Running head: CHALLENGES OF CYBER SECURITY 9
Challenges of Cyber Security
Challenges of Cyber Security
Currently, computer security constitutes one of the fields with
increasing significance because many people rely on computer
systems and the internet for various operations. By the term
‘cyber security’, it refers to the provision of safety measures for
computer systems against theft and destruction to the hardware,
software and the information contained therein. It also includes
protecting computer systems from any form of interference that
hinders their efficiency to service delivery. According to
(Vasconcelos et al., 2017), cyber security means limiting the
physical access to certain hardware and providing safety against
destruction that could result due to malpractice or when system
operators become tricked and deviate from what is known
secure guidelines.
There are many challenges for cyber security measures to be
effective. Computer system operators experience great
challenges in providing reliable and effective cyber security.
Therefore, the question is that; how should system operators get
the proper training to overcome numerous cyber security
challenges? It is important to pose the question because today
there are many businesses that feel insecure. For example, most
enterprises doubt the preparedness by system operators and
their ability to ensure that there is security in the corporate
networks. In addition, a recent research carried by Enterprise
Strategy Group established that about a quarter of system
operators do not possess the desired skills. Lack of enough
personnel who are equipped with right skills is the key factor
attributed to challenges of cyber security. While cyber security
significantly assists in to protecting us, many enterprises
together with their esteemed clients, from someone falsely
representing something as beneficial to them or to infiltrate our
systems, it is in great need to be expanded on in order to
safeguard us, and to create a safer environment protecting
companies and our personal information and data, but it can and
does fail to provide us complete security, if safe practices are
not followed.
Protecting the Home Front
Home front is an informal term commonly used by the civilians
of a nation, which faces a war, and their active support system
of the military. As a result, military forces largely rely on
home front civilian aid services. However, due to increased
potential of destruction to the home front, there is a need to
offer them appropriate protection (Wang & Lu, 2013). The
military has the ability to design systems to help protect and
deal with the vulnerabilities to the home front from direct
attacks. There a number of things, that can be done to protect
the home front against various attacks.
First, one could use automatic light timers fixed throughout in
their systems. Light timers can be programmed to switch on
and off in a way that helps simulate an individual desired
pattern, which is predetermined beforehand. Light timers,
which provide battery backup, are the best option. It ensures
that the light timers do not stop functioning in case of power
blackout or power failure (Wang & Lu, 2013). The home front
protective groups have used the strategy and it proved the most
reliable. For example, they constantly engaged in training their
personnel who work as system operators. This way, they have
been able to acquire the most realistic, practical and reliable
means of solving many contemporary issues of cyber security
they face.
According to (Wang & Lu, 2013), encouraging both specific and
scheduled training provides the best way of ensuring maximum
protection. For example, specifically designed training offers
are affordable and comprehensive programs. They train system
operators and equip them with effective skills needed to protect
the home front.
Security: How to choose a safe Password
The use of passwords in computer systems is essential and a
secure password is required especially when browsing around
the internet. Secure passwords keep the system safe from
interruption and eavesdropping by other people. As a result, it
ensures that unauthorized persons do not compromise sensitive
and confidential information. In most situations, an individual
will pick a random number that is easy for hackers to
understand and thus allowing them access to personal
information. According to (Keller, 2016), when choosing a
password, it should have at least eight characters in length. For
example, it should consist of digits, punctuation marks, and
letters with mixed upper and lower case. Additionally, it is
advisable to alter the password with unique letters and numbers
that restricts anyone from hacking the password.
The following are some of the simple steps that can guarantee a
secure password; first, it is not appropriate to use personal
information when creating a password. It is because it makes it
easy for a hacker to guess certain personal information such as
name and date of birth. Secondly, avoid using actual words
since there is specific equipment that enables hackers to obtain
the exact password. Due to increased intelligence especially in
computing, it takes a short time for a person to test nearly every
word contained in the dictionary to detect a password (Keller,
2016). As a result, it is important one does not use exact words.
Lastly, the mixing up of many distinct characters is encouraged
since it makes the password highly secure. For example, one
could mix letters both in lower and upper case combined with
special symbols such as the dollar sign ($).
What is Key to Secure Passwords?
The question; what is key to secure passwords? Many system
operators ponder a regular question through each time a security
breach takes place. For example, when a serious vulnerability
was recently established, it was a requirement that all
employees alter their passwords. As a result, the key to a
secure password involved running it through an online password
checker. The online checker highlights the significance of
using long, random, and unique passwords. For example, it
specifies certain fields that display a person’s password
character variation and how it appears in the dictionary (Keller,
2016). It is the key to a secure password because it is able to
tell how long it would take for a hacker applying a brute force
attack to access the password.
