and Random Forest (RF). Utilizing NLP for deep analysis of text in phishing e-mails, SVM for strong categorization and Random Forest's decision making by group helps in improving detection. This combination of language and pattern analysis along with group learning builds a fortified system. This approach differs from prior work on a variety of factors such as reliability, security, integrity, scalability, interpretability, transparency, and robustness. Thorough evaluation on a reliable dataset aimed to demonstrate the method's effectiveness, which resulted in 98.7 % of accuracy in detection. This majorly aims at showcasing the potential of ensemble techniques to combat against cyber-attacks like phishing for laying a strong foundation for a secure digital environment.
Article
At present, millions of people use mobile phones and computers in their daily lives. They are using these devices for online shopping, banking transactions, online gaming, share market, etc. Sometimes people have no knowledge of cybercrime and are easy victims of cyber-related fraud. This paper discusses different types of cybercrime, such as identity theft, cyberstalking, cyberbullying, financial fraud, and the importance of cybersecurity techniques including risk management, internal audit, and the benefits of a cybersecurity audit. The conclusion emphasizes the importance of expanding cybersecurity measures to protect against evolving cyber threats.
Article
Full-text available
Understanding cyber security and how to put it to use is vital in today's technologically and network-connectedly driven society. Without proper safeguards in place, critical systems, files, data, and other digital assets are at risk of being compromised. The same level of security is required for all businesses, regardless of whether or not they specialize in IT. Even as new cyber security technology emerges, cybercriminals remain one step ahead. As a result, they are using more sophisticated hacking methods to target the vulnerabilities of numerous companies. Due to the accumulation, practice, and storage of vast amounts of data on PCs and other devices by military, political, financial, medical, and corporate institutions, cyber security is vital. Financial data, intellectual property, personal information, and other types of data for which unauthorized access or acquaintance could assure negative worries may make up a sizeable portion of that data.
ResearchGate has not been able to resolve any references for this publication.