Cybersecurity Thesis (Computer Science)
Cybersecurity Thesis (Computer Science)
Cybersecurity Thesis (Computer Science)
FRONT PAGE
ISSUE:
AUTHORS:
Caaguazú - Paraguay
YEAR: 2022
1
MINISTRY OF EDUCATION AND SCIENCES
SUB COVER
AUTHORS:
TUTOR:
Caaguazú - Paraguay
Year 2022
2
MINISTRY OF EDUCATION AND CULTURE
EVALUATION SHEET
EXAMINATION TABLE
…………………………………………
PRESIDENT
……………………………… …………………………………
Members Members
Date :………/………/………
3
DEDICATION
4
GRATITUDE
The trainers and directors of the institution for the support and education
they constantly provide me.
5
INDEX
6
INTRODUCTION
This work has been prepared. The most original approach to the
issue of cybersecurity by doctrine has occurred from the point of view of
collective security. In this context, there is consensus on the application,
difficult in any case, of the basic rules relating to the prohibition of the threat
and use of force already existing in the international order. However,
cybersecurity is a problematic issue that poses various challenges from
other legal-international aspects. After some legal clarifications on
cyberspace, this work aims to analyze cybersecurity from that more holistic
approach, focusing on the efforts that have been developed so far for
greater cooperation in this sector.
1
CHAPTER I
PROBLEM
FRAMEWORK
2
PROBLEM STATEMENT
3
GENERAL OBJECTIVE
SPECIFIC OBJECTIVES
4
RESEARCH QUESTIONS
SPECIFIC QUESTIONS
5
THEORETIC
AL
FRAMEWOR
K
6
CHAPTER I
1. Cybersecurity
1.1. Concept
7
integrations between select Cisco security products and accelerate key security operations
functions: detection, investigation and remediation.
Users should understand and adhere to basic data security principles, such as
choosing strong passwords, being cautious with email attachments, and backing up data.
Learn more about cybersecurity basics .
1.2. History
8
Malware increased its presence in the 80s and at the same time more efficient
antiviruses were developed. Currently, an endpoint detection and response (EDR) platform
is used to protect computers from a malware attack due to its great evolution.
At the end of this decade, Kevin Mitnick used social engineering to gain access to
personal and confidential information; This type of cyberattack, which began to be more
widely used at that time, continues to be one of the most popular methods to violate a
company's assets; however, it can be prevented and reduced with a good strategy,
employee training and security protocols. security awareness.
The regulation of the Internet is an enormous challenge due to its international
nature and the variety of its content. In the early 90s, the need to confront cyber attacks
became a topic of international discussion; the lack of knowledge about cyberspace,
security measures, jurisdiction and competition mainly affected developed countries,
where the use of Technology and user abuse affected the economy and society.
The first actions to create legal mechanisms against cybercrimes were local. In
1986, the Computer Fraud and Abuse Act was created in the United States, however, its
capacity was surpassed by technological transformation.
In 1995, a committee of cybercrime experts was formed in Europe to work on
strategies to counter attacks over the Internet. Convinced of the need to apply a criminal
policy to protect society against cybercrime and the importance of strengthening
international cooperation, in 2001 the Budapest Convention was approved and signed,
which today is made up of 56 countries.
1.3. Classification
Hardware cybersecurity
Hardware cybersecurity is that modality that seeks to protect the integrity of the
physical support of a computer system. Hardware is the set of physical elements and
devices that represent the components or accessories of a computer. Said simply but
clearly, it is everything that you can see and touch on a computer, mobile phone, console,
tablet, etc.
9
Software cybersecurity
Software cybersecurity is that modality that seeks to protect the integrity of the operational
support of a computer system. Software is the set of programs and collection of codes that
serve as instructions for the computer to execute its functions. Said simply but clearly, it is
everything that you cannot see or touch but that represents the “mind” of the computer,
Thus, computer software security is that which is intended to guarantee the protection of
the operating system and the programs within it, being key to protecting data, preventing
access to confidential information and guaranteeing the correct functioning of the
applications.
Network cybersecurity
Network cybersecurity is that modality that seeks to protect the integrity of the information
during the processes of issuing and receiving it between different computer systems,
preventing it from being intercepted and decrypted by a third person along the way. Thus,
computer network security is one that does not protect the hardware or software of a
system, but rather the information itself while it is transmitted between units.
Personal cybersecurity
Corporate cybersecurity
National cybersecurity
National cybersecurity is that which is applied to the computer systems that are part of a
State's network. Thus, we are not dealing with an individual or a company, but with the
entire computer network of a country. Therefore, strategies must be implemented that
protect all confidential data of the State, since a cyber attack can represent a serious crisis
for the nation.
