Cybersecurity Research Projects

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

CYBERSECURITY

WOLKITE UNIVERSITY
COLLEGE OF COMPUTING AND INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY
TITLE:- CYBERSECURITY

NAME ID

Disho Agegnehu…………….NSR/0800/14

Ismael Ibrahim…………….NSR/1356/14

Huzeyif Muder……………NSR/2813/14

Submit to: Mr. Zelalem

Submission date: 2016 E.C

1
WORK PLAN
CYBERSECURITY

Abstract
In recent years, the Internet has become an integral element of people's everyday lifestyles all across
the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet
activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid
changes that occur in cyberspace. Cyber security refers to the methods that a country or organization
can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber
security" was barely recognized by the general public. Cyber security isn't just a problem that affects
individuals but it also applies to an organization or a government. Everything has recently been
digitized, with cybernetics employing a variety of technologies such as cloud computing, smart
phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about
privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and
practices aimed at preventing attacks, damage, and illegal access to networks, computers,
programmers, and data. The primary goal of this article is to conduct a thorough examination of
cyber security kinds, why cyber security is important, cyber security framework, cyber security
tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing
assets that are part of or connected to an organization's network, with the goal of defending such
assets from all threat actors throughout the life cycle of a cyber-attack.

3rd Year Information Technology 2016 E.C I


WORK PLAN
CYBERSECURITY

Table of content

CHAPTER ONE........................................................................................................................................................3
1.1 Introduction.......................................................................................................................................................... 3
1.2 Literature Review:.......................................................................................................................................4
1.3 Objectives of the Proposal:...........................................................................................................................4
1.4 Methodology................................................................................................................................................5
1.6 Limitations....................................................................................................................................................6
1.8 Significance...................................................................................................................................................7
1.9 Conclusion.................................................................................................................................................... 8
1. 10 References:.................................................................................................................................................8

3rd Year Information Technology 2016 E.C II


WORK PLAN
CYBERSECURITY

CHAPTER ONE

1.1 Introduction

The Internet is one of the most important inventions of the twenty-first century that has had a
significant impact on our lives. Today, the internet has broken down all barriers and transformed the
way we communicate, play games, work, shop, make friends, listen to music, watch movies, order
meals, pay bills, and greet pals on their birthdays and anniversaries. Our world is becoming
increasingly networked, with digitized information underpinning key services and infrastructures
[1]. Nation states, organizations, and end users are all concerned about threats to the confidentiality,
integrity, and availability of digitized information. In a digital world that is progressively pervading
every area of our everyday lives, both public and private, security is a must. The world will fall apart
if there is no security. Attacks like WannaCry have wreaked havoc on unprepared citizens,
businesses, and organizations, putting their operations in jeopardy. In the sphere of information
technology, cyber security plays a critical role. Over the previous few decades, cyber security has
progressed [2]. When we come across a fraud, cyber security is the first thing that comes to mind.
Protecting our personal data on the internet has become a major concern. The number of [3]
connected device has expanded at a rapid rate in recent years, surpassing 50 billion by 2020. The
exponential growth in the number of connected devices increased the complexity of cyber
infrastructure, resulting in an increase in the number of vulnerable devices [4].

Cyber security will ensure that authorized users have unrestricted access to information and that
unauthorized access or hacking of any system is prevented [1]. The core components of
confidentiality, integrity, and availability, as outlined above, are frequently used to explain system
access. It should be recognized that no system or environment is completely secure, regardless of
security procedures, standards,

3rd Year Information Technology 2016 E.C Page 1


WORK PLAN
CYBERSECURITY
or technology. Cyber security [4]is an ever-expanding field. Every day, new hazards can be found in
your company or organization. New technologies are constantly being created to combat hazards,
for example. Anyone who has been following the [4] news understands how businesses are dealing
with cyber security issues. Until ransom demands are satisfied, files in organizations and institutions
all across the world have been encrypted. Cyber security isn't just an issue in the IT world. In fact, it
has a fairly broad scope. Everyone nowadays is familiar with the internet. Smart phones are used by
even illiterate individuals [2], and they have become indispensable in their daily lives. When
someone states that individuals today live on the internet [3], they are not exaggerating. Over time,
the internet has evolved into an integral aspect of human life. Using artificial intelligence [4] as an
alternative security solution has revealed that leveraging the predictive and defensive capabilities of
artificial intelligence and machine learning [2] minimizes the number of additional security solutions
needed [2]. This will surely improve system efficiency and raise the pace at which assaults are
detected and averted.

