Cybersecurity Trends and Solutions
Cybersecurity Trends and Solutions
2478/hjbpa-2019-0020
Cyber Security
Rohit, KALAKUNTLA,
Information Technology, University of the Cumberlands, USA
[email protected]
Anvesh Babu, VANAMALA,
Information Technology, University of the Cumberlands, USA
[email protected]
Ranjith Reddy, KOLIPYAKA,
Information Technology, University of the Cumberlands
[email protected]
Abstract
Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the
information has become an enormous problem in the current day. The cybersecurity the main thing
that originates in mind is 'cyber crimes' which are aggregate colossally daily. Different governments
and organizations are taking numerous measures to keep these cyber wrongdoings. Other than
different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases
on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence
of cybersecurity discuss in it. The cyber-terrorism could make associations lose billions of dollars in
the region of organizations. The paper also explains the components of cyber terrorism and
motivation of it. Two case studies related to cybersecurity also provide in this paper. Some solution
about cyber security and cyber terrorism also explain in it.
1. Introduction
Today an individual can receive and send any information may be video, or
an email or only through the click of a button but did s/he ever ponder how safe
this information transmitted to another individual strongly with no spillage of
data? The proper response lies in cybersecurity. Today more than 61% of full
industry exchanges are done on the internet, so this area prerequisite high quality
of security for direct and best exchanges. Thus, cybersecurity has become a most
recent issue (Dervojeda, et. all., 2014). The extent of cybersecurity does not
merely restrict to verifying the data in IT industry yet also to different fields like
cyberspace and so forth. Improving cybersecurity and ensuring that necessary
data systems are vital to each country's security and financial prosperity.
HOLISTICA Vol 10, Issue 2, 2019
Creating the Internet safer (and safeguarding Internet clients) has become
to be essential to the improvement of new management just as a legislative
strategy. The encounter against cybercrime needs an extensive and more secure
practice (Gross, Canetti & Vashdi, 2017). The particular estimates alone cannot
keep any crime; it is essential that law authorization offices are allowable to
investigation and indict cybercrime efficiently. Nowadays numerous countries and
administrations are compelling strict rules on cyber safeties to keep the loss of
some vital data. Each should be equipped on this cybersecurity and save
themselves from these increasing cybercrimes.
Cyber-security is both about the insecurity made by and through this new
space and about the practices or procedures to make it (progressively) secure
(Kumar, & Somani, 2018). It alludes to a lot of exercises and measures, both
specialized and non-specialized, expected to ensure the bioelectrical condition
and the information it contains and transports from all possible threats. This
research aims to gather all the information and overview related to cyber-crime
and provide the historical facts and perform reports on the analyzed data of
different attacks reported everywhere in the last five years. Based on the analyzed
information, we would like to provide all the countermeasures that organizations
may undertake in order to ensure improved security that would support in
defending the organizations from being attacked by the hackers and provide a
cyber-security to avoid all risks.
2. Purpose
The paper provides information about cyber security and cyber
terrorism. It covers various information about these topics in its subsections.
Trends of cybersecurity and the role of social media in cybersecurity define in this
paper. The paper provides some necessary information about cyber terrorism. The
components of “cyber terrorism” and the consequences of this terrorism also
explain in this paper. There are some examples of case studies those related to
cybersecurity. The paper also provides some solutions regarding cyber security
and cyber terrorism. It provides some techniques for preventing cyber terrorism.
The future study and scope of cybersecurity define in it.
Cybersecurity has become a major concern over the last 10 year in the IT
world. In the present world, everybody is facing a lot of problems with cyber-
crime. As hackers are hacking major sensitive information from government and
some enterprise organizations the individuals are very much worried as cyber-
security assault can bring about everything from wholesale fraud, to blackmail big
companies. They are many varieties of cyber-crimes emerging where everyone
116
HOLISTICA Vol 10, Issue 2, 2019
needs to be aware of the scams and they are different measures and tools which
can be used for avoiding the cyber-crimes. Every organization wants to secure
their confidential data from getting hacked. Getting hacked is not just about losing
the confidential data but losing the relationship with customers in the market
(Bendovschi, 2015).
The Internet is today's fastest growing infrastructure. In today's technical
environment many new technologies are changing mankind. But due to these
emerging technologies, we are unable to protect our private information in an
efficient way, so the cyber-crimes are drastically increasing on daily basis. Majority
of the transactions both commercial and personal are done using the means online
transaction, so it is important to have an expertise who require a high quality of
security maintaining a better transparency to everyone and having safer
transactions. So cybersecurity is the latest issue. Advanced technologies like cloud
services, mobiles, E-commerce, internet banking and many more they require a
high standards and safer process of security. All the tools and technologies
involved for these transactions hold the most sensitive and cruicial user
information. So providing the necessary security to them is very important.
