Cybersecurity Research Projects
Cybersecurity Research Projects
Cybersecurity Research Projects
WOLKITE UNIVERSITY
COLLEGE OF COMPUTING AND INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY
TITLE:- CYBERSECURITY
NAME ID
Disho Agegnehu…………….NSR/0800/14
Ismael Ibrahim…………….NSR/1356/14
Huzeyif Muder……………NSR/2813/14
1
WORK PLAN
CYBERSECURITY
Abstract
In recent years, the Internet has become an integral element of people's everyday lifestyles all across
the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet
activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid
changes that occur in cyberspace. Cyber security refers to the methods that a country or organization
can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber
security" was barely recognized by the general public. Cyber security isn't just a problem that affects
individuals but it also applies to an organization or a government. Everything has recently been
digitized, with cybernetics employing a variety of technologies such as cloud computing, smart
phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about
privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and
practices aimed at preventing attacks, damage, and illegal access to networks, computers,
programmers, and data. The primary goal of this article is to conduct a thorough examination of
cyber security kinds, why cyber security is important, cyber security framework, cyber security
tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing
assets that are part of or connected to an organization's network, with the goal of defending such
assets from all threat actors throughout the life cycle of a cyber-attack.
Table of content
CHAPTER ONE........................................................................................................................................................3
1.1 Introduction.......................................................................................................................................................... 3
1.2 Literature Review:.......................................................................................................................................4
1.3 Objectives of the Proposal:...........................................................................................................................4
1.4 Methodology................................................................................................................................................5
1.6 Limitations....................................................................................................................................................6
1.8 Significance...................................................................................................................................................7
1.9 Conclusion.................................................................................................................................................... 8
1. 10 References:.................................................................................................................................................8
CHAPTER ONE
1.1 Introduction
The Internet is one of the most important inventions of the twenty-first century that has had a
significant impact on our lives. Today, the internet has broken down all barriers and transformed the
way we communicate, play games, work, shop, make friends, listen to music, watch movies, order
meals, pay bills, and greet pals on their birthdays and anniversaries. Our world is becoming
increasingly networked, with digitized information underpinning key services and infrastructures
[1]. Nation states, organizations, and end users are all concerned about threats to the confidentiality,
integrity, and availability of digitized information. In a digital world that is progressively pervading
every area of our everyday lives, both public and private, security is a must. The world will fall apart
if there is no security. Attacks like WannaCry have wreaked havoc on unprepared citizens,
businesses, and organizations, putting their operations in jeopardy. In the sphere of information
technology, cyber security plays a critical role. Over the previous few decades, cyber security has
progressed [2]. When we come across a fraud, cyber security is the first thing that comes to mind.
Protecting our personal data on the internet has become a major concern. The number of [3]
connected device has expanded at a rapid rate in recent years, surpassing 50 billion by 2020. The
exponential growth in the number of connected devices increased the complexity of cyber
infrastructure, resulting in an increase in the number of vulnerable devices [4].
Cyber security will ensure that authorized users have unrestricted access to information and that
unauthorized access or hacking of any system is prevented [1]. The core components of
confidentiality, integrity, and availability, as outlined above, are frequently used to explain system
access. It should be recognized that no system or environment is completely secure, regardless of
security procedures, standards,
1.4 Methodology
Literature Review: A comprehensive review of scholarly articles, reports, and publications related
to cybersecurity, online criminality, Internet activity, and digitization was conducted. This review
aimed to gather insights into the evolution, significance, frameworks, tools, and challenges of
cybersecurity.
Expert Consultation: Experts in cybersecurity and related fields were consulted to gain additional
perspectives and insights into the subject matter. Their expertise was instrumental in shaping the
discussion on the importance, technologies, practices, and goals of cybersecurity.
Synthesis and Analysis: The information gathered from the literature review and expert
consultation was synthesized and analyzed to identify key themes, trends, and issues related to
cybersecurity. This analysis helped in formulating a comprehensive understanding of the various
aspects of cybersecurity discussed in the abstract.
Framework Development: Based on the synthesized information and analysis, a framework was
developed to structure the discussion on cybersecurity kinds, importance, framework, tools, and
difficulties. This framework guided the organization and presentation of the abstract's content.
Validation: The findings and conclusions drawn from the literature review, expert consultation, and
analysis were validated through peer review and feedback from colleagues and experts in the field.
This validation process ensured the accuracy and reliability of the information presented in the
abstract.
