Wednesday, May 6, 2020

Emerging Technology and Innovation for Security - myassignmenthelp

Question: Discuss about theEmerging Technology and Innovation for Security. Answer: Significance of the Research In todays world the networking concept is merged together from the concept of government infrastructure to internet banking. So it can be stated that the network protection is no longer an extra option. Cyber security or the cyber-attacks can be indicated as an international concern, as breaches which are high profile have mainly given up many factors of concern that mainly gives a concern that hacks and other attacks which are related to the security which could endanger the economy of the global. A cyber-attack can be referred to as a deliberate exploitation related to the computer system, technological dependant networks and enterprise. The cyber attackers mainly use the malicious code activity and other softwares to alter the computer code, data and the logics which mainly result in the consequence which can be termed as disruptive which mainly compromise the data and directly lead to cybercrimes such as identify the system infiltrations and the theft (Kolini Janczewski, 2017). How original is the approach? Billions are dollars are spending every year for the main objective of securing the network infrastructure, resources and the devices against the main threats in order to protect them from the impact of the cyber security breaches. It can be stated that the motivations, affect and the practices of people can be directly effective in the concern of the most cyber security initiatives. The people are very much lagging behind the main motive of gaining the access with regards to the information and the critical technology which are disenfranchised, this mainly values the concept of autonomy, privacy, adaptability and the access of the information, processes and policy that are mainly build with people. Though many methods can be introduced for the purpose of investigation, practices and its direct effect, qualitative methods are very much particular and can be termed as necessary for the different ways in order to know about the phenomena of the cyber security aspect. The research prospective in order to know the different aspect related to the case can include human computer interaction (HCI), value and design, digital and information literacy, engineer8ing ethics and diversity and inclusion. Linking all these field together in the concept of the cyber security will direct improve the understanding of the concept of deeply human questions within the mere concept of the cyber security. Literature review What things were proposed and measure in the literature By the means of qualitative approach with emphasis on the data analysis, it has been seen that the incident of the cyber are increasing on a day to day basis which mainly lead to a lost in the data with regards to many of the organisations. It has been found out from the analysis that the rate of incident is increasing on an average basis of 45 incidents per month basis. The incident rate was analysed for different types of attack vectors which are taken into account which helps in giving the detail description related to the cyber-attacks for a particular organisation. What are the researchers trying to find out? The main aim of the researchers is founding out the main problem which is related to the cyber-attacks and with it implementing necessary functional prospective in order to reduce the overall effect of the attacks if they are incorporated in the access area of the world of the internet. Why is it an interesting or useful problem? It is very much useful due to the factor that early detection of the issue can be directly reduce the overall affect which it can have on the prospective of the data. How original is the approach? It can be stated that the motivations, affect and the practices of people can be directly effective in the concern of the most cyber security initiatives. The people are very much lagging behind the main motive of gaining the access with regards to the information and the critical technology which are disenfranchised, this mainly values the concept of autonomy, privacy, adaptability and the access of the information, processes and policy that are mainly build with people. Though many methods can be introduced for the purpose of investigation, practices and its direct effect, qualitative methods are very much particular and can be termed as necessary for the different ways in order to know about the phenomena of the cyber security aspect. The research prospective in order to know the different aspect related to the case can include human computer interaction (HCI), value and design, digital and information literacy, engineer8ing ethics and diversity and inclusion. Linking all these field together in the concept of the cyber security will direct improve the understanding of the concept of deeply human questions within the mere concept of the cyber security (Overbye et al., 2017) What things were proposed? The availability of the data is the main point of concern which has to be emphasised in the topic. The concept of the ability of the network to connect automatically to a remote server has added a great deal of the convenience of the user which is termed as an end user. the concept which is applied is the virtual private network in order to achieve the concept remotely. A virtual private network can be used to encrypt data channel in order to secure sending and receiving the data via an infrastructure which is public such as an internet. Through the use of the virtual private network internal resources such as files, data base, printers or websites can be directly being connected. What things were measured? The main things which are measured in the concept is the network segmentation and mainly the categorization of the assets, personal data into groups which are specific and then majorly restricting the access to these groups. By placing the resources into different areas of the network, a compromise of different sectors cannot be merely being translated into the exploitation of the entire system. The concept of the ability of the network to connect automatically to a remote server has added a great deal of the convenience of the user which is termed as an end user. the concept which is applied is the virtual private network in order to achieve the concept remotely. A virtual private network can be used to encrypt data channel in order to secure sending and receiving the data via an infrastructure which is public such as an internet. Through the use of the virtual private network internal resources such as files, data base, printers or websites can be directly being connected. The main result which is achieved from the process are: Confidentiality: Any important information which has to be kept secured have to be always kept confidential. This information should be accessed by people or the system that have the mere permission to grant access to those. Integrity: Maintaining the concept of integrity which is related to the information assets in order to keep each and everything intact, complete and uncorrupted format. Availability: Maintaining the concept of availability of services, system and the information when required by the client and the business is achieved. Research gap What are the limitations of their work? The main limitations of the work are: Signature based: the signature which are related to the database and the known bad habits mainly cant keep pace with the bad elements can mainly keep pace with the volume of the malware which are new strains which are created daily. Scalability lack: managing the concept of identities / users, all applications, all data with the products that have a serious scalability