0% found this document useful (0 votes)
81 views

Cyber Attacks Propsal - 2

The document discusses research into cybersecurity threats and measures to prevent cyber attacks. It aims to identify ways organizations can protect their data networks and systems. A questionnaire will be used to collect data from 300 organizations globally on the cybersecurity measures they have implemented. The findings will then be analyzed and recommendations provided to help organizations strengthen their cyber defenses.

Uploaded by

Waqas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views

Cyber Attacks Propsal - 2

The document discusses research into cybersecurity threats and measures to prevent cyber attacks. It aims to identify ways organizations can protect their data networks and systems. A questionnaire will be used to collect data from 300 organizations globally on the cybersecurity measures they have implemented. The findings will then be analyzed and recommendations provided to help organizations strengthen their cyber defenses.

Uploaded by

Waqas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

The research question of the proposal is

what are the possible ways that can be implemented in organizations to prevent their data
networks and systems from the cyber attacks?

Introduction

Now a days malicious attempts in Cyber-space are intended to emerge cyberwar such
as stuxnet is being used to get financial benefits from others using spam, distributed-of-service
(DDoS), identity theft, and phishing through a large pool of comprised hosts, which are
called zombies. Botnets are becoming one of the most serious threats to Internet security.
We consider that major pre- symptoms of cyber threats are activity and propagation of
botnet and propose the prediction model of cyber threats based on botnets.

With the new technology development in many areas, threats have come up concerning the
security of information stored in many organizations. Cyber security is the protection of systems
in the organizations, their data and network in the cyberspace (Cyber Security Products and
Services). Cybersecurity is a critical issue for many businesses. In a business or any
organization, there are different threats associated with their systems, data, and networks. The
threats include cyber crime, cyber war, and cyber terror (Cyber Security Products and Services,).
Cyber security being a major problem, in many nations around the globe, research needs to be
done concerning the possible measures to mitigate the problem.

Objectives and goals

To find out the possible measures that can be put in place to maintain the integrity of cyber
secure.

To investigate the measure put in place by most organizations around the globe to ensure their
firms are safe from cyber-attack. To find out the control programs used by different
organizations and businesses as cyber security measures

Methods of investigation and implementation

For the investigate cyber security issue, data acquisition method will be appropriate to address
the research objectives as well as the research question. In this method, data will be acquired
through a filled questionnaire from different organizations and businesses around the globe. The
questionnaire will contain questions regarding the cyber security measures put in place by the
different organization. The sample size of n=300 will be used for this investigation. The
questionnaires will be filled online, and findings collected for the security of the organizations
and institutions integrity.
The inclusion criteria will be all companies, business organizations and government institutions
that are using private networking systems for their functions and integrity. The exclusion criteria
will be any business or agency that uses public network systems for its functions.

The findings of this project will be implemented by many organizations to ensure that their data,
systems, and networks are safe from cyber-attack. The findings will be given as feedbacks to all
organizations and institutions for them to practice according to the proposed recommendations

Background information

The digital crooks utilize explicit application from a separation that permits their entrance to
different frameworks. The applications utilized by digital lawbreakers are alluded to as malware
(vindictive programming). The malignant programming incorporates infections, worms, spyware,
and Trojans (Cyber Security Products and Services). Digital hazard evaluation is the progression
utilized by numerous associations to discover how presented the frameworks to digital assault
are. The common digital security hazard evaluation step is recognizing the different associations'
advantages that can be influenced which incorporate frameworks, database, and other equipment
containing fundamental information. In the wake of recognizing the potential dangers, the
following stage is the determination of control frameworks to forestall the assault. Concerning
digital security, there are essentials of turning out to be digital secure. These basics incorporate
administration of individuals, procedures, and innovation (Cyber Security Products and
Services). Considering in individuals the executives, staffing is required, proficient abilities and
capabilities, and part assets. Procedure the executives incorporates IT review, the board of
frameworks, administration structures, and best practice. The last essential is innovation, and it
includes ability and bolster process. Mix of the three essential ways to deal with digital security
is the thing that makes an association digital secure. Innovation is the essential component in
accomplishing the best digital security. Digital security programs incorporate the utilization of
against infection programs, hostile to spyware and information encryption. As indicated by the
digital basics, the business associations ought not just perceive the expense of programming to
shield their database from malware yet in addition think about the expense of losing the most
valuable data. Digital dangers, for example, Stuxnet which can happen national hazard just as
coercion or assortment of individual data from an outsider for abuse, looking for of financial
profit by spreading explicit, business sends to irregular individuals, or weakening of
administration of data machine of a contender have sadly become basic practice and are
performed over 60% through a botnet

It is necessary to research on quantifying and predicting botnet-based cyber threats in addition to


their detection methods according to botnet’s characterization such as protocol, architecture,
signature, and so on.

Recent early warning/forecasting techniques have been studied in Threat Management System
(TMS) and Risk Management System (RMS) technologies to previously detect cyber
threats and to provide guidelines for the criteria of security policy and countermeasures.
TMS/RMS technologies are emerging as efficient alternatives that overcome the disadvantage of
existing security solutions. However, the TMS/RMS focus on forecasting/warning techniques
based on information of attack situations that has been already occurred. Therefore it is difficult
to differentiate between the TMS/RMS technologies and existing security solution. Furthermore,
it is difficult to utilize the TMS/RMS technologies as a solution that previously recognizes the
threat situation before the actual attack. We consider that major pre-symptoms of cyber threats
are activity and propagation of botnet and propose the prediction model for cyber threats based
on botnets in this paper.

References
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6386855&isnumber=6386757

Cyber Security Products and Services. (2016). Itgovernance.co.uk. Retrieved 25 November


2016, from http://www.itgovernance.co.uk/cyber-security-solutions.aspx Dorman, E. (July 01,
2015). Cyber security. Nuclear Plant Journal, 33, 4.) EBSCO, (2016).
Ebscovideos.ebscohost.com. Retrieved 26 November 2016, from
http://ebscovideos.ebscohost.com/v/103100997/fbi-chief-talks-terrorism-and-cybercrime.htm

You might also like