Active cybersecurity
10
By active cybersecurity we understand all those protection strategies that are activated
when the defenses of a computer system have been attacked. An attack has occurred since
a hacker has managed to circumvent the defenses, so strategies must be initiated to combat
this cyberattack and protect or, in the worst case, recover the information that has been
stolen.
Passive cybersecurity
By passive cybersecurity, on the other hand, we understand all those protection strategies
that prevent cyber attacks. They are always active, forming solid defenses that prevent
computer attacks from occurring, anticipating these threats before they occur and
generating walls that must have the smallest possible gaps.
Physical cybersecurity
Logical Cybersecurity
On the other hand, logical cybersecurity is any form of security that cannot be carried out
analogically, since it involves all those active and passive cybersecurity tasks that we have
been analyzing and that were related to the protection of the software and the data and
information contained therein. in computer programs.
11
CHAPTER II
2. INTERNET
2.1 Concept
12
2.2 History
2.3 Tools
13
CHAPTER III
3. SOCIAL NETWORKS
3.1 Concept
Social networks are communities formed by different users and organizations that
interact with each other on Internet platforms.
3.2 Utility
Some of the functions provided by social networks are of vital importance for
accounts with many followers or for brands. Because thousands of people in the world
highlight that social networks are useful, we will tell you what their main functions are.
Create or generate new connections
Maintain personal contacts
Maintain professional contacts
To be updated
Promote products or services of a company or individual
14
Generate web traffic
Build an online community
There are different types of social networks on the Internet, each type offers specific
services. Below, we mention the most used social networks of each type:
Facebook : It is the most famous today and exceeds 2 billion active users per
month. In it you can create friends and share content in the form of images, videos
or statuses.
WhatsApp : Keeps millions of users around the world in touch through mobile
phones with instant messages. Advertising on this platform is booming.
YouTube : It is the video network par excellence. Companies use it to introduce
their advertising, with YouTubers also being key actors.
Instagram: One of the most visual networks and most used by users today. You can
share images, stories that can only be viewed for 24 hours, and videos.
Twitter: It is based on the microblogging format through short messages of 150
characters maximum. It is a social network widely used to stay informed or learn
about certain topics.
Pinterest: Another visual network that includes photo boards that are shared by
users.
Linkedin: It is a social network to exchange job offers and connect with
professional contacts.
TikTok: This social network allows you to share short videos between users.
15
CHAPTER IV
4. Identity theft
4.1 Concept
Identity theft is a malicious activity that consists of impersonating another person for
various reasons: committing some type of fraud, illegally obtaining data, committing
cyberbullying or grooming (gaining the trust of a minor in order to sexually abuse him or
her). . The most typical example of impersonation is creating a fake profile on social
networks to be able to communicate with other people by pretending to be them.
In general, we tend to think that the only people whose identity is impersonated are
famous people, such as politicians or celebrities . This is a misconception, as any identity
of an anonymous user is at risk of being spoofed. The number of people who have reported
identity theft has grown exponentially in recent years.
4.2 Classification
Interactivity
The main social networks such as Facebook, Twitter, Instagram and Twitter offer different
tools or applications to motivate the user to stay there. Additionally, posts on these
platforms can become interactive through reactions, retweets, likes or comments. As a
consequence, the user has the ability to show whether a publication is to their liking or not.
Which gives importance to your opinion.
Connectivity
Currently, most social networks allow access to the platform from any mobile device. This
is because new technologies have helped thousands of people to be connected from their
16
cell phones, tablets or computers. For this reason, several social networks have configured
and are constantly updating their versions for mobile devices or PCs.
Personalization
Social networks allow you to create a profile and configure it according to the user's
preferences. That is, the person can adapt their feed to their tastes and personality.
Likewise, they give the possibility of having direct interaction with other people who have
the same interests.
Massivity
One characteristic that stands out about social networks is that it is possible to reach all
audiences. The platforms differ by being massive, having thousands of users around the
world. Therefore, the content created is easier to be seen. As a consequence, brands
implement marketing strategies in them.
Virtual communities
Social networks have become virtual communities that help diversify user information. In
them, communication is a fundamental piece to form groups with similar tastes. Likewise,
it gives the possibility of sharing preferences and opinions on various topics.
Immediacy
One of the most notable characteristics of social networks is immediacy, since through
these platforms you can obtain news or information in real time. This point is essential for
brands because when the user obtains a response at the moment it can give a good image of
the brand.
Virality
Social networks facilitate the viralization of content. They are characterized by making the
publications have greater interaction by users, increasing their spread to become viral
publications. This is how a publication becomes relevant and can become news.