The significance of Two-Factor Verification
The two-factor verification refers to a technology that offers
easy identification of users through a combination of two
different devices. There are various devices and services
designed to execute the two-factor verification, which range
from tokens, cards, and the use of smartphone applications. For
instance, the two-factor verification requires two factors to
authenticate for permission to log on an application. In
addition, there is the infrastructure software, which detects and
permits access to a particular user (Ding et al., 2017, February).
Access is permitted when the users correctly apply tokens. One
commonly used hardware token includes the Yubikey. It is a
small device that supports one-time passwords (OTP) and
verification.
Therefore, the significance of two-factor verification is that, it
offers an extra layer of security making it difficult for hackers
to get access to a person’s computer system or other devices and
online accounts. For example, by the attacker gaining access to
the password alone, does not guarantee him or her
authentication verification. Therefore, the two-factor
authentication technology has been in operation over a long
time to regulate and protect access of sensitive systems and
confidential data (Ding et al., 2017, February). In line with,
two-factor verification it provides high security since access to
a system does not only depend on strength of the password that
a user creates. In addition, since several attacks results from
remote internet links, two-factor verification reduces threat
from hackers.
Malware
The term ‘malware’ signifies malicious software and it
constitutes one of the computer programs specifically created to
infect a user’s computer. It often aims at inflicting harm in
computers and other devices in many different ways and takes
on various forms. For example, a few include virus, spyware
and many others. Computer viruses have become probably the
most common type of malware because they increase through
multiplication resulting in several copies of them. Therefore,
malware security protection is required to serve as a second
layer of safety measures for a computer or a network (Kumar et
al., 2016, February). There are several antivirus packages,
which form part of the primary unit of technological protection
to both personal, and enterprise computer systems.
In the designing of antivirus software packages, they come with
many features to enhance their protection against malware. For
example, one essential involves their ability to check and
recognize a newly downloaded program. This way, it makes
sure that any program recently downloaded is set free from any
malware. The second best feature for an antivirus software
package regards its ability to regularly clean the computer,
detect, and destroy any malware (Kumar et al., 2016, February).
The antivirus also requires periodic updates to allow it to
recognize the latest malwares that offer threat. As a result,
there is a need for good antivirus safety to enable it recognize
and provide signals for possible malware threats.
Ways of detecting malware on the computer
Computer hackers are committed in finding clever methods that
enable them to get malware on other people’s computers and
networks. One simple way involves their attractive websites
which pop up with interesting downloads. Links to these
websites download malware onto the computer especially if the
user does not protect his or her device with effective antivirus
software. There are certain indications that one can observe to
help detect possible malwares; first, a poor performance by a
computer system and its prolonged startup times signals
infection by malware (Kumar et al., 2016, February).
Additionally, it is an indication that malware on computers and
networks when there is a sudden closure of the browser or it
occasionally becomes unresponsive. As a result, once malware
is detected, then it is highly recommended that the user stop
conducting online activities. It is because the user risks sharing
sensitive information that hackers could use in corrupt deals.
Privacy
Privacy as used in the internet and cyber security refers to the
security of personal data so that that your information is not
published through the internet. It means different factors and
technologies designed to offer safety for sensitive and private
information. It is a compulsory requirement for all computer
and network users. Privacy is often a cause of concern to all
users who intend to engage in online transactions and other
social networks (Wang & Lu, 2013). A person’s personal
information may be used in fraudulent deals if a password is
hacked or revealed to other users. It means that care should
often be exercised to avoid being caught up in privacy risks
such as phishing. Phishing refers to an internet hacking attempt
used for stealing personal information such as security pins,
passwords, or bank account numbers.
Ways to Avoid Identity Theft Online
There are serious cases of online identity theft that take place-
involving criminals who delve into personal information. The
following are some of the ways to prevent online theft; first, an
individual should always watch for phishing websites. It is a
website, which legitimizes itself as a business website but only
aims at getting the user’s sensitive and personal information. In
that case, there is a need for one to be vigilant of any sites,
which require personal information such security number, phone
number and bank account numbers among others (Wang & Lu,
2013). Secondly, practicing safe e-mailing measures could
identify online theft. For example, when you receive email
offers, even though it appears too good to be a reality, you
should then avoid opening such emails or documents attached if
they come from an unknown source. Lastly, one needs to be on
watch for sites that claim that they offer reliable financial
services. It is safe to transact with financial institutions online
only if their authenticity can is trusted and confirmed.