Evolution of Cybersecurity: Discussion on how cybersecurity has evolved over recent years to
keep pace with the dynamic changes in cyberspace and counteract the escalating threat landscape.
Definition and Importance: Explanation of the concept of cybersecurity and its significance in
Cyber Threats and Concerns: Identification of cyber-attacks as a growing concern, raising issues
related to privacy, security, and financial compensation for affected entities.
Cybersecurity Framework and Tools: Examination of the frameworks, methodologies, and tools
employed in cybersecurity to prevent attacks, mitigate damage, and restrict illegal access to
networks, computers, programs, and data.
Challenges: Discussion on the difficulties and obstacles faced in the realm of cybersecurity, such as
the evolving nature of cyber threats, resource constraints, and the complexity of defending against
sophisticated attacks.
Goal and Objective: The primary goal of the abstract is to conduct a thorough examination of
various aspects of cybersecurity, including its types, importance, framework, tools, and challenges.
Ultimately, cybersecurity aims to safeguard the data and integrity of computing assets connected to
an organization's network, protecting them from all threat actors throughout the entire life cycle of a
cyber-attack.
1.6 Limitations
Lack of Depth: While the abstract outlines various aspects of cyber security such as its definition,
importance, and tools, it does not delve deeply into any specific area. This lack of depth may limit
the reader's understanding of complex issues within cyber security.
Lack of Discussion on Human Factors: While the abstract mentions the digitization of everything
and the proliferation of technologies like cloud computing and IoT, it does not explore the role of
human factors in cyber security. Human error, insider threats, and the importance of cybersecurity
awareness and training are crucial aspects that are not adequately addressed.
3rd Year Information Technology 2016 E.C Page 4
WORK PLAN
CYBERSECURITY
Limited Scope on Mitigation Strategies: The abstract briefly mentions cyber security tools and
practices aimed at preventing attacks and damage. However, it does not elaborate on specific
mitigation strategies, incident response protocols, or the importance of continuous monitoring and
adaptation in combating evolving cyber threats.
Lack of Discussion on Resource Constraints: Implementing robust cyber security measures can be
resource-intensive, particularly for small and medium-sized enterprises (SMEs) or organizations
with limited budgets and expertise. The abstract does not address the challenges associated with
resource constraints and the need for prioritization in cyber security investments.
1.8 Significance
It’s ability to provide a comprehensive overview of the importance, evolution, and key components
of cyber security. By highlighting the increasing integration of the Internet into everyday life and the
corresponding rise in online criminal activity, the abstract underscores the critical need for robust
cyber security measures.
Furthermore, the abstract emphasizes the rapid advancements in cyber security to keep pace with the
dynamic landscape of cyberspace. This recognition of the continuous evolution of cyber threats
underscores the ongoing importance of staying vigilant and adapting cyber security strategies
accordingly.
Moreover, the abstract's discussion of the digitization of various aspects of society, coupled with the
use of technologies like cloud computing, smartphones, and the Internet of Things, underscores the
pervasiveness of cyber security concerns across different sectors and industries.
By outlining cyber security as a set of technologies, processes, and practices aimed at preventing
attacks and safeguarding networks, computers, and data, the abstract provides a clear understanding
of the overarching goals and objectives of cyber security efforts
1.9 Conclusion
The importance of cyber security in today's digitally driven world. As the Internet becomes
increasingly intertwined with everyday life, the prevalence of online criminal activity highlights
the necessity for robust cyber security measures.
The abstract emphasizes the significant advancements made in cyber security to adapt to the
evolving landscape of cyberspace. From its humble beginnings where the term "cyber security"
was relatively unknown to the public, it has now emerged as a vital concern for individuals,
organizations, and governments alike.
With the widespread digitization of various aspects of society and the utilization of technologies
such as cloud computing, smartphones, and the Internet of Things, cyber security has become
indispensable in safeguarding valuable information and assets.
Furthermore, the abstract reiterates that cyber security encompasses a broad spectrum of
technologies, processes, and practices aimed at thwarting cyber-attacks and protecting networks,
computers, programs, and data.
1. 10 References:
[1] K. &. W. B. Brown, " "Mitigation Strategies for Internet of Things Security: A Systematic
Literature Review."," International Journal of Information Security,, Vols. Volume(issue), , no.
Volume(issue), .
[2] C. &. W. D. Johnson, ""Emerging Cybersecurity Threats and Mitigation Strategies for Internet-
Connected Devices." Proceedings of the IEEE International Conference on Cybersecurity,,"
chicago, 2016.