0% found this document useful (0 votes)
21 views4 pages

.Assign#1summary Cyber Security.

1. The document is an assignment for a Cyber Security class at the University of Kotli Azad Jamu and Kashmir for student Muqarrab Ali with roll number 29. 2. The assignment requires Ali to write a summary of the research paper "A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments." 3. The summary must cover topics like cyber warfare, cybercrime, cyber terrorism, cyber espionage, scenarios of cyber warfare, cyber assets, cyber threats, cyber attacks, cyber weapons, and cyber defense.

Uploaded by

Muqarab Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

.Assign#1summary Cyber Security.

1. The document is an assignment for a Cyber Security class at the University of Kotli Azad Jamu and Kashmir for student Muqarrab Ali with roll number 29. 2. The assignment requires Ali to write a summary of the research paper "A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments." 3. The summary must cover topics like cyber warfare, cybercrime, cyber terrorism, cyber espionage, scenarios of cyber warfare, cyber assets, cyber threats, cyber attacks, cyber weapons, and cyber defense.

Uploaded by

Muqarab Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment No # 1

Course Name Cyber Security


Class BS(IT)8th
Name Muqarrab Ali
Roll No 29
Session 2019-23
Instructor Sir Tayyab Arshad

University of Kotli Azad Jamu and Kashmir Faculty of


Computing and Engineering Department of
Computer Science and Technology
• Write summary of the paper “A comprehensive review study of cyber-attacks
and cyber security: Emerging trends and recent developments.” by Yuchong Li
and Qinghui Liu.

Summary of Research paper


Cyber security follows real-time information on the latest IT data.
The low cost of entry, anonymity, uncertainty of the threatening geographical area,
dramatic impact and lack of public transparency in cyberspace, have led to strong and
weak actors including governments, organized and terrorist groups and even individuals
in this space, and threats such as cyber warfare, cybercrime, cyber terrorism, and cyber
espionage.
The consequences of cyber warfare can include the following: The overthrow of the
system of government or the catastrophic threat to national security; a Simultaneous
initiation of physical warfare or groundwork and facilitate the start of physical warfare in
the near future; Catastrophic destruction or damage to the country's image at the
international level; Catastrophic destruction or damage to the political and economic
relations of the country; Extensive human casualties or danger to public health and
safety; Internal chaos; Widespread disruption in the administration of the country;
Destroying public confidence or religious, national and ethnic beliefs; Severe damage to
the national economy; Extensive destruction or disruption of the performance of national
cyber assets.
Five scenarios can be considered for cyber warfare: Government-sponsored cyber
espionage to gather information to plan future cyber-attacks, a cyber-attack aimed at
laying the groundwork for any unrest and popular uprising, Cyber-attack aimed at
disabling equipment and facilitating physical aggression, Cyber-attack as a complement
to physical aggression, and Cyber-attack with the aim of widespread destruction or
disruption as the ultimate goal.
A vital infrastructure of a country, a vital cyber system, a key information, or individuals
belonging to a country.
Vulnerability refers to a weakness within an asset, security procedures or internal
controls, or the implementation of that national cyber asset that can be exploited or
activated by internal or external threats to conduct cyber warfare.
Any event with the ability to strike a blow to missions, tasks, images, national cyber
assets or personnel through an information system, through unauthorized access,
destruction, disclosure, alteration of information and/or obstruction of service delivery.
Cyber threats are able to affect national cyber assets at the transnational, national,
institutional, provincial, critical, and critical levels of infrastructure.
Very high, high, low and very low Very high, high, moderate, low and very low Any
unauthorized cyber act aimed at violating the security policy of a cyber-asset and
causing damage, disruption or disruption of the services or access to the information of
the said national cyber asset is called cyber-attack.
A cyber weapon is a system designed and manufactured to damage the structure or
operation of other cyber systems.
These systems include bot networks, logic bombs, cyber vulnerability exploitation
software, malware, and traffic generation systems to prevent service attacks and
distributed service.
Cyber warfare is the highest level and most complex type of cyber-attack that is carried
out against the national cyber interests of countries and will have the most severe
consequences.
The cyber force of the aggressor country or groups organized under the aggressor
states, cyber weapons controlled or abandoned by these forces Utilization of all
unarmed cyber and non-cyber facilities of a country, to create deterrence, prevention,
prevention, timely detection, effective and deterrent response to any cyber-attack Cyber
biome refers to the formation of a native and dynamic cyber environment that is
supportive for a country in various fields.
Cyber capital Cyber vulnerability Cyber threats Cyber threat level Probability of cyber
threats Intensity of cyber threat Cyber-attack Cyber weapon Cyber warfare Cyber
warfare origin Cyber defense Cyber biome Virus Hacker without considering the forms
of disruption.
Type of cyber action Nature and characteristics Cyber-crime Cyber-crime Cyber-attack
and cyber-warfare Cyber-attack and cyber-warfare cyber-warfare Cyber actions taken
only by non-governmental attackers.
The cyber action is carried out by a computer system and is merely in violation of
criminal law. The distribution of cyber assets is widespread in all types of organizations,
from closed controlled systems to systems owned and managed by the private sector
of society, each with different resources and facilities and different capacities and
concerns are present on the scene.

Analyzed the impact and threat of cyber security in WAMS-based FFR control with
novel scale CNN for processing the spoofing data from two scales.
Cybersecurity Cyber security is an important issue in the infrastructure of every
company and organization.

For better protection, it is necessary to know the types of cyber security.


The country's cyber policy is now a part of the policy of national security.
In the following article, we will review the main types of cyber security.
The conflict between the security situation and cyber performance demand along the
cyber-security policy is important.
A review on security analysis of cyber physical systems using machine learning.
Effects of knowledge of cyber security on prevention of attacks.

Determining the impact of cyber security awareness on employee behaviour: A case of


Saudi Arabia.

A novel study of preventing the cyber security threats.


Hybrid-triggered-based security controller design for networked control system under
multiple cyber attacks.

A hybrid algorithm design for near real time detection cyber-attacks from compromised
devices to enhance IoT security.

Time-frequency based cyber security defense of wide-area control system for fast
frequency reserve.

'Cyber Gurus': A rhetorical analysis of the language of cybersecurity specialists and the
implications for security policy and critical infrastructure protection.

Beware suppliers bearing gifts!: Analyzing coverage of supply chain cyber security in
critical national infrastructure sectorial and cross-sectorial frameworks.

A comparative study on sanction system of cyber aider from perspectives of German


and Chinese criminal law.

Cyber security education: The merits of firewall exercises.

Understanding the full cost of cyber security breaches.

Taxonomy of cyber security metrics to measure strength of cyber security.

Riskio: A serious game for cyber security awareness and education.

Data-driven approaches for cyber defense of battery energy storage systems.

Security control for two-time-scale cyber physical systems with multiple transmission
channels under DoS attacks: The input-to-state stability.

You might also like