Improving the cybersecurity and safeguarding the sensitive data and
infrastructures are important to every countries top priority security
(Panchanatham, 2015).
as well as web applications (Bendovschi, 2015). Web servers are mainly the pre-
eminent stage for these cybercriminals to take the information. Thus, one should
reliably utilize an additional secure program, mainly amid vital exchanges all
together not to fall as a quarry for these defilements.
3.3. Encryption
It is the method toward encoding messages so programmers cannot
scrutinize it. In encryption, the message is encoded by encryption, changing it into
a stirred-up figure content. It commonly completes with the use of an “encryption
key,” that demonstrates how the message is to encode. Encryption at the earliest
reference point level secures information protection and its respectability
(Sharma, 2012). Additional use of encryption obtains more problems in
cybersecurity. Encryption is used to ensure the information in travel, for instance,
the information being exchanged using systems (for example the Internet, online
business), mobile phones, wireless radios and so on.
118
HOLISTICA Vol 10, Issue 2, 2019
changing the essence of cybersecurity on the planet. The top network threats are
showing in figure 1.
119
HOLISTICA Vol 10, Issue 2, 2019
5. Cyber Terrorism
The term “terrorism” can allude to the illegal utilization of power or
viciousness against people in order to threaten an administration or its residents
and associations which might be to accomplish a political or a malicious site [10].
Terrorism has transformed from the conventional structure to the cyber type of
innovation supported terrorism recognized as cyber terrorism. It stays vital issues
of the present society. Not just that the battle against terrorism is falling behind,
current cybercrime assaults are ending up progressively forceful and
confrontational (Sharma, 2012). This terrorism is the utilization of cyber word to
dispatch an assault to the essential foundations that the presence of associations
and countries entirely depended after that can prompt its shut down.
120
HOLISTICA Vol 10, Issue 2, 2019
and attacking’s, area which is nature just as the strategy for activity. It can
confidently know by knowing the profile of activities that drive the actions of the
culprits (Kumar, & Somani, 2018).
The critical issue in “cyber terrorism” is the motivation to complete such an
action on the Internet, that outcomes in savagery/damage to people and their
property Dervojeda, Verzijl, Nagtegaal, Lengton, & Rouwmaat, 2014). It is by a
portion of the segments. The terrorists of the world proceed the upside of the
cyber world with solid incentive as a stage with which they can use to dispatch
more unusual outbreak. Yunos and Ahmad (2014) said that with the utilization of
Information and correspondence innovation, a terrorist could present more
noteworthy harms or exact the republic with troublesome conditions because of
the interruption of necessary administrations that the “cyberspace terrorist”
causes more damage and devastation by the cyberspace than done the
conventional strategy for terrorism.
121
HOLISTICA Vol 10, Issue 2, 2019
122
HOLISTICA Vol 10, Issue 2, 2019
come about to the different types of blasts of a few plane accidents issues
everywhere throughout the world which that has asserted numerous life (Cabaj,
.
5.3.4. Consumer Trust in Doubt:
The development of any organizations and its support relies upon the trust
that its purchaser has on such association as trust can see tools that fortify
association and certainty among associations and clients.
123
HOLISTICA Vol 10, Issue 2, 2019
have a protective security detail. The hijackers supposedly acquired all the
required data from Kaspersky's client profile on Vkontakte, a famous Russian
social systems administration site. Kaspersky was compelled to call his dad to
transfer the payoff requests (Gade, & Reddy, 2014). The abductors may have
utilized similar wireless to make food deliveries or had geolocation administrations
empowered.
6.3.2. Details:
The worst part of this attack is how the Uber handled the issue, this is a
lesson to most companies what not to do. In late 2016 just two hackers were able
to steel the Users personal data with includes names, phone numbers and email
addresses. They were able to steal the 600,000 driver's license information.
Hackers got access to the Uber's GitHub account through a third-party cloud-
based service. With the details found from the GitHub, Hackers found a way to
access Uber user data in AWS. Ubers paid those two hackers $100, 000 to
permanently destroy the whole data they obtained and not letting the users or
the regulators about stolen information.
But also, Uber confirmed that data was destroyed with the assurance they
received from the hackers. According to US Law enforcement, any breach should
be reported to the authorities and not pay hackers. And this kind of approach from
Uber led other hackers to blackmail Netflix, where Hackers frightened to release
TV shows unless the company paid the money hackers requested. Almost 49 states
have this law enforcement where a security breach should be notified, after the
court hearings Uber agreed to pay 20million to settle FTC charges. Not only the US
but also other major countries like UK, Italy, and the Philippines reacted on this
124
HOLISTICA Vol 10, Issue 2, 2019
issue. Uber's breach is different from the regular breaches, the company tried to
cover up the breach and not alert the authorities and the users.
6.3.3. Uber's plan after the breach:
Khrosrowshabi the new CEO of Uber received few disputed problems only
with respect to its legal issue also criticism for sexual harassment, underpaying the
drivers and few more.