Ways to Protect from Cyber Stalkers
Cyber stalking refers to a crime in which an online attacker
sends threatening messages or e-mails to a different online user.
For example, a cyber stalker often uses e-mail, instant
messages, phone calls, and other online communication devices
to stalk. Here includes some useful pointers that can help
protect from cyberstalking. First, an online user needs to be
vigilant at all times against any attempt by outsiders to get
access to his or her online device. According to (Wang & Lu,
2013), Cyber stalkers often use certain software gadgets to
watch their target victims. Secondly, it is important that a
person regularly ensure that he or she logs out of the computer
programs after each use. Thirdly, practicing good password
management and security protects from cyberstalking. You
should never share your password and alter it regularly.
Data Breaches
Data breaching means an incident that involves intentional
viewing, accessing or making use of data of a person or an
application without legal authority. It is one of the security
breaches practiced by hackers mainly to steal and make use of
data without authorization. As a security breach, it could lead
to data loss such as financial or health data getting lost. In
addition, an attacker may steal data, use it for impersonation,
and gain entry into a secured place. For instance, a hacker
could steal login information of a network administrator and use
it to access the entire network. Currently, cases of data
breaching have significantly increased, causing a major threat to
copyrights of many authors. As a result, it does not seem that
the incidents will simply go away especially with the inception
of worldwide web where a lot of information is obtained easily
and illegally by cyber stalkers.
Defense against Data Breach
Any individual and organization irrespective of its size needs to
be vigilant at all times so that is does not risk exposure to
potential threats and data breaching. The following practices
need to be in place to serve as defenses against data breach,
first, by designing security systems that detect and protect any
possible data breaching. Secondly, safeguard confidential and
sensitive data from loss by installing data loss protection
software (Jensen, Gouda, & Qiu, 2014, January). For example,
protection software is able to block valuable data from being
sent through e-mail. Thirdly, individuals and enterprises should
be vigilant through creation of incident response plans. For
example, when the company faces a possible attack then it will
be able to react quickly and effectively to have the response
plan defend against the attack.
Safe Computing
The term “safe computing” is commonly used without really
understanding what it implies. It means following rules,
stipulated to guide a person when using his or her computer or
network. Safe computing’s intent is to protect devices against a
potential virus or spyware (Vasconcelos et al., 2017). The
following practices must occur to help in safe computing; first,
a user has to ensure that his or her operating system has the
proper updates. For example, one has to download and install
the latest security software. It is can be easily done through the
automatic update prompt located in the control panel.
Secondly, one should ensure that he or she uses a safe browser
that does not easily allow spyware. Lastly, a person should not
at any time open attachments that he or she did not expect.
Significance of General Software Updates as well as Patches
The general software updates and patches often appear in little
windows reminding users of the need for computer updates.
They are important in updating operating systems and other
software programs installed in the computer for various uses. If
the user completes the updates as required, it saves from
multiple revisions to the operating system such as incorporating
new outlooks, removing some outdated features, and updating
drivers and eliminates security gaps. By a security gap, it
means software installed in a computer that has become
vulnerable to attackers and viruses (Vasconcelos et al., 2017).
For example, hackers, often target these security gaps simply by
designing a certain malware that comes as a package to the
system. Therefore, it is essential to carry out regular general
software updates and patches to remedy any existing security
gaps.
Meaning of Man in the Middle Attack
Man-in-the-middle attack (MITMA) is an attack where a user
comes in between the sender and recipient of particular
information. According to, (Jensen, Gouda, & Qiu, 2014,
January), once he or she gets the information sent, he or she
sniffs the information. The situation occurs mainly when a user
sends unencrypted data that is easily accessible by the third
party referred to as a man-in-the-middle attack.
Conclusion
Finally, it is worth noting that there are real vulnerabilities that
come in different ways with the inception of technology. As a
result, hackers take advantage of people’s ignorance in ensuring
safe computing to avoid exposure to risks and theft. Practicing
safe computing is the best way to ensure that every user is
secure against all the challenges of cyber security. It is the
most important and the most difficult practice especially for the
new e-mail users. It is should be adhered to mostly because the
spyware and viruses are installed onto an operating system by e-
mail more than any others means. While cyber security
significantly assists in to protecting us, many enterprises
together with their esteemed clients, from someone falsely
representing something as beneficial to them or to infiltrate our
systems, it is in great need to be expanded on in order to
safeguard us, and to create a safer environment protecting
companies and our personal information and data, but it can and
does fail to provide us complete security, if safe practices are
not followed.
