Cyber Security
Cyber Security
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
Cyber Security
P. H. Gopi Kannan, A. Karthik, M. Karthikeyan
Student, Sri Krishna Adithya College of Arts and Science, Bharathiar University, Coimbatore, Tamil Nadu, India
@ IJTSRD | Unique Paper ID – IJTSRD33483 | Volume – 4 | Issue – 6 | September-October 2020 Page 658
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Encryption system to attempt access using the requisite key. So in
Firewalls summary a breach of confidentiality means that someone
Monitored internet access gain access to the information who shouldn’t have access to
it.
Cloud Security:
Improved Cyber Security is one of the main reasons why the Integrity:
cloud is taking over. Cloud security is the software-based Cyber Security efforts should ensure information remains
security tool that protects and monitors the data in your accurate, consistent and subject not to unauthorized
cloud resources. Cloud providers are constantly creating and modification. Consistency, accuracy and trustworthiness of
implementing new security tools to helps the enterprise data should be maintained over its lifecycle. Sensitive data
users better secure their data. It’s the protection of data should not be altered in transit, and security measures, such
stored online via cloud computing platforms from theft, as file permissions and user access controls, should be taken
leakage and deletion. Several methods of providing cloud to make sure that it cannot be modified by unauthorized
security include firewalls, penetration testing, obfuscation, users. The failure of integrity is when you try to connect to
tokenization, virtual private networks (VPN), and avoiding your website and a malicious attacker between you and the
public internet connections. The report further finds that website redirects your traffic to the different website. In that
On -premise environment users experience an average case, the site you are directed to is not genuine. In addition,
of 61.4 attacks. backups or redundancy plans should be planned and
Service provider environment customers experienced implemented to restore any affected data in case of integrity
an average of 27.8 attacks. failure or security breach in order to restore data back to its
correct state.
Without the time and cost of high maintaining huge data
facilities and the risk of security breaches is minimal. Availability:
Efforts to secure information in cyberspace should not
Internet Of Things Security (IOT) hinder its access by an authorized party. Additionally Cyber
IOT refers to a wide variety of critical and non-critical cyber Security implementation has to provide redundancy access
physical systems, like appliances, sensors, televisions, wifi - in case of any outage. It is best guaranteed by properly
routers, printers, and security cameras. IOT data center, maintaining all hardware and software necessary to ensure
analytics, consumer devices, networks, legacy embedded the availability of sensitive data. It is also important to keep
systems and connectors are the core technology of the IOT up with the system upgrades. A routine backup job is
market. IOT devices are frequently sent in a vulnerable state advised in order to prevent or minimize total data loss from
and offer little to no security patching. This poses unique such occurences. To prevent data loss, backup should be
security challenges for all users. It focuses on protecting located in a geographically separate location, and in a
your internet enabled devices that connect each other on fireproof, waterproof vault. Dedicated hardwares can be
wireless networks. IOT security is the safest components used to guard against downtime and unreachable data due to
tied to the internet of things, and it strives to protect IOT malicious actions such as distributed denial of service
devices and networks against cybercrime. Overall Cyber (DDOS) attacks.
Security is essential to govern the conducts and manners of
interacting with computer systems from suspicious 4. Types Of Cyber threats:
behavior. As hackers continue to adapt to progressing
technology, so will the it security experts whose main focus
is to keep our data secure.
Confidentiality:
Cyber Security should ensured that the information should
be secured is only accessible to the authorized users and The threats countered by Cyber Security are three - folds:
prevents the disclosure of the information to unauthorized Cybercrime:
parties. Access to information must be restricted only to It includes single actors or groups targeting systems for
those who are authorized to view the required data. Data can financial gain or to cause disruption.
be categorized according to the type and severity of damage
that could happen to it should fall into unauthorized hands. Cyber-attack:
Once the secrets has been revealed there is no way to un- It often involves politically motivated information gathering.
reveal it. Most systems also implement confidentiality
through data encryption, which is an additional layer of the Cyber terrorism:
security. The failure of confidentiality commonly known as It is intended to undermine electronic systems to cause panic
breach. Decryption of the data requires an individual or or fear.
