¶ … goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their targets. We will look into the origin of such techniques and proceed to develop a methodology to avert such attacks. In the highly computerized environment that we are living, a new method of multitenant services has been evolved to substitute for the demands on memory space and time- the Cloud. The impact of these vast and complex systems has raised newer kinds of concerns that will then be assessed and hence a strategy to safeguard the interests of the user because of threats arising hence will be attempted. The main aim is to create a data and internet environment that is safe and secure in the social perspective.
Table of Contents
Chapter 1
Introduction
Background of the Study
Problem Statement
Purpose of the Study
Significance of this study
Social Engineering
Travel Threats
WEB Threats
The Cloudy Threat
Chapter 2: Literature Review
Prevalent Security Methods
Digital Signature
Firewalls
Redundancy
Freshness
Configuring a Viable Security Structure
ISO at work
CFO at work
Get only Certified persons
Building up Security Model
Access Control
Personal authentication
LDAP: Lightweight Direct Access Protocol.
Conclusion
Chapter 3: Methodology
Research Philosophy
Research Approach
Research type and Time line
Data Collection Methods
Quantitative Validity
Sampling Strategy
Data Analysis
Conclusion
Chapter 4: Results
Chapter 5: Discussion and Conclusion
Introduction
Statement of the Problem
Review of Methodology
Summary of Results
Relationship of Research Questions to the Field study
Discussions of Results
Conclusion
Chapter 1
Introduction
It is said that an engineer should have a secured computer at his disposal. Consequently, many non-engineers assume that they can enjoy computer without security. Even if you are not a person who is working on critical information, you have an identity and information that you should protect; hence you should be informed user of computer. Your information is almost always on risk, if you are on computer network. Statistically speaking, interrogating more than 7000 business companies majority dealing on critical infrastructure, 67% reported at least one cyber attack (Rantala, 2008). Nearly 60% reported a cyber attack to their computer system; 11% reported cyber theft, which includes embezzlement, fraud, and intellectual property theft; and 24% reported other cyber incidents such as port scanning, spyware, spoofing, or some type of breach that resulted in damage or a loss. On an average, in the year 2011 around 26,000 complaints were registered at the Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). The situation hence suggests that one should be properly secured as sooner than later our computer system will be attacked! The most intriguing aspect of this is that you don't have to be PhD or an experienced user to attack computer system. Most of the time, it is just a work by an expert in his teens .
Background of the Study
In a report written by Mandiant (2013), a spear phishing attack was described targeting the company's CEO, Kevin Mandia. The goal was to attack the organization with an advanced persistent threat (APT) . The spear phishing e-mail was sent to all Mandiant employees. The e-mail was spoofed to appear as if it came from the company's CEO, Mr. Mandia. In such cases, what likely happens is that the personnel may give out information about the company that helps the social engineer gain access to gain further information by impersonation. Here we find the two causes that contribute to the attack on the system, namely the gullibility of the employees of which the attacker has taken advantage and secondly the initial breach into the system by way of breaking into the security net. In further proof of this personal centered phenomenon that we are trying to address in this proposal, consider the observation of Kevin Mitnick. It was Kevin Mitnick, who actually popularized social engineering, had accepted the use of technique he termed as "spear phishing." In this an e-mail targets a specific person or organization coming from a trusted source. The person is targeted using information found on a social networking site like LinkedIn. For example, the social engineer goes to LinkedIn...
Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating
Cyberterrorism What is Cyberterrorism? Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded the scope and procedures used for terrorism, and have made acts of terrorism more difficult to police. Because of the technological component, it
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Globalization's Effect on the United States' National Security Objective of this paper is to explore the impact of globalization on the United States national security. The study defines globalization as the increasing global relations of people, corporate organization and government. There is no doubt that the globalization provides numerous benefits to the American economy. Despite the benefits derived from the globalization, the advent of globalization also provides some threats to the United
ERP Nation Cyber-security in the U.S. Since 911, Federal agencies dedicated to critical infrastructure in the United States have contributed significant allocation to upgrading cyber-systems toward risk mitigation against threat. A major challenge to this effort is the persistence of 'legacy systems' or older propriety architectures that are non-standard to command syntax. Replacement of legacy systems that were originally implemented as internal 'unique' security platforms for control of facilities, out flows of
The most refined understanding on the issue of morality of terrorism is given by Michael Walzer. According to him in modern times, terror is considered to be the totalitarian view of politics as well as war. It destroys the conventional thinking as well as the political mode. It ignores moral confines and for being inside the groups of citizens/civilian population, there is no such small category wherein the immunity
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now