Fundamental Areas of Cyber Security On Latest Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Fundamental Areas of Cyber Security on Latest Technology


Aye Mya Sandar1, Ya Min2, Khin Myat Nwe Win3
1Lecturer,Information Technology Supporting and Maintenance Department, University of Computer Studies (Mandalay)
2Lecturer,Faculty of Computer Science Department, University of Computer Studies (Lashio), Shan State, Myanmar
3Lecturer, Faculty of Computer Science Department, University of Computer Studies (Mandalay), Mandalay, Myanmar

How to cite this paper: Aye Mya Sandar | ABSTRACT


Ya Min | Khin Myat Nwe Win Cyber Security has developed one of the biggest challenges of information
"Fundamental Areas of Cyber Security on technology in the present day. Cyber security consists of controlling physical
Latest Technology" access of the hardware, application, networks and protecting against harm
Published in that may come via networks. It is a mixture of processes, technologies and
International practices. The objective of cyber Security is to protect programs, application,
Journal of Trend in networks, computers and data from attack. Moreover, various measures of
Scientific Research cyber security is quite a very huge concern to many. This paper mainly focuses
and Development on challenges faced by cyber security on the latest technologies. It also focuses
(ijtsrd), ISSN: 2456- on the latest about cyber security techniques, ethics and the trends changing
IJTSRD26550
6470, Volume-3 | the face of cyber security. This paper mainly focuses on cyber Security and its
Issue-5, August 2019, pp.981-983, fundamental elements on latest technologies.
https://doi.org/10.31142/ijtsrd26550
KEYWORDS: cyber security, cybercrime, Security Attacks
Copyright © 2019 by author(s) and I. INTRODUCTION
International Journal Every day, new data threats are emerging that well-resourced companies are
of Trend in Scientific getting hacked despite the best efforts from cyber security specialists on a daily
Research and basis. This indicates the essential for new technology advancements because
Development Journal. This is an Open the existing technologies may be limited or not working. The attackers have
Access article distributed under the terms been continually devising new strategies for launching attacks, which reminds
of the Creative Commons Attribution the need for the innovation and evolution of defense capabilities to ensure data
License (CC BY 4.0) integrity in organizations Cyber security specialists now have to deal with the
(http://creativecommons.org/licenses/by threats from the cloud, mobile, wireless, and wearable technology. Data that
/4.0) was once stored in systems are now being transmitted through a variety of data
centers, routers, and hosts. [1].

The latest technologies like cloud computing, mobile II. CYBER SECURITY
computing, E-commerce, net banking etc. also need a high In [5], Cyber security is the techniques of protecting
level of security. Enhancing cyber security and protecting computers, networks, programs and data from unauthorized
critical information infrastructures are essential to each access or cyber attacks that are aimed for exploitation. Cyber
nation's security and economic safety. Today many nations security is the practice of protecting systems, networks, and
and governments are imposing strict laws on cyber programs from digital attacks. These cyber attacks are
securities in order to prevent the loss of some important usually aimed at accessing, changing, or destroying sensitive
information. Every individual must also be trained on this information; extorting money from users; or interrupting
cyber security and save themselves from these increasing normal business processes.
cyber-crimes. The fight against cybercrime needs a In today’s connected world, everyone benefits from
comprehensive and safer approach. Given that technical advanced cyber defense programs. At an individual level, a
measures alone cannot prevent any crime, it is critical that cyber security attack can result in everything from identity
law enforcement agencies are allowed to investigate and theft, to extortion attempts, to the loss of important data like
prosecute cybercrime effectively. Public authorities within family photos. Everyone relies on critical infrastructures like
and across jurisdictions can use the elements as well to power plants, hospitals, and financial service companies.
guide their public policy, regulatory, and supervisory efforts. Securing these and other organizations is essential to
[2] keeping our society functioning. [5]
In today’s Internet-connected world where technologies
Implementing actual cyber security measures is particularly
support almost every feature of our society, cyber security
challenging today because there are more devices than
and forensic specialists are increasingly dealing with wide-
people, and attackers are becoming more innovative. A safe
ranging cyber threats in almost real-time conditions. The
and secure Internet is a global Internet governance priority.
capability to detect, analyze, and defend against such threats
There are many threats that can undermine the security and
in near real-time conditions is not possible without the
stability of cyberspace, impacting governments, business,
employment of threat intelligence, big data, and machine
civil society groups and individual users. Cyber-attacks, or
learning techniques. [3]
cybercrime, can come in many forms, resulting in loss of
services or loss of control over services, stolen personal
information (such as credit card details), fraud and identity
theft and receiving a high volume of spam messages. A range