@ IJTSRD | Unique Paper ID – IJTSRD33483 | Volume – 4 | Issue – 6 | September-October 2020 Page 659
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
The types of cyber attacks are: Here some common types of man-in-the-middle attacks:
Malware: Session Hijacking:
Malware means malicious software. One of the most In this type of MITM attack, an attacker hijacks a session
common cyber threats, malware is software that a between a trusted client and a network server. The attacking
cybercriminal or hacker has created to disrupt or damage a computer substitutes its IP address for the trusted client
legitimate’s user computer. Malware is the general term that while the server continues the session, believing its
covering all the different types of threats to your computer communicating with the client. The attack relies on the
safety. It can attach itself to legitimate code and propagate; it attacker’s knowledge of your session cookie, so it is called
can lurk in useful applications or replicate itself across from cookie hijacking.
the internet.
IP Spoofing:
The types of malware are IP spoofing is used by an attacker to convince a system that
Virus: is communicating with a known trusted entity and provide
A self - replicating program that attaches itself to clean file the attacker with the access to the system. The data
and spreads throughout a computer system, infecting files transmitted over the internet is first broken into multiple
with malicious code. Many viruses are harmful and can packets, and those packets transmitted independently and
destroy data, slow down systems resources, and log reassembled at the end.
keystrokes.
Replay:
Trojans: A replay attack occurs when an attacker intercepts and saves
A Trojan or Trojan horse is a program that hides in a useful old messages and then tries to send them later,
program and usually has a malicious function. A major impersonating one of the participants. This type can be
difference between viruses and Trojans is that Trojans do easily countered with session timestamps or a random
not self – replicate. Cybercriminals trick users into uploading number of strings that changes with time. The added danger
Trojans onto their computer where they cause damage or of replay attacks is that a hacker doesn’t even need advanced
collect data. skills to decrypt a message after capturing it from the
Spyware: network. The attack could be successful simply by resending
A program that secretly records what a user does, so that the whole thing.
cybercriminals can make use of this information.
5. Advantages Of Cyber Security:
Adware: Cyber Security refers to arrange of concepts including the
Advertising software which can be used to spread malware. practice protecting an organization’s information, networks,
computers, and resources against the attacks from security
SQL Injection: and computer attacks. It also saving the users from possible
An SQL (Structured Query Language) injection is a type of cyber attacks it also warn it from potential risks. Cyber
cyber attack used to take control of and steal data from a Security plays an important role to guarantee and protect
database. SQL injection attack has become a common issue people who use internet usage purposes.
with database-driven websites. It occurs when a malefactor
excuses a SQL query to the database via the input data from The advantages of Cyber Security are:
client to server. This gives them access to the sensitive Protects the system from the viruses, worms, spyware
information contained in the database. and other unwanted programs.
Protection against data from theft.
Phishing: Protection from the malicious attack on your computer.
Phishing attack is that the practice of sending emails that Risk mitigation.
appear to be from trusted sources with the goal of gaining Evade loss of crucial data.
personal information or influencing users to do something. It Valuable information protection.
could involve an attachment to an email that loads malware It helps us to browse the safe website.
onto your computer. Cybercriminals target victims with The application of Cyber Security used in our PC needs
emails that appear to be form a legitimate company asking updated every week.
for sensitive information. Phishing attacks are often used to Improved security of cyberspace.
dupe people into handing over credit card data and other Gives privacy to users.
personal information.
6. Disadvantages Of Cyber Security:
Denial-Of-Service Attack(DOS): So as to give a powerful digital security component inside of
A denial-of-service-attack overwhelms a system’s resources an association, it is required to adjust all the endeavours
so that it cannot respond to service requests. A DDoS attack through its information system. It protects individual private
is also attack on system’s resources, but it is launched from a information for businesses. It protects individual private
large number of other host machines that are infected by information. It protects network and resources, and tackles
malicious software controlled by the attacker. This renders computers hackers and theft of identity.
the system unusable, preventing an organization from
carrying out vital functions. The disadvantages of Cyber Security are:
Firewalls can be difficult to configure correctly.
Man-In-The-Middle-Attack(MITM):
Makes the system slower than before.
A man-in-the-middle attack is a type of cybercriminal threat
Need to keep updating software in order to keep
where a cybercriminal intercepts communication between
security up to date.
two individuals in order to steal data.