References
Vasconcelos, J. B., Kimble, C., Wang, W., & Lu, Z. (2013), P.,
& Rocha, Á. (2017). The application of knowledge management
to software evolution. International Journal of Information
Management, 37(1), 1499-1506.
Ding, J., Alsayigh, S., Lancrenon, J., Saraswathy, R. V., &
Snook, M. (2017, February). Provably Secure Password
Authenticated Key Exchange Based on RLWE for the Post-
Quantum World. In Cryptographers’ Track at the RSA
Conference (pp. 183-204). Springer, Cham.
Jensen, O., Gouda, M., & Qiu, L. (2014, January). A secure
credit card protocol over NFC. In Proceedings of the 17th
International Conference on Distributed Computing and
Networking (p. 32). ACM.
Keller, H. (2016). The Internet, Technology, and Identity Theft.
Consumer Economics: Issues and Behaviors, 390.
Kumar, S. R., Yadav, S. A., Sharma, S., & Singh, A. (2016,
February). Recommendations for effective cyber security
execution. In Innovation and Challenges in Cyber Security
(ICICCS-INBUSH), 2016 International Conference on (pp. 342-
346). IEEE.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid:
Survey and challenges. Computer Networks, 57(5), 1344-1371.
QNT275
Please answer the following questions
1. Find the value of x2 for 12 degrees of freedom and an area of
.025 in the right tail of the chi-
square distribution curve. What is the value of chi-square?
Round to three decimal places
2. Determine the value of x2 for 14 degrees of freedom and an
area of .10 in the left tail of the
chi-square distribution curve. What is the value of chi-square?
Round to three decimal places
3. Determine the value of x2 for 23 degrees of freedom and an
area of .990 in the left tail of the
chi-square distribution curve. What is the value of chi-square?
Round to three decimal places.
4. A population data set produced the following information.
N=460, ∑x=3920, ∑y=2650, ∑xy=26,570, ∑x2=48,530
Find the population regression line. Round to three decimal
places. Use the format as an example when submitting your
equation 456.123 + 789.123x
5. The following information is obtained from a sample data set.
n=12, ∑x=66, ∑y=588, ∑xy=2244, ∑x2=396
Find the estimated regression line Use this format as an
example when submitting your equation 123 – 45x
For the following 2 questions please use 200 word answers.
6. Describe in your own words a test of independence and a test
of homogeneity. Give one example of each. Explain how the
expected frequencies for cells of a contingency table are
calculated in a test of independence or homogeneity. How do
you find the degrees of freedom for such tests? To make a test
of independence or homogeneity, what should be the minimum
expected frequency for each cell? What are the alternatives if
this condition is not satisfied?
7. Explain the meaning of the words simple and linear as used
in simple linear regression. Explain the meaning of independent
and dependent variables for a regression model. Explain the
difference between exact and nonexact relationships between
two variables. Give one example of each. Explain the difference
between linear and nonlinear relationships between two
variables.

More Related Content

PPT
Information Security Audit and Analysis Module
PDF
Cyber Security Matters a book by Hama David Bundo
DOCX
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
PDF
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
PDF
Ijcatr04061002
DOCX
Introduction Over the past years, there have been increasing ca.docx
PDF
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
PDF
Information Security Lecture Notes
Information Security Audit and Analysis Module
Cyber Security Matters a book by Hama David Bundo
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
Ijcatr04061002
Introduction Over the past years, there have been increasing ca.docx
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Information Security Lecture Notes

Similar to Running head CHALLENGES OF CYBER SECURITY9.docx (20)

PPSX
Cyber Security Awareness Month 2017-Nugget 6
DOCX
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
DOCX
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
PDF
I0516064
DOC
DOCX
Team 3_Final Project.docx
DOCX
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
PDF
The Significance of Cybersecurity and securing your system
DOCX
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
Strong authentication implementation guide
 
PDF
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
DOCX
12Cyber Research ProposalCyb
DOCX
12Cyber Research ProposalCyb
DOCX
Target Data Breach Case Study 10242014
DOCX
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
DOCX
mangement MEASURE OF CYBER SECURITY MANAGMNET
DOCX
1. Original Post by Catherine JohnsonCryptographic MethodsC
Cyber Security Awareness Month 2017-Nugget 6
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
Running head NETWORK PROTECTION AGAINST THREATS1NETWORK PROTEC.docx
I0516064
Team 3_Final Project.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
The Significance of Cybersecurity and securing your system
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Multi Factor Authentication Whitepaper Arx - Intellect Design
Strong authentication implementation guide
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
Target Data Breach Case Study 10242014
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
mangement MEASURE OF CYBER SECURITY MANAGMNET
1. Original Post by Catherine JohnsonCryptographic MethodsC
Ad

More from susanschei (20)

DOCX
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
DOCX
SPT 208 Final Project Guidelines and Rubric Overview .docx
DOCX
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
DOCX
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
DOCX
Spring 2020 – Business Continuity & Disaster R.docx
DOCX
Sports Business Landscape Graphic OrganizerContent.docx
DOCX
Spring 2020Carlow University Department of Psychology & Co.docx
DOCX
Sport Ticket sales staff trainingChapter 4Sales .docx
DOCX
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
DOCX
