Publicité
Research Thesis Questions.docx
Research Thesis Questions.docx
Research Thesis Questions.docx
Research Thesis Questions.docx
Publicité
Research Thesis Questions.docx
Research Thesis Questions.docx
Research Thesis Questions.docx
Research Thesis Questions.docx
Research Thesis Questions.docx
Publicité
Research Thesis Questions.docx
Prochain SlideShare
Cyber.pptxCyber.pptx
Chargement dans ... 3
1 sur 10
Publicité

Contenu connexe

Publicité

Research Thesis Questions.docx

  1. [Document title] [Year] [DOCUMENT SUBTITLE] HARIS WAHEED [COMPANY NAME] | [Company address]
  2. Contents Introduction.............................................................................................................................................0 Literature Review....................................................................................................................................0 1. Security Threats posed by the Internet........................................................................................0 2. Cyber Monitoring Approaches....................................................................................................1 3. Benefits of Cyber Monitoring.....................................................................................................2 4. Challenges of Cyber Monitoring.................................................................................................2 5. Best Practices for Implementing Cyber Monitoring ...................................................................3 6. Role of Government in Web Security & Cyber Monitoring.......................................................4 Conclusion ..............................................................................................................................................4 References...............................................................................................................................................5
  3. Introduction The internet has become an indispensable part of modern society and has revolutionized the way we communicate, work, and transact. However, the internet has also given rise to security threats that pose a serious risk to individuals, businesses, and governments. These threats include malware, phishing, social engineering, spoofing, and advanced persistent threats. To counteract these threats, organizations have turned to cyber monitoring, which involves the use of techniques such as network traffic analysis, data mining, log analysis, and intrusion detection. Cyber monitoring has numerous benefits, including early detection of threats, increased security awareness, and improved security practices. However, cyber monitoring also has its challenges, such as increased costs, false positives, and limitations of existing technology. Despite these challenges, organizations can implement best practices to ensure effective cyber monitoring. These practices include developing a comprehensive security plan, monitoring network traffic and logs, and using automated systems. In addition to the private sector, the government plays an important role in web security and cyber monitoring. The government can establish standards, provide security resources, and pass laws and regulations that govern cybersecurity. By working together, the government and private sector can protect the internet from security threats and ensure its continued growth and development. Literature Review 1. Security Threats posed by the Internet 1. Malware: Malware, short for malicious software, refers to any program or code that is intentionally designed to harm or exploit a computer system. This can include viruses, worms, Trojans, and other types of malicious software that can compromise the security and privacy of a computer system. The impact of malware on computer systems and networks can be significant. It can compromise the confidentiality, integrity, and availability of sensitive information, disrupt normal operations, and cause financial losses through theft or extortion. The prevalence of malware has also led to the emergence of sophisticated malware variants, such as advanced persistent threats (APTs), that are specifically designed to target high-value targets such as governments and large corporations[1] . 2. Phishing: Phishing is a form of social engineering that involves tricking individuals into divulging sensitive information such as login credentials, credit card numbers, and other personal information. This is usually done by creating fake websites or emails that appear to be from a trusted source, and then convincing the victim to enter their information into the fake site.
  4. 3. Social Engineering: Social engineering is a broad term that encompasses various methods used to manipulate individuals into divulging confidential information. This can include phishing attacks, but also encompasses other tactics such as baiting, scareware, and pretexting. 4. Spoofing: Spoofing is a type of cyberattack that involves impersonating a trusted source to gain access to sensitive information. This can include IP spoofing, where an attacker uses a fake IP address to disguise their true identity, and email spoofing, where an attacker sends an email that appears to be from a trusted source but is actually from an attacker[13] . 5. Advanced Persistent Threats (APTs): APTs refer to a type of cyberattack that is specifically designed to target organizations or individuals over an extended period of time. This is usually done by using a combination of malware, social engineering, and other tactics to gain access to sensitive information, and then using that information to perpetrate further attacks[16] . These are the most common security threats posed by the Internet, and it is important for individuals and organizations to be aware of them in order to take the necessary steps to protect themselves and their information. 2. Cyber Monitoring Approaches These are the most common approaches used in cyber monitoring, and each approach has its own strengths and limitations. 