1.2 Literature Review:


The literature highlights the growing importance of cybersecurity in tandem with the increasing
reliance on the Internet globally. Cybersecurity has evolved significantly over the past two decades
from a niche concern to a critical aspect of global security infrastructure. Various frameworks and
tools have been developed to address cybersecurity challenges, but persistent issues include the
rapidly evolving nature of cyber threats and resource constraints. Overall, understanding and
addressing these challenges are crucial for safeguarding digital assets and ensuring privacy and
security in cyberspace.

1.3 Objectives of the Proposal:


The primary objective is to comprehensively examine the evolution, importance, frameworks, tools,
and challenges of cybersecurity in addressing the rising threats posed by online criminality and the

pervasive digitization of everyday life.

3rd Year Information Technology 2016 E.C Page 2


WORK PLAN
CYBERSECURITY

1.4 Methodology

Literature Review: A comprehensive review of scholarly articles, reports, and publications related
to cybersecurity, online criminality, Internet activity, and digitization was conducted. This review
aimed to gather insights into the evolution, significance, frameworks, tools, and challenges of
cybersecurity.

Expert Consultation: Experts in cybersecurity and related fields were consulted to gain additional
perspectives and insights into the subject matter. Their expertise was instrumental in shaping the
discussion on the importance, technologies, practices, and goals of cybersecurity.
Synthesis and Analysis: The information gathered from the literature review and expert
consultation was synthesized and analyzed to identify key themes, trends, and issues related to
cybersecurity. This analysis helped in formulating a comprehensive understanding of the various
aspects of cybersecurity discussed in the abstract.
Framework Development: Based on the synthesized information and analysis, a framework was
developed to structure the discussion on cybersecurity kinds, importance, framework, tools, and
difficulties. This framework guided the organization and presentation of the abstract's content.

Validation: The findings and conclusions drawn from the literature review, expert consultation, and
analysis were validated through peer review and feedback from colleagues and experts in the field.
This validation process ensured the accuracy and reliability of the information presented in the
abstract.

1.5 Scope of the Research:

Evolution of Cybersecurity: Discussion on how cybersecurity has evolved over recent years to
keep pace with the dynamic changes in cyberspace and counteract the escalating threat landscape.
Definition and Importance: Explanation of the concept of cybersecurity and its significance in

3rd Year Information Technology 2016 E.C Page 3


WORK PLAN
CYBERSECURITY
safeguarding products and information in cyberspace for individuals, organizations, and
governments.
Technological Advances: Exploration of the technological advancements driving cybernetics,
including cloud computing, smartphones, Internet of Things (IoT), and their implications for
cybersecurity.

Cyber Threats and Concerns: Identification of cyber-attacks as a growing concern, raising issues
related to privacy, security, and financial compensation for affected entities.
Cybersecurity Framework and Tools: Examination of the frameworks, methodologies, and tools
employed in cybersecurity to prevent attacks, mitigate damage, and restrict illegal access to
networks, computers, programs, and data.
Challenges: Discussion on the difficulties and obstacles faced in the realm of cybersecurity, such as
the evolving nature of cyber threats, resource constraints, and the complexity of defending against
sophisticated attacks.
Goal and Objective: The primary goal of the abstract is to conduct a thorough examination of
various aspects of cybersecurity, including its types, importance, framework, tools, and challenges.
Ultimately, cybersecurity aims to safeguard the data and integrity of computing assets connected to
an organization's network, protecting them from all threat actors throughout the entire life cycle of a
cyber-attack.