@ IJTSRD | Unique Paper ID – IJTSRD26550 | Volume – 3 | Issue – 5 | July - August 2019 Page 981
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
of actors execute cyber-attacks, including national sensitive information from illegitimate access, usage,
governments, criminals, business, hacker groups or revelation, disruption, alteration, reading, inspection,
individual hackers. Attacks can be carried out by spreading damage or recording. This is an assurance that critical data is
computer viruses, denial of service attacks (DDoS), phishing, not lost when any issue like natural disasters, malfunction of
or hacking. [6] system, theft or other potentially damaging situation arises.
With the increasing use of digital technologies such as the [4]
cloud, big data, mobile, IoT (The Internet of Things) and
Artificial Intelligence (AI) in ever more areas of business and C. Network security
society and the growing connectivity of everything come Network security refers to comprehensive security policies
greater challenges on the level of security, compliance and and provisions adopted in an adaptive and proactive manner
data protection and regulations such as the GDPR (The by the network administrator for thwarting and monitoring
General Data Protection Regulation) that want to make sure unauthorized access, deliberate misuse, alteration, denial of
organizations effectively tackle them. Cyber security has service for a computer host and other network-accessible
developed a key strategic priority for digital business and is and interaction related resources. It involves checking the
a topic we need to be open about if we want to succeed in privilege rights of users to validate the legitimacy of users
digital transformation. Moreover, in order to be able to and grant them access to the network’s data or allow for the
update and realize their digital potential in regards to any exchange of information. Network security extends coverage
given business and customer goal, organizations want over diverse computer networks, encompassing private and
security approaches that enable them to focus on their public that is used for transacting and communicating among
business, a phenomenon which is changing the face of the organizations. The communication occurring among
cyber security industry. [8] network hosts can be encrypted to avoid eavesdropping.
Deployment of decoy network-accessible resources will
III. FUNDAMENTAL AREAS OF CYBERSECURITY serve as surveillance and early warning measures.
One of the most challenging elements of cyber security is the Techniques employed by attackers for compromising the
constantly evolving nature of security risks. The traditional decoy resources can be studied post-attack to understand
method has been to focus resources on crucial system their logic behind the development of new exploitation
components and protect against the biggest known threats, means. [4]
which meant leaving components undefended and not
protecting systems against less dangerous risks. In [4], the D. Disaster recovery/business continuity planning
researchers studied the major areas which are included in Business continuity is the process of summoning into action
cyber securities are as follows: planned and managed procedures which enable an
organization to carry out the operation of its critical business
A. Application security units, while a planned or unintentional disruption
Application security is the expenditure of software, hampering regular business operations is in effect. Once a
hardware, and procedural methods to protect applications cyber-attack has brought the business to a standstill by
from external threats. In software design, security is crippling the information systems, this disaster recovery
becoming an increasingly important concern during planning plays a vital role in keeping critical parts ticking to
development as applications become more frequently make the business survive. The planning assists in bringing
accessible over networks and are, as a result, vulnerable to a down the recovery cost and operational overheads. [4]
wide variety of threats. Security measures built into
applications and a sound application security routine E. Operational security
minimize the likelihood that unauthorized code will be able Operational security (OPSEC) is an analytical process that
to manipulate applications to access, steal, modify, or delete classifies information assets and determines the controls
sensitive data. Application security embraces steps taken required to protect these assets. OPSEC originated as a
through an information application’s lifecycle to thwart any military term that described strategies to prevent potential
attempts to transgress the authorization limits set by the adversaries from discovering critical operations-related
security policies of the underlying system. In the context of data. As information management and protection has
application security, an asset refers to a resource of value become important to success in the private sector, OPSEC
like information within a database or in the file system or processes are now common in business operations. [4]
system resource. The challenge is to identify the
vulnerabilities within the parent system which when F. End-user education
becomes exposed to the cyber attacker can be exploited to The human element in cyber security is the weakest link
provide valuable insights into the functioning of the that has to be sufficiently trained to make less vulnerable.
application. The risk can be mitigated by weaving security Comprehensive security policies, procedures and protocols
within the application. [4] have to be understood in depth by users who regularly
interact with the highly secure system and accessing
B. Information security classified information. Periodic end-user education and
Information security (InfoSec) is a set of strategies for reviews are imperative to highlight the organizational
managing the processes, tools and policies necessary to weaknesses, system vulnerabilities and security loopholes to
prevent, detect, document and counter threats to digital and the user. Sound security behavior of users should take
non-digital information. Infosec responsibilities include precedence over other aspects. Better human element
establishing a set of business processes that will protect protocols in the security chain can be established by gaining
information assets regardless of how the information is insights into the viewpoints of users regarding technology
formatted or whether it is in transit, is being processed or is and response to security threats. Training sessions will lead
at rest in storage. Information security includes safeguarding to further research in the region of human-machine

@ IJTSRD | Unique Paper ID – IJTSRD26550 | Volume – 3 | Issue – 5 | July - August 2019 Page 982
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
interactions. Cybercrimes are increasingly becoming social
engineering, wherein perpetrators of the crime invest 4. Deep learning
resources to gain knowledge about organizational Deep learning encompasses a number of technologies, such
stakeholders. Training will allow senior management to as artificial intelligence and machine learning. Regardless of
familiarize themselves with system users that will help to what it's called, there a great deal of interest in it for security
better nurture awareness regarding user-specific access purposes, the user behavior analytics, deep learning focuses
privileges and internal sources capable of providing access on anomalous behavior where malicious behavior deviates
to confidential information. User training will help eliminate from legitimate or acceptable behavior in terms of
resistance to change and lead to closer user scrutiny. [4] security.[8]

IV. CYBER SECURITY ON LATEST TECHNOLOGIES 5. The cloud


The link of [8], Freelance writer of John P. Mello Jr proposed The cloud is going to have a transformative impact on the
emerging technologies include a variety of technologies such security technology industry generally. More organizations
as educational technology, information technology, use the cloud for what has traditionally been the domain of
nanotechnology, biotechnology, cognitive science, psych on-premises IT, more approaches to security that are born in
technology, robotics, and artificial intelligence. Here are five and for the cloud will appear. On-premises techniques will
emerging security technologies that may be able to do that. be transitioned to the cloud. Things such as virtualized
security hardware, virtualized firewalls, and virtualized
1. Hardware authentication intrusion detection and prevention systems. But that will be
The shortages of usernames and passwords are well known. an intermediate stage of the infrastructure as a service
Clearly, a more secure form of authentication is needed. One provider can do on a very large scale for all of its customers,
method is to bake authentication into a user's hardware. there may not be the need to pull out all the defenses of need
Intel is moving in that direction with the Authenticate and also will build that into their platform, which will relieve
solution in its new