1. Network Traffic Analysis: Network traffic analysis is a method of monitoring and analyzing network traffic to identify potential security threats. This involves capturing and analyzing network packets in real-time, or after the fact, to identify unusual or suspicious behavior. Network traffic analysis can help organizations detect intrusions, unauthorized access attempts, and other security threats that may be difficult to detect through other means. 2. Data Mining: Data mining is a process of discovering patterns and relationships in large datasets to identify potential security threats. This can involve analyzing log files, network traffic, and other sources of data to identify unusual or suspicious behavior, such as an increase in login attempts from a specific IP address. Data mining can help organizations detect security threats by identifying anomalies in large amounts of data that would otherwise go unnoticed. 3. Log Analysis: Log analysis involves collecting and analyzing log data generated by computer systems, networks, and applications. This can include logs generated by firewall and intrusion detection systems, web
  5. servers, and other sources. Log analysis can help organizations detect security threats by identifying patterns of behavior, such as an increase in failed login attempts or unauthorized access attempts, that may indicate a security breach. 4. Intrusion Detection: Intrusion detection is a process of identifying unauthorized access attempts or other security threats in real-time. This can involve using intrusion detection systems (IDS) or intrusion prevention systems (IPS) to analyze network traffic in real-time and identify suspicious behavior, such as an attempted network scan or a brute force login attempt. Intrusion detection can help organizations detect and respond to security threats in a timely manner, reducing the risk of a security breach[15] . 3. Benefits of Cyber Monitoring 1. Early Detection of Threats: Cyber monitoring allows organizations to detect security threats in real-time or near real-time, allowing them to respond quickly and mitigate the risk of a security breach. This early detection can help organizations reduce the impact of security threats and minimize the damage caused by a security breach. 2. Increased Security Awareness: By monitoring network traffic, logs, and other sources of data, organizations can gain a better understanding of the security risks they face, including the types of threats they are most likely to encounter and the methods attackers may use to penetrate their systems. This increased security awareness can help organizations implement more effective security measures and improve their overall security posture[14] . 3. Enhanced Security Practices: Cyber monitoring can also help organizations improve their security practices by providing them with the information they need to make informed decisions about their security policies and procedures. For example, by analyzing log data, organizations can identify areas where their security practices are lacking, such as weak passwords or ineffective access controls, and take steps to address these issues. 4. Challenges of Cyber Monitoring 1. Increased Costs: Implementing and maintaining a cyber monitoring system can be expensive, particularly for organizations that have limited resources or complex network architectures. The costs associated with cyber monitoring can include hardware and software expenses, personnel expenses, and training costs[12] . 2. False Positives: One of the challenges of cyber monitoring is the high rate of false positives, which occur when a monitoring system identifies a threat that is not actually present. This can
  6. lead to increased workload for security personnel and a lower level of trust in the monitoring system, which can result in security threats being overlooked or ignored. 3. Limitations of Existing Technology: The technology used for cyber monitoring is rapidly evolving, and organizations often struggle to keep pace with the latest developments. Existing cyber monitoring systems can be limited in terms of their accuracy, scalability, and ability to process large amounts of data in real-time. Additionally, some monitoring systems may be unable to detect certain types of threats or may produce a high rate of false positives, which can lead to increased workload for security personnel and decreased efficiency[7] . 5. Best Practices for Implementing Cyber Monitoring 1. Develop a Comprehensive Security Plan: Implementing a successful cyber monitoring system requires a clear understanding of the organization's security requirements, the threats that it faces, and the resources available to mitigate those threats. Organizations should develop a comprehensive security plan that outlines their security objectives, the resources required to meet those objectives, and the steps that will be taken to achieve those objectives[11] . 2. Monitor Network Traffic and Logs: Organizations should monitor all network traffic, including inbound and outbound traffic, to identify unusual activity and potential security threats. This can be accomplished through the use of network monitoring tools that are capable of capturing and analyzing network traffic in real-time. Additionally, organizations should collect and analyze log data from their network devices, including firewalls, routers, and servers, to identify any security incidents that may have occurred[20] . 3. Use Automated Systems: Organizations can increase the efficiency and accuracy of their cyber monitoring efforts by using automated systems, such as intrusion detection systems and security information and event management (SIEM) systems. These systems can collect, correlate, and analyze log data from multiple sources in real-time, providing a centralized view of the organization's security posture. Additionally, automated systems can be configured to respond to security incidents in real- time, reducing the time required for manual intervention and improving the overall speed and effectiveness of the organization's response to security incidents[6] .