mainly narrow the security analysis into a sub set event and log data. Highly distributed environment are not supported: most of the organisations have distributed environments. Most the solution which are related to the concept of distributed environment mainly deploy the application part and the collection agents to these locales. On the other hand, compounds analysis latency with regards to the data parsing and the filtering process at the point for collection and filtering require mainly the inbound data to come to rest in a database before the processing of future elements. Difficult to manage and deploy: in order to protect the data from sophisticated attacks, it is very much essential to collect the data from different events and devices. It can be simple be not feasible with the point of view of the application and the human beings in order to handle the information collected and the analysis of the workload which is require to detect everything. What are the holes in their work? The main hole in the work is the precaution level which can be implemented in the factor of the cyber security. The main factor which should be taken into consideration is that the precaution should be always made in the first hand. Detecting of the holes in a technology in the first hand can be very much beneficial in order to reduce the overall concept of the impact it can superimpose on the field of the technology. Aim of your research What is the aim of your work? The main aim of the work is to come up with strategies in order to measure the seek to reduce the risk of crimes which are occurring and mainly mitigate the potential harms on society and individual. It can be stated that almost 60% of the countries which are responding report the presence of the national law or policy which are on cyber-crime prevention (Pandey et al., 2016). The organisation have stated that there are many good practices that are related to cyber-crime prevention which may include development of a strong knowledge base, promulgation of legislation, effective leadership and law enforcement capacity. It has been taken into consideration by survey which is conducted in developing countries that most individual take extra precaution of the data as an extra precaution. The continuation of the awareness should be continued in the factors that the crime which are reared to the concept are increasing on a day to day basis and the precaution would directly help in reduction the factors which directly help in initiating the crime (Ganguly et al., 2017). Material and Methods The main method for the research which is suggested is the qualitative method. The step by step formation of the research are as follows: Selection of the system which are considered to be a subject of evaluation Defining of the scope of the evaluation, collection of the information which is needed for the research Identification of the threats which can be linked to evaluated system. Identification of the susceptibility with regards to the evaluated system. Specification of the main probabilities which are related to the susceptibility of the usage by identification of the treat and its sources (probability can be defined as low, high and medium). Analysis and the determination of the incidents with regards to the impact on the data, system and organisation (Cunningham Zissman, 2016). Data Collection The data collection methods which can be included in the research are: Interview individual. Focus groups. Research action. Other methods which can be involved in the concept are direct interaction with individual on a one to one basis or direct interaction with the individuals in a setting of groups (Ayres et al., 2016). Data Inclusion Criteria If the resources are publicly available on the scope of the internet, accurate and can add comprehensive for the dimension of the framework and freely available for the others users to use it, it becomes a basic criterion for the inclusion in the framework web site. Pay for resource associated with mainly non-profit entities can also meet the basic criteria which can be related to the inclusion in the web site (Herrera, Ron Rabado, 2017). Data Analysis The data analysis in this concept can be done followed by the following means: Explore the host, network and the service sensor for means of capturing the security data. Strong of the data traffic with the relational database, reds, graph databases and Hadoop. Use of R language or silk and other tools in order to perform visualisation and analysis. Detection of the unusual phenomena through the exploratory data analysis (EDA) Determine the traffic that crossing the service port in the network. Conclusion The report can be concluded on a point that as technological take place in the advanced world with it the treats related to it also increase. The countering part with it has to be superimposed so that the threats which are related to the concept can be minimized as well its affect. In the report different sections are introduced which can directly help in procuring the concept with it help in the technological advancement. Though many methods can be introduced for the purpose of investigation, practices and its direct effect, qualitative methods are very much particular and can be termed as necessary for the different ways in order to know about the phenomena of the cyber security aspect. The research prospective in order to know the different aspect related to the case can include human computer interaction (HCI), value and design, digital and information literacy, engineering ethics and diversity and inclusion. Linking all these field together in the concept of the cyber security w ill direct improve the understanding of the concept of deeply human questions within the mere concept of the cyber security References Kolini, F., Janczewski, L. (2017). Clustering and Topic Modelling: A New Approach for Analysis of National Cyber security Strategies. Ayres, N., Maglaras, L., Janicke, H., Smith, R., He, Y. (2016). The mimetic virus: A vector for cyber security. Cunningham, R. K., Zissman, M. A. (2016). Cyber Security Research at Lincoln Labora Ganguly, R., Rajan, A., Shetty, P. R., Gadhe, G. P. (2016). U.S. Patent Application No. 15/042,054. Kruse, C. S., Frederick, B., Jacobson, T., Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. Shabtai, A., Elovici, Y., Peylo, C., Chizi, B., Zacharish, B., Mimran, D., Glemser, T. (2016). U.S. Patent Application No. 15/393,272. Rahman, M., Saha, N. K., Sarker, M. N. I., Sultana, A., Prodhan, A. Z. M. S. (2017). Problems and Prospects of Electronic Banking in Bangladesh: A Case Study on Dutch-Bangla Bank Limited. American Journal of Operations Management and Information Systems, 2(1), 42-53. Mahajan, D. (2016). Foreign Direct Investment in Defence Sector in India: Problems and Prospects. Journal of Commerce and Trade, 11(1), 77-84. Glushakova, O. V., Fadeykina, N. V., Baranova, I. V. (2016). Problems and Prospects of Development of Human Capital As the Immanent Basis of Quality of Life of the Rural Population of the Russian Federation. Foods and Raw materials, 4(2). Pandey, R. K., Misra, M. (2016, December). Cyber security threatsSmart grid infrastructure. In Power Systems Conference (NPSC), 2016 National (pp. Overbye, T. J., Mao, Z., Shetye, K. S., Weber, J. D. (2017, February). An interactive, extensible environment for power system simulation on the PMU time frame with a cyber security application. In Power and Energy Conference (TPEC), IEEE Texas (pp. 1-6). IEEE. Herrera, A. V., Ron, M., Rabado, C. (2017, June). National cyber-security policies oriented to BYOD (bring your own device): Systematic review. In Information Systems and Technologies (CISTI), 2017 12th Iberian Conference on (pp. 1-4). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.