@ IJTSRD | Unique Paper ID – IJTSRD33483 | Volume – 4 | Issue – 6 | September-October 2020 Page 660
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
It will be costly for average users. malware and other malicious viruses from entering your
Improved hacker speed and ability. device and compromising your data. Use AV software from
Cyber Security can be a costly affair; as highly trained the trusted vendors and only run one AV tool on your device.
professionals are required. Firewalls prevent unauthorized users from accessing your
Latest security patches must be updated regularly. websites, mail services, and other sources of information
Incorrectly configured firewalls may block users from that can be accessed from the web. Your router should also
performing certain actions on the internet, until the have a firewall built in to prevent attacks on your network.
firewall configured correctly.
Connect Securely:
7. Safety tips for Cyber Security: You might be tempted to connect to your own device to an
The internet has become a space riddled with malicious unsecured connection, but when you weigh the
links, Trojans, and viruses. Data breaches are becoming more consequences its not worth it. Don’t use public Wi-Fi without
frequent, and unsuspecting users are more vulnerable than using a virtual private network (VPN). By using a VPN the
even before. Here’s a deeper dive into the 10 Cyber Security traffic between your device and the VPN server is encrypted.
safety tips that everyone should know and follow. Its easy for a cybercriminal to access your device. Only
connect to the private networks when possible especially
Keep Software Up To Date: when handling sensitive information.
Software patches can be issued when the security flaws are
discovered. One of the most important Cyber Security tips to Secure Your Mobile Device:
mitigate Ransomware is patching outdated software, both Security doesn’t end at your desktop. It’s important to get
operating system and applications. Always install the latest into the habit of securing your presence through your mobile
security updates for your devices: device as well. Always use strong passwords to protect your
Turn on automatic updates for your operating system. devices. Don’t auto updates using public Wi-Fi .You’ll want to
Use web browsers such as chrome or firefox that receive make sure that you are protected
frequent, automatic security updates. Lock your device with a PIN or password – and never
Keep your web browser plugins like flash, java, etc. leave it unprotected in public.
updated. Only install apps from the trusted sources (Apple App
Clicking Without Thinking Is Reckless: store, Google play)
Just because you can click, doesn’t mean you should. Keep the device operating system up to date.
Remember it can cause you a hefty sum. Malicious link can Don’t click on links or attachments from unsolicited
do damage in several different ways. Avoid visiting unknown emails or texts.
websites or downloading software from untrusted sources.
These sites often host malware that will automatically install Never Leave Devices Unattended:
and compromises your computer. If attachments or links in The physical security of your devices is just as importance as
the email are unexpected or suspicious for any reason, don’t their technical security.
click on it. If you need to leave your laptop, tablet, or I-PAD for any
length of time – lock it up so no else can use it.
Use Two-Factor Authentication: You must lock your screen for desktop computers or
It’s important to have strong password but it’s even more shut down the system when not in use.
imperative to have two-factor, or multi-factor, The data that you keep protected on a flash drive or
authentication. Without two-factor authentication, you external hard drive make sure their encrypted and
would normally enter a username and password. A locked up as well.
password management program helps you to maintain Always protect the devices with passwords or PIN
strong and unique passwords for all of your accounts. The numbers to keep your files safe.
truth is passwords are important in keeping hackers out of
your data. Protect Your Sensitive Personal Identifiable
Don’t use the same password twice. Information(PII):
Choose something that is easy to remember and never Personal identifiable information (PII) is any information
leave a password hint in open or make publicity that can be used by a cybercriminal to identify or locate an
available for the hackers to see. individual. It includes information such as name, address,
Reset your password when you forget it. phone numbers, date of birth, social security number and IP
address. You can review your privacy settings and change all
Lookout For Phishing Scams: the required information. If it is visible to others it will
Phishing attacks are some of the greatest Cyber Security dramatically increase your risk of a security breach. Hackers
threats as they are very easy to fall for. In a phishing attack, a use this information to their advantage. So protect your
hacker will pose as someone that the recipient may be information with high security levels.
familiar with to trick them into opening a malicious link.
Phishing scams are a constant threat using various social Back-Up Your Data:
engineering ploys, cyber-criminals with attempt to trick you These days storage doesn’t cost much. There’s no excuse not
into divulging personal information such as your login ID to have a backup of important data. Back it up on the
and password, banking or credit card information. This often physical location and on the cloud. If you are a victim of a
leads to a Ransomware attack. security incident, the only guaranteed way to repair your
computer is to erase and re-install the system. Back it up to
Use Anti-Virus Protection & Firewall: have an ultimate recovery tool.