  7. 6. Role of Government in Web Security & Cyber Monitoring 1. Establishing Standards: Governments play a crucial role in establishing standards for web security and cyber monitoring. These standards ensure that organizations are taking the necessary measures to protect sensitive information and to prevent security incidents from occurring. Standards can also provide organizations with guidance on the best practices for implementing security measures and can help to ensure that security measures are consistent across different organizations[10] . 2. Providing Security Resources: Governments can provide organizations with security resources, including funding for security research and development, training for security professionals, and access to security technologies. These resources can help organizations to improve their security posture and to better protect against security threats. Additionally, governments can provide organizations with access to security experts and specialized security services, such as incident response teams and threat intelligence services[9] . 3. Establishing Laws and Regulations: Governments play a critical role in establishing laws and regulations to protect the security of sensitive information and to prevent security incidents from occurring. These laws and regulations can include data protection laws, cybersecurity laws, and regulations on the use of encryption. By establishing these laws and regulations, governments can create a legal framework that incentivizes organizations to take the necessary measures to protect sensitive information and to prevent security incidents from occurring[1] . Conclusion The rapid growth of the internet has brought with it numerous security threats that organizations must address to protect their assets and reputation. To address these threats, organizations have adopted various forms of cyber monitoring, including network traffic analysis, data mining, log analysis, and intrusion detection. These approaches have many benefits, including early detection of threats, increased security awareness, and improved security practices. However, there are also challenges associated with cyber monitoring, such as increased costs, false positives, and limitations of existing technology[18] . Despite these challenges, organizations can maximize the benefits of cyber monitoring by following best practices such as developing a comprehensive security plan, monitoring network traffic and logs, and using automated systems. The role of the government in
  8. web security and cyber monitoring is also important, as it can establish standards, provide security resources, and create laws and regulations that promote a secure online environment[19] . References [1] Mishra, A., Alzoubi, Y.I., Anwar, M.J. and Gill, A.Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, p.102820. doi:10.1016/j.cose.2022.102820. [2] Knowles, M. (2021). Cybersecurity Risk Management: Frameworks, Plans, & Best Practices. [online] Hyperproof. Available at: https://hyperproof.io/resource/cyberse curity-risk-management-process/. [3] katharina.kiener-manu (2019). Cybercrime Module 3 Key Issues: The Role of Cybercrime Law. [online] Unodc.org. Available at: https://www.unodc.org/e4j/en/cybercri me/module-3/key-issues/the-role-of- cybercrime-law.html. [4] IBM (2021). What is data security? Definition, solutions and how to secure data. [online] www.ibm.com. Available at: https://www.ibm.com/topics/data- security. [5] Synopsys (2019). What is Security Risk Assessment and How Does It Work? | Synopsys. [online] Synopsys.com. Available at: https://www.synopsys.com/glossary/w hat-is-security-risk-assessment.html. [6] Dalgaard, M. (n.d.). What is SIEM? A complete guide to Security Information and Event Management. [online] LogPoint. Available at: https://www.logpoint.com/en/understa nd/what-is-siem/. [7] Utica University (2020). Ten Ways Evolving Technology Affects Cybersecurity. [online] Utica College. Available at: https://programs.online.utica.edu/reso urces/article/ten-ways-evolving- technology-affects-cybersecurity. [8] Cooper, S. (2019). 10 top network intrusion detection tools for 2018. [online] Comparitech. Available at: https://www.comparitech.com/net- admin/network-intrusion-detection- tools/. [9] Tunggal, A.T. (2019). Why is Cybersecurity Important? [online] Upguard.com. Available at: https://www.upguard.com/blog/cybers ecurity-important. [10] Ursillo, S. and Arnold, C. (2019). Cybersecurity Is Critical for all Organizations – Large and Small. [online] IFAC. Available at: https://www.ifac.org/knowledge-
  9. gateway/preparing-future-ready- professionals/discussion/cybersecurity -critical-all-organizations-large-and- small. [11] Swanagan, M. (2022). How To Develop An Effective Cyber Security Strategy. [online] PurpleSec. Available at: https://purplesec.us/learn/cyber- security-strategy/. [12] Jang-Jaccard, J. and Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, [online] 80(5), pp.973–993. doi:10.1016/j.jcss.2014.02.005. [13] Kaspersky (n.d.). What is IP Spoofing and How to Prevent It | Kaspersky. [online] www.kaspersky.com. Available at: https://www.kaspersky.com/resource- center/threats/ip-spoofing. [14] Cynet (n.d.). Network Attacks and Network Security Threats. [online] Cynet. Available at: https://www.cynet.com/network- attacks/network-attacks-and-network- security-threats/. [15] Mohanakrishnan, R. (2022). What Is Intrusion Detection and Prevention System? Definition, Examples, Techniques, and Best Practices. [online] Spiceworks. Available at: https://www.spiceworks.com/it- security/vulnerability- management/articles/what-is-idps/. [16] Rosencrance, L. (2021). What is advanced persistent threat (APT)? Definition from SearchSecurity. [online] SearchSecurity. Available at: https://www.techtarget.com/searchsec urity/definition/advanced-persistent- threat-APT. [17] Kaspersky (2013). Damage caused by malware. [online] Kaspersky.com. Available at: https://encyclopedia.kaspersky.com/kn owledge/damage-caused-by-malware/. [18] Ahmed N, Ngadi Abin, Sharif JM, Hussain S, Uddin M, Rathore MS, et al. Network threat detection using machine/Deep Learning in SDN-based platforms: A comprehensive analysis of state-of-the-art solutions, discussion, challenges, and future research direction [Internet]. MDPI. Multidisciplinary Digital Publishing Institute; 2022 [cited 2023Feb4]. Available from: https://www.mdpi.com/1424- 8220/22/20/7896 [19] Kaspersky. What is cyber security? [Internet]. www.kaspersky.com. 2023 [cited 2023Feb4]. Available from: https://www.kaspersky.com/resource- center/definitions/what-is-cyber- security [20] What is Network Traffic Analysis (NTA) and monitoring? [Internet]. Rapid7. [cited 2023Feb4]. Available from:
  10. https://www.rapid7.com/fundamentals /network-traffic-analysis/
Publicité