17
CHAPTER V
5. MALWARE
5.1 Concept
5.2 History
Given the variety of malware types and the enormous number of variants that roam
freely every day, a complete history of malware would be too long a list to include here.
That said, it's more manageable to take a look at malware trends in recent decades. These
are the main trends in malware development.
1980s : The theoretical foundation for “self-replicating automata” (i.e., viruses) dates back
to a paper published in 1949, and the first viruses infected pre-PC platforms in the 1970s. .
However, the history of modern viruses begins with a program called “Elk Cloner,” which
began infecting Apple II systems in 1982. The virus, which spread via floppy disks, was
harmless on its own, but it spread to all disks connected to a system and exploded with
such virulence that it can be considered the first large-scale computer virus outbreak in
history. Note that this was before any Windows PC malware. Since then, viruses and
worms have only become more widespread.
18
1990s : The Microsoft Windows platform emerged in this decade, along with flexible
macros in its applications, which allowed malware authors to write infectious code in the
macro language of Microsoft Word and other programs. These macro viruses infected
documents and templates, not executable applications, although strictly speaking, macros
in Word documents are a type of executable code.
2002 to 2007 : Instant messaging worms (malicious code that replicates itself across an
instant messaging network) exploit network loopholes on a massive scale and infect AOL
Instant Messaging, MSN Messenger networks and Yahoo Messenger, as well as enterprise
instant messaging systems.
From 2005 to 2009 : Adware attacks proliferated, delivering unwanted advertising to
computer screens, sometimes in the form of a pop-up message or a window that users
could not close. These ads often leveraged legitimate software as a means to spread, but in
2008, software publishers began suing adware companies for fraud. The result was the
payment of millions of dollars in fines. Ultimately, this caused the adware companies to
shut down.
From 2007 to 2009 : Malware scams used social media channels such as MySpace to
distribute dishonest advertising, redirects, and offers of fake antivirus and security tools.
Their schemes were designed to trick users through social engineering tricks. Facebook
and Twitter became their preferred platforms when MySpace's popularity declined. Some
of the common tactics included presenting fake links to phishing pages and promoting
Facebook apps with malicious extensions. As this trend subsided, scammers explored other
means of stealing .
2013 : A new type of malware called ransomware launched an attack under the name
CryptoLocker, which took place from early September 2013 to late May 2014 and targeted
Windows computers. CryptoLocker managed to force its victims to pay around $27 million
in the last quarter of 2013. Furthermore, the success of this ransomware spawned other
ransomware with similar names. Using a copied variant, they pocketed more than $18
million from approximately 1,000 victims between April 2014 and June 2015.
From 2013 to 2017 : Ransomware, distributed through Trojans, exploits, and malvertising,
became the king of malware. The culmination was the large outbreaks of 2017 that
affected companies of all types. Ransomware activity involves encrypting the victim's data
and then demanding payments to release that data.
19
From 2017 to now : Cryptocurrency—and how to mine it—has gained widespread
attention and led to the creation of a new malware scam called “cryptojacking,” which is
the act of secretly using another person's device to surreptitiously mine cryptocurrency.
with the victim's resources.
5.3 Classification
These are the most common bad actors in the gallery of malware dishonesty:
Spyware is malware that observes the user's activities on the computer secretly and
without permission, and reports them to the author of the software.
A virus is malware that attaches itself to another program and, when executed—
usually without the user's knowledge—it replicates itself by modifying other
programs on the computer and infecting them with its own bits of code.
20
difficult to track. The code underlying ransomware is easy to obtain through illegal
online marketplaces and defending against it is very difficult.
The rootkit is a type of malware that provides the attacker with administrator
privileges on the infected system. It is also typically designed to remain hidden
from the user, other system software, and the operating system itself.
A keylogger is malware that records all of the user's keystrokes, stores the collected
information, and sends it to the attacker, who searches for sensitive information
such as usernames, passwords, or credit card details.
Exploits are a type of malware that takes advantage of errors and vulnerabilities in
a system so that the creator of the exploit can take control. The exploits are linked
to, among other threats, malvertising , which attacks through a legitimate site that
inadvertently downloads malicious content from a dangerous site. The harmful
content then attempts to install itself on the computer after an inadvertent
download. You don't even need to click. All you have to do is visit a good site on
the wrong day.
21
CHAPTER VI
6.1 Concept
It has been proposed to start the process of Cyber Defense through Computer
Intelligence with Cyberspace as an environment, in order to obtain the descriptor
elements that make up the identification of the scenarios and at the same time
parameterize the threats, to be able to size the risks and thus enable the design. of
defense instruments.
22
Threats due to origin The fact of connecting a network to an external environment
gives us the possibility that an attacker can enter it, with this, information can be stolen or
the operation of the network can be altered. However, the fact that the network is not
connected to an external environment, such as the Internet, does not guarantee its security.
According to the Computer Security Institute (CSI) of San Francisco, approximately 60 to
80 percent of network incidents are caused from within the network. Based on the origin of
the attack we can say that there are two types of threats:
External threats
Internal Threats
They originate outside the local network. By not having accurate information about
the network, an attacker has to take certain steps to know what is on it and find a way to
attack it.
The advantage in this case is that the network administrator can prevent a good part
of external attacks.
To classify it as external it must be exclusively by people outside the network, it
could be due to vulnerabilities that allow access to the network: rosettes, accessible
switches or Hubs, unprotected wireless networks, unattended equipment, etc.
23
CHAPTER VII
7. THE VULNERABILITIES
7.1 Concept
Vulnerability is the risk that a person, system or object may suffer from imminent
dangers , whether natural disasters, economic, political, social or cultural inequalities.
The word vulnerability derives from the Latin vulnerabilis . It is composed of
vulnus , meaning 'wound', and the suffix - abilis , indicating possibility; Therefore,
etymologically, vulnerability indicates a greater probability of being hurt.
Vulnerabilities take different forms, depending on the nature of the object of study, its
causes and consequences. In the face of a natural disaster such as a hurricane, for example,
poverty is a vulnerability factor that leaves victims immobilized without the ability to
respond adequately.
Some synonyms for the word vulnerability are weakness, weakness, susceptibility, risk
and threat.
In different periods of history, there are groups of people who have a high level of
vulnerability due to the threat situations and extreme disasters they experience.
In this aspect, many of these people are examples of resilience, that is, the ability to
overcome extreme adversity.
Logical threats comprise a series of programs that can damage the computer system. And
these programs have been created: intentionally to do harm: malicious software or malware
(malicious software).
24
7.4 TYPES OF VULNERABILITY
25
CHAPTER III
METHODOLOGIC
AL FRAMEWORK
26
III- 1.2. Kind of investigation
According to its nature: it is mixed type because information from nature is
preferably used. Qualitative, and in its application it does not exclude
information from nature. Quantitative, to complement and enrich the
information provided.
According to its object: it is a non-experimental research because it only
studies the reality situation of the chosen topic in its natural environment
without conditioning it in any way but rather observing the real situation in
which it is found.
According to its period and sequence: the research is transversal, because
the variables are studied simultaneously at a certain moment, making a cut
in time, according to the time of occurrence of the facts and research
records, it is a retrospective work because they are recorded the events
that occurred focused on the present, making a description focused on the
reality experienced in the aforementioned educational institution, depending
on the level, it belongs to a descriptive exploratory research.
27
Research Level
Technical Methods:
The methods used are three:
The Deductive Method : because it started from general theories found in
secondary or bibliographic sources and then confronted with the reality
experienced in the place of research.
The Analytical Method : because the facts were analyzed in their
constituent parts, that is, their contents from the sources as well as the
results of the application of the techniques and instruments were examined
and a conclusion was reached.
Synthetic Method : the techniques and instruments used in the research
were: the survey and the analysis of the document with their respective
instruments. The closed-type questionnaire and the bibliography.
28
III-1.3. Design of the investigation
Processing of Collected Data.
Once the data was collected, the processing was carried out through the use of
statistical tools with the support of the computer, we used specific programs, the
frequency table and graphing were formulated, that is, the dispersed, disordered,
individual data were processed. obtained during field work, it has to generate
results (data grouped and generated from which the analysis and interpretation
of the data are carried out according to the objectives or research questions
asked.
Temporal Delimitation
The research is carried out from June to September 2022.
Space
The investigation is carried out in the Centenario neighborhood of this city
29
CHAPTER IV
RESULTS AND
ANALYSIS
30
Chapter V
Conclusion
31
Conclusion
32
recommendations
33
Bibliography
https://www.significados.com/internet
http://www.cisco.com/c/es_mx/products/security/what-is-cybersecurity.html
http://economipedia.com//definiciones/redes-sociales.html
http://protecciondatos-lopd.com/empresas/suplantacion-de-identidad/
http://es.malwarebytes.com/malware/
http://cari.org.ar/pdf/ciberdefensa-riesgos-amenazas .
http://www.significados.com/vulneribilidad/
34
Exhibit
35
MINISTRY OF EDUCATION AND SCIENCES
QUESTIONNAIRE
36