Anti-Virus protection software has been the most prevalent
solution to fight malicious attacks. AV software blocks
@ IJTSRD | Unique Paper ID – IJTSRD33483 | Volume – 4 | Issue – 6 | September-October 2020 Page 661
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
8. Cyber Security challenges: AI expansion:
Cyber Security is continually challenged by hackers, data AI is short form is Artificial intelligence. It is an area of
loss, privacy, risk management, and changing Cyber Security computer science which is the creation of intelligence
strategies. With the increase of the cyber attacks, every machines that do work and react like humans. AI take
organization needs a security analyst who makes sure that immediate actions against the malicious attacks at a moment
their system is secured. As new technology emerge and when a threats impact a business. Biometric login is one of
technology is used in new or different ways, new avenue of the example of artificial intelligence. While this is a good side
attacks are developed as well. In our quest to deal with of it there is a bad side as well. Robots might be able to
newly emerging threats, we often face challenges that one defend against incoming cyber-attacks. Hackers can also use
must deal with to secure their territory. The few main Cyber AI and machine learning to design innovative solutions for
Security challenges are explained in detail: performing out more sophisticated attacks. Timing is
everything with malware and other vicious data
Ransomware: manipulations.
Ransomware is a type of malware in which the data on a
victim’s computer is locked, and payment is demanded 9. Conclusion:
before the ransomed data is unlocked. Ransomware is the To conclude in this about I have explained all the types,
bane of Cyber Security, data professionals, IT and executives. challenges, and safety methods about Cyber Security. Cyber
Once the payment is made, a decryption key is being Security is a never-ending battle. The future of Cyber
provided by hackers, using which all the data can be Security will in one sense be like the present hard to define
decrypted back and the access is returned. Data disappears and potentially unbounded as digital technologies interact
and the business can’t revive it. That is unless they pay the with human beings across virtually all aspect of politics,
cybercriminals. Ransomware is the bane of Cyber Security, society, the economy, and the beyond. Since the attackers
data professionals, IT and executives. have being using an attack life cycle, organizations have also
been forced to come up with a vulnerability management
Blockchain: lifecycle. Also an increased investment in research that could
Blockchain technology is the most important invention in help address Cyber Security vulnerabilities while also
computing era. It is the first time in the human history that meeting socio-economic needs and national security
we have a genuinely native digital medium for peer-to-peer requirement is necessary. So, only way to be safe is pay
value exchange. The blockchain is a technology that enables attention and act smart.
a crypto currencies like bitcoin. Many companies adopting
crypto currencies technology don’t implement appropriate 10. Reference Links:
security controls. As a result they will only continue to [1] https://www.kaspersky.co.in/resource-
experience financial losses, predicts, bill weber, principal center/definitions/what-is-cyber-
security. So it is being advised, to understand the security security#:~:text=Cyber%20security%20is%20the%20
controls before implementing these technologies. Some of practice,security%20or%20electronic%20information
the attacks made are Eclipse attack, Sybil attack, and DDOS %20security.
attack.
[2] https://mind-core.com/blogs/Cyber Security/5-types-
of-cyber-security/
IOT Threats:
IOT stands for internet of things. It is a system of interrelated [3] https://www.secureworks.com/blog/cyber-threat-
physical devices which can be accessible through internet. basics
The connected physical devices have a unique identifier
[4] https://security.berkeley.edu/resources/best-
(UID) and have the ability to transfer data over a network. In
practices-how-to-articles/top-10-secure-computing-
today’s world, every digital device that we use can be
tips
connected with a network and yes it is happening in almost
all parts of the globe. The problem is that all of that [5] https://sites.google.com/site/xinyicyber/the-
interconnectedness makes consumers highly susceptible to disadvantages-and-advantages-of-cyber-security
cyber attacks. In other words, if you access one device,
you’ve accessed them all and this leads to increased risks of [6] https://www.javatpoint.com/cyber-security-challenges
attacks and gap in securities.
@ IJTSRD | Unique Paper ID – IJTSRD33483 | Volume – 4 | Issue – 6 | September-October 2020 Page 662