1.6 Limitations
Lack of Depth: While the abstract outlines various aspects of cyber security such as its definition,
importance, and tools, it does not delve deeply into any specific area. This lack of depth may limit
the reader's understanding of complex issues within cyber security.
Lack of Discussion on Human Factors: While the abstract mentions the digitization of everything
and the proliferation of technologies like cloud computing and IoT, it does not explore the role of
human factors in cyber security. Human error, insider threats, and the importance of cybersecurity
awareness and training are crucial aspects that are not adequately addressed.
3rd Year Information Technology 2016 E.C Page 4
WORK PLAN
CYBERSECURITY
Limited Scope on Mitigation Strategies: The abstract briefly mentions cyber security tools and
practices aimed at preventing attacks and damage. However, it does not elaborate on specific
mitigation strategies, incident response protocols, or the importance of continuous monitoring and
adaptation in combating evolving cyber threats.
Lack of Discussion on Resource Constraints: Implementing robust cyber security measures can be
resource-intensive, particularly for small and medium-sized enterprises (SMEs) or organizations
with limited budgets and expertise. The abstract does not address the challenges associated with
resource constraints and the need for prioritization in cyber security investments.

1.8 Significance
It’s ability to provide a comprehensive overview of the importance, evolution, and key components
of cyber security. By highlighting the increasing integration of the Internet into everyday life and the
corresponding rise in online criminal activity, the abstract underscores the critical need for robust
cyber security measures.
Furthermore, the abstract emphasizes the rapid advancements in cyber security to keep pace with the
dynamic landscape of cyberspace. This recognition of the continuous evolution of cyber threats
underscores the ongoing importance of staying vigilant and adapting cyber security strategies
accordingly.
Moreover, the abstract's discussion of the digitization of various aspects of society, coupled with the
use of technologies like cloud computing, smartphones, and the Internet of Things, underscores the
pervasiveness of cyber security concerns across different sectors and industries.
By outlining cyber security as a set of technologies, processes, and practices aimed at preventing
attacks and safeguarding networks, computers, and data, the abstract provides a clear understanding
of the overarching goals and objectives of cyber security efforts

3rd Year Information Technology 2016 E.C Page 5


WORK PLAN
CYBERSECURITY

1.9 Conclusion
 The importance of cyber security in today's digitally driven world. As the Internet becomes
increasingly intertwined with everyday life, the prevalence of online criminal activity highlights
the necessity for robust cyber security measures.
 The abstract emphasizes the significant advancements made in cyber security to adapt to the
evolving landscape of cyberspace. From its humble beginnings where the term "cyber security"
was relatively unknown to the public, it has now emerged as a vital concern for individuals,
organizations, and governments alike.
 With the widespread digitization of various aspects of society and the utilization of technologies
such as cloud computing, smartphones, and the Internet of Things, cyber security has become
indispensable in safeguarding valuable information and assets.
 Furthermore, the abstract reiterates that cyber security encompasses a broad spectrum of
technologies, processes, and practices aimed at thwarting cyber-attacks and protecting networks,
computers, programs, and data.

1. 10 References:

[1] K. &. W. B. Brown, " "Mitigation Strategies for Internet of Things Security: A Systematic
Literature Review."," International Journal of Information Security,, Vols. Volume(issue), , no.
Volume(issue), .
[2] C. &. W. D. Johnson, ""Emerging Cybersecurity Threats and Mitigation Strategies for Internet-
Connected Devices." Proceedings of the IEEE International Conference on Cybersecurity,,"
chicago, 2016.

3rd Year Information Technology 2016 E.C Page 6


WORK PLAN
CYBERSECURITY
[3] (. A. S. L. R. o. t. C. Security, "(researchgate.net)," [Online].
[4] J. &. J. A. Smith, " "Cybersecurity Threats in the Internet of Things: A Comprehensive
Review."," Journal of Cybersecurity, vol. Volume(issue), no. Volume(issue), pp. 40-50, 2015.

3rd Year Information Technology 2016 E.C Page 7


WORK PLAN

You might also like