SPM 4723 Annotated Bibliography You second major proje.docx
DOCX
Speech Environment and Recording Requirements• You must have a.docx
DOCX
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
DOCX
Speech Recognition in the Electronic Health Record (2013 u.docx
DOCX
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
DOCX
Specialized Terms 20.0 Definitions and examples of specialized.docx
DOCX
Special notes Media and the media are plural and take plural verb.docx
DOCX
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
DOCX
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
DOCX
Speaking about Muhammad, Speaking for MuslimsAuthor(s) An.docx
DOCX
Speaker NameSpeech TitleDirections For each area li.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020 – Business Continuity & Disaster R.docx
Sports Business Landscape Graphic OrganizerContent.docx
Spring 2020Carlow University Department of Psychology & Co.docx
Sport Ticket sales staff trainingChapter 4Sales .docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
SPM 4723 Annotated Bibliography You second major proje.docx
Speech Environment and Recording Requirements• You must have a.docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Speech Recognition in the Electronic Health Record (2013 u.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
Special notes Media and the media are plural and take plural verb.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
Speaking about Muhammad, Speaking for MuslimsAuthor(s) An.docx
Speaker NameSpeech TitleDirections For each area li.docx
Ad

Recently uploaded (20)

PPTX
Computer Architecture Input Output Memory.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
History, Philosophy and sociology of education (1).pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
advance database management system book.pdf
PDF
Trump Administration's workforce development strategy
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
Computer Architecture Input Output Memory.pptx
HVAC Specification 2024 according to central public works department
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Environmental Education MCQ BD2EE - Share Source.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
History, Philosophy and sociology of education (1).pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
My India Quiz Book_20210205121199924.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
advance database management system book.pdf
Trump Administration's workforce development strategy
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
Unit 4 Computer Architecture Multicore Processor.pptx

Running head CHALLENGES OF CYBER SECURITY9.docx

  • 1. Running head: CHALLENGES OF CYBER SECURITY 9 Challenges of Cyber Security Challenges of Cyber Security Currently, computer security constitutes one of the fields with increasing significance because many people rely on computer systems and the internet for various operations. By the term ‘cyber security’, it refers to the provision of safety measures for computer systems against theft and destruction to the hardware, software and the information contained therein. It also includes protecting computer systems from any form of interference that hinders their efficiency to service delivery. According to (Vasconcelos et al., 2017), cyber security means limiting the physical access to certain hardware and providing safety against destruction that could result due to malpractice or when system operators become tricked and deviate from what is known secure guidelines. There are many challenges for cyber security measures to be effective. Computer system operators experience great
  • 2. challenges in providing reliable and effective cyber security. Therefore, the question is that; how should system operators get the proper training to overcome numerous cyber security challenges? It is important to pose the question because today there are many businesses that feel insecure. For example, most enterprises doubt the preparedness by system operators and their ability to ensure that there is security in the corporate networks. In addition, a recent research carried by Enterprise Strategy Group established that about a quarter of system operators do not possess the desired skills. Lack of enough personnel who are equipped with right skills is the key factor attributed to challenges of cyber security. While cyber security significantly assists in to protecting us, many enterprises together with their esteemed clients, from someone falsely representing something as beneficial to them or to infiltrate our systems, it is in great need to be expanded on in order to safeguard us, and to create a safer environment protecting companies and our personal information and data, but it can and does fail to provide us complete security, if safe practices are not followed. Protecting the Home Front Home front is an informal term commonly used by the civilians of a nation, which faces a war, and their active support system of the military. As a result, military forces largely rely on home front civilian aid services. However, due to increased potential of destruction to the home front, there is a need to offer them appropriate protection (Wang & Lu, 2013). The military has the ability to design systems to help protect and deal with the vulnerabilities to the home front from direct attacks. There a number of things, that can be done to protect the home front against various attacks. First, one could use automatic light timers fixed throughout in their systems. Light timers can be programmed to switch on and off in a way that helps simulate an individual desired pattern, which is predetermined beforehand. Light timers, which provide battery backup, are the best option. It ensures
  • 3. that the light timers do not stop functioning in case of power blackout or power failure (Wang & Lu, 2013). The home front protective groups have used the strategy and it proved the most reliable. For example, they constantly engaged in training their personnel who work as system operators. This way, they have been able to acquire the most realistic, practical and reliable means of solving many contemporary issues of cyber security they face. According to (Wang & Lu, 2013), encouraging both specific and scheduled training provides the best way of ensuring maximum protection. For example, specifically designed training offers are affordable and comprehensive programs. They train system operators and equip them with effective skills needed to protect the home front. Security: How to choose a safe Password The use of passwords in computer systems is essential and a secure password is required especially when browsing around the internet. Secure passwords keep the system safe from interruption and eavesdropping by other people. As a result, it ensures that unauthorized persons do not compromise sensitive and confidential information. In most situations, an individual will pick a random number that is easy for hackers to understand and thus allowing them access to personal information. According to (Keller, 2016), when choosing a password, it should have at least eight characters in length. For example, it should consist of digits, punctuation marks, and letters with mixed upper and lower case. Additionally, it is advisable to alter the password with unique letters and numbers that restricts anyone from hacking the password. The following are some of the simple steps that can guarantee a secure password; first, it is not appropriate to use personal information when creating a password. It is because it makes it easy for a hacker to guess certain personal information such as name and date of birth. Secondly, avoid using actual words since there is specific equipment that enables hackers to obtain the exact password. Due to increased intelligence especially in
  • 4. computing, it takes a short time for a person to test nearly every word contained in the dictionary to detect a password (Keller, 2016). As a result, it is important one does not use exact words. Lastly, the mixing up of many distinct characters is encouraged since it makes the password highly secure. For example, one could mix letters both in lower and upper case combined with special symbols such as the dollar sign ($). What is Key to Secure Passwords? The question; what is key to secure passwords? Many system operators ponder a regular question through each time a security breach takes place. For example, when a serious vulnerability was recently established, it was a requirement that all employees alter their passwords. As a result, the key to a secure password involved running it through an online password checker. The online checker highlights the significance of using long, random, and unique passwords. For example, it specifies certain fields that display a person’s password character variation and how it appears in the dictionary (Keller, 2016). It is the key to a secure password because it is able to tell how long it would take for a hacker applying a brute force attack to access the password. The significance of Two-Factor Verification The two-factor verification refers to a technology that offers easy identification of users through a combination of two different devices. There are various devices and services designed to execute the two-factor verification, which range from tokens, cards, and the use of smartphone applications. For instance, the two-factor verification requires two factors to authenticate for permission to log on an application. In addition, there is the infrastructure software, which detects and permits access to a particular user (Ding et al., 2017, February). Access is permitted when the users correctly apply tokens. One commonly used hardware token includes the Yubikey. It is a small device that supports one-time passwords (OTP) and
  • 5. verification. Therefore, the significance of two-factor verification is that, it offers an extra layer of security making it difficult for hackers to get access to a person’s computer system or other devices and online accounts. For example, by the attacker gaining access to the password alone, does not guarantee him or her authentication verification. Therefore, the two-factor authentication technology has been in operation over a long time to regulate and protect access of sensitive systems and confidential data (Ding et al., 2017, February). In line with, two-factor verification it provides high security since access to a system does not only depend on strength of the password that a user creates. In addition, since several attacks results from remote internet links, two-factor verification reduces threat from hackers. Malware The term ‘malware’ signifies malicious software and it constitutes one of the computer programs specifically created to infect a user’s computer. It often aims at inflicting harm in computers and other devices in many different ways and takes on various forms. For example, a few include virus, spyware and many others. Computer viruses have become probably the most common type of malware because they increase through multiplication resulting in several copies of them. Therefore, malware security protection is required to serve as a second layer of safety measures for a computer or a network (Kumar et al., 2016, February). There are several antivirus packages, which form part of the primary unit of technological protection to both personal, and enterprise computer systems. In the designing of antivirus software packages, they come with many features to enhance their protection against malware. For example, one essential involves their ability to check and recognize a newly downloaded program. This way, it makes sure that any program recently downloaded is set free from any malware. The second best feature for an antivirus software package regards its ability to regularly clean the computer,
  • 6. detect, and destroy any malware (Kumar et al., 2016, February). The antivirus also requires periodic updates to allow it to recognize the latest malwares that offer threat. As a result, there is a need for good antivirus safety to enable it recognize and provide signals for possible malware threats. Ways of detecting malware on the computer Computer hackers are committed in finding clever methods that enable them to get malware on other people’s computers and networks. One simple way involves their attractive websites which pop up with interesting downloads. Links to these websites download malware onto the computer especially if the user does not protect his or her device with effective antivirus software. There are certain indications that one can observe to help detect possible malwares; first, a poor performance by a computer system and its prolonged startup times signals infection by malware (Kumar et al., 2016, February). Additionally, it is an indication that malware on computers and networks when there is a sudden closure of the browser or it occasionally becomes unresponsive. As a result, once malware is detected, then it is highly recommended that the user stop conducting online activities. It is because the user risks sharing sensitive information that hackers could use in corrupt deals. Privacy Privacy as used in the internet and cyber security refers to the security of personal data so that that your information is not published through the internet. It means different factors and technologies designed to offer safety for sensitive and private information. It is a compulsory requirement for all computer and network users. Privacy is often a cause of concern to all users who intend to engage in online transactions and other social networks (Wang & Lu, 2013). A person’s personal information may be used in fraudulent deals if a password is hacked or revealed to other users. It means that care should often be exercised to avoid being caught up in privacy risks such as phishing. Phishing refers to an internet hacking attempt used for stealing personal information such as security pins,
  • 7. passwords, or bank account numbers. Ways to Avoid Identity Theft Online There are serious cases of online identity theft that take place- involving criminals who delve into personal information. The following are some of the ways to prevent online theft; first, an individual should always watch for phishing websites. It is a website, which legitimizes itself as a business website but only aims at getting the user’s sensitive and personal information. In that case, there is a need for one to be vigilant of any sites, which require personal information such security number, phone number and bank account numbers among others (Wang & Lu, 2013). Secondly, practicing safe e-mailing measures could identify online theft. For example, when you receive email offers, even though it appears too good to be a reality, you should then avoid opening such emails or documents attached if they come from an unknown source. Lastly, one needs to be on watch for sites that claim that they offer reliable financial services. It is safe to transact with financial institutions online only if their authenticity can is trusted and confirmed. Ways to Protect from Cyber Stalkers Cyber stalking refers to a crime in which an online attacker sends threatening messages or e-mails to a different online user. For example, a cyber stalker often uses e-mail, instant messages, phone calls, and other online communication devices to stalk. Here includes some useful pointers that can help protect from cyberstalking. First, an online user needs to be vigilant at all times against any attempt by outsiders to get access to his or her online device. According to (Wang & Lu, 2013), Cyber stalkers often use certain software gadgets to watch their target victims. Secondly, it is important that a person regularly ensure that he or she logs out of the computer programs after each use. Thirdly, practicing good password management and security protects from cyberstalking. You should never share your password and alter it regularly. Data Breaches Data breaching means an incident that involves intentional
  • 8. viewing, accessing or making use of data of a person or an application without legal authority. It is one of the security breaches practiced by hackers mainly to steal and make use of data without authorization. As a security breach, it could lead to data loss such as financial or health data getting lost. In addition, an attacker may steal data, use it for impersonation, and gain entry into a secured place. For instance, a hacker could steal login information of a network administrator and use it to access the entire network. Currently, cases of data breaching have significantly increased, causing a major threat to copyrights of many authors. As a result, it does not seem that the incidents will simply go away especially with the inception of worldwide web where a lot of information is obtained easily and illegally by cyber stalkers. Defense against Data Breach Any individual and organization irrespective of its size needs to be vigilant at all times so that is does not risk exposure to potential threats and data breaching. The following practices need to be in place to serve as defenses against data breach, first, by designing security systems that detect and protect any possible data breaching. Secondly, safeguard confidential and sensitive data from loss by installing data loss protection software (Jensen, Gouda, & Qiu, 2014, January). For example, protection software is able to block valuable data from being sent through e-mail. Thirdly, individuals and enterprises should be vigilant through creation of incident response plans. For example, when the company faces a possible attack then it will be able to react quickly and effectively to have the response plan defend against the attack. Safe Computing The term “safe computing” is commonly used without really understanding what it implies. It means following rules, stipulated to guide a person when using his or her computer or network. Safe computing’s intent is to protect devices against a potential virus or spyware (Vasconcelos et al., 2017). The following practices must occur to help in safe computing; first,
  • 9. a user has to ensure that his or her operating system has the proper updates. For example, one has to download and install the latest security software. It is can be easily done through the automatic update prompt located in the control panel. Secondly, one should ensure that he or she uses a safe browser that does not easily allow spyware. Lastly, a person should not at any time open attachments that he or she did not expect. Significance of General Software Updates as well as Patches The general software updates and patches often appear in little windows reminding users of the need for computer updates. They are important in updating operating systems and other software programs installed in the computer for various uses. If the user completes the updates as required, it saves from multiple revisions to the operating system such as incorporating new outlooks, removing some outdated features, and updating drivers and eliminates security gaps. By a security gap, it means software installed in a computer that has become vulnerable to attackers and viruses (Vasconcelos et al., 2017). For example, hackers, often target these security gaps simply by designing a certain malware that comes as a package to the system. Therefore, it is essential to carry out regular general software updates and patches to remedy any existing security gaps. Meaning of Man in the Middle Attack Man-in-the-middle attack (MITMA) is an attack where a user comes in between the sender and recipient of particular information. According to, (Jensen, Gouda, & Qiu, 2014, January), once he or she gets the information sent, he or she sniffs the information. The situation occurs mainly when a user sends unencrypted data that is easily accessible by the third party referred to as a man-in-the-middle attack. Conclusion Finally, it is worth noting that there are real vulnerabilities that come in different ways with the inception of technology. As a result, hackers take advantage of people’s ignorance in ensuring safe computing to avoid exposure to risks and theft. Practicing
  • 10. safe computing is the best way to ensure that every user is secure against all the challenges of cyber security. It is the most important and the most difficult practice especially for the new e-mail users. It is should be adhered to mostly because the spyware and viruses are installed onto an operating system by e- mail more than any others means. While cyber security significantly assists in to protecting us, many enterprises together with their esteemed clients, from someone falsely representing something as beneficial to them or to infiltrate our systems, it is in great need to be expanded on in order to safeguard us, and to create a safer environment protecting companies and our personal information and data, but it can and does fail to provide us complete security, if safe practices are not followed. References Vasconcelos, J. B., Kimble, C., Wang, W., & Lu, Z. (2013), P., & Rocha, Á. (2017). The application of knowledge management to software evolution. International Journal of Information Management, 37(1), 1499-1506. Ding, J., Alsayigh, S., Lancrenon, J., Saraswathy, R. V., & Snook, M. (2017, February). Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post- Quantum World. In Cryptographers’ Track at the RSA Conference (pp. 183-204). Springer, Cham. Jensen, O., Gouda, M., & Qiu, L. (2014, January). A secure credit card protocol over NFC. In Proceedings of the 17th International Conference on Distributed Computing and Networking (p. 32). ACM. Keller, H. (2016). The Internet, Technology, and Identity Theft. Consumer Economics: Issues and Behaviors, 390. Kumar, S. R., Yadav, S. A., Sharma, S., & Singh, A. (2016, February). Recommendations for effective cyber security execution. In Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016 International Conference on (pp. 342- 346). IEEE.
  • 11. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. QNT275 Please answer the following questions 1. Find the value of x2 for 12 degrees of freedom and an area of .025 in the right tail of the chi- square distribution curve. What is the value of chi-square? Round to three decimal places 2. Determine the value of x2 for 14 degrees of freedom and an area of .10 in the left tail of the chi-square distribution curve. What is the value of chi-square? Round to three decimal places 3. Determine the value of x2 for 23 degrees of freedom and an area of .990 in the left tail of the chi-square distribution curve. What is the value of chi-square? Round to three decimal places. 4. A population data set produced the following information. N=460, ∑x=3920, ∑y=2650, ∑xy=26,570, ∑x2=48,530 Find the population regression line. Round to three decimal places. Use the format as an example when submitting your equation 456.123 + 789.123x 5. The following information is obtained from a sample data set. n=12, ∑x=66, ∑y=588, ∑xy=2244, ∑x2=396 Find the estimated regression line Use this format as an example when submitting your equation 123 – 45x For the following 2 questions please use 200 word answers. 6. Describe in your own words a test of independence and a test of homogeneity. Give one example of each. Explain how the expected frequencies for cells of a contingency table are calculated in a test of independence or homogeneity. How do you find the degrees of freedom for such tests? To make a test
  • 12. of independence or homogeneity, what should be the minimum expected frequency for each cell? What are the alternatives if this condition is not satisfied? 7. Explain the meaning of the words simple and linear as used in simple linear regression. Explain the meaning of independent and dependent variables for a regression model. Explain the difference between exact and nonexact relationships between two variables. Give one example of each. Explain the difference between linear and nonlinear relationships between two variables.