6.3.4. Solutions
Some solutions regarding cyber security and cyber terrorism describe here:
Cyber Security Techniques
Some techniques can use to improve cybersecurity.
Access control and “password security”: The idea of password and user
name has a primary method for ensuring data. It may be the principal
measures concerning cybersecurity.
Data’s Authentication: The documents that we get should dependably be
validated be before transferring. It should check if it has begun from a
critical and dependable source and that they are not modified (Gade, &
Reddy, 2014). Verifying of these records is typically done by the “anti-
virus” software present in the gadgets. Subsequently, a decent “anti-
virus” software is likewise necessary to shield the gadgets from viruses.
Anti-virus software: It is a PC program that classifies, avoids, and makes a
move to harm or evacuate noxious software programs, for instance,
viruses as well as worms. Most "antivirus programs" comprise an "auto-
update" feature that authorizes the program to download profiles of new
viruses with the objective that it can chequer for the new viruses when
they find.
Malware scanners: This is software that typically filters each of the
records and archives current in the framework for vindictive code or
destructive viruses [10]. Viruses, worms, as well as Trojan horses, are
instances of “malicious software” that regularly assemble and alluded to
as malware.
Firewall: A “software program” or an equipment that helps monitor
hackers, infections, and all types of worms which endeavour to achieve
PC over the Internet. All data which is transmitting to and fro over the
web go through the firewall contemporary, which looks at every
125
HOLISTICA Vol 10, Issue 2, 2019
126
HOLISTICA Vol 10, Issue 2, 2019
Over the next five years, cyber-crime may create severe damage in
information technology. According to the researchers they have estimated an
approximate close to 6 trillion dollars loss. So, there would be a very bright scope
for people who work and resolve the issues related to cyber-crime and provide all
the necessary security measures. Big organizations like CISCO which is completely
related to networking technology which is one of the top organization has
approximately millions of openings related to cybersecurity because which is the
future for the safety of Information technology. They are also wide opportunities
in government-related fields and also defence field to save the countries secure
data from cyber attackers.
8. Conclusion
Cyber-security is both about the insecurity made by and through this new
space and about the practices or procedures to make it (progressively) secure.
Exertion to verify the cyberspace should give a definitive need else the
"information technology" will not be viably used by clients. The terrorist of things
to come will win the wars without discharging a shot just by crushing the country's
necessary substructure if steps are not taken to handle the pervasiveness of the
expansion in such a cyber-attack. They can bring an unknown look into the lives of
others, regardless of whether they live nearby or over the globe.
The “cyber-terrorism” can in one method or alternate prompts the death
toll just as causing severe harms. Though social media can utilize for cybercrimes,
these organizations cannot stand to quit utilizing social media as it assumes an
essential role in the attention of an organization. Cyber terrorism has guaranteed
numerous innocent lives and in the meantime render numerous homes to a
condition of the problem that is occasionally coming about to mental injury to the
influenced families. Cyber terrorism stays vital issues of the present society. Not
just that the battle against Cyber terrorism is falling behind, current cybercrime
assaults are ending up progressively forceful and confrontational. Cybersecurity
has an intriguing parallel to terrorism. Guaranteeing the security of information,
data, and correspondence is impressively harder than hacking into a system.
9. References
[1] Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures.
Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077-
[2] Mazurczyk, W. (2018). Cybersecurity: trends,
issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635-
018-0080-0
127
HOLISTICA Vol 10, Issue 2, 2019
[3] Dervojeda, K., Verzijl, D., Nagtegaal, F., Lengton, M., & Rouwmaat, E. (2014). Innovative
Business Models: Supply chain finance. Netherlands: Business Innovation Observatory;
European Union.
[4] Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging
Trends On Latest Technologies. Retrieved from
https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Ch
allenges_And_Its_Emerging_Trends_On_Latest_Technologies
[5] Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on
psychological well-being, public confidence and political attitudes. Journal of
Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw018
[6] Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of
Strategic Information Systems, 22(2), pp. 175-186.
[7] Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks
Prevention And Mitigation Techniques. International Journal of Advance Research in
Computer Science and Management, 4(4), pp. 125-129.
[8] Panchanatham, D. N. (2015). A case study on Cyber Security in E-Governance.
International Research Journal of Engineering and Technology.
[9] Samuel, K. O., & Osman, W. R. (2014). Cyber Terrorism Attack of The Contemporary
Information Technology Age: Issues, Consequences and Panacea. International Journal of
Computer Science and Mobile Computing, 3(5), pp. 1082-1090.
[10] Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges
to Society. International Journal of Scientific & Engineering Research, 3(6).
[11] Sreenu, M., & Krishna, D. V. (2017). A General Study on Cyber-Attacks on Social Networks.
IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), pp. 01-04.
[12] Sutton, D. (2017). : BCS, the Chartered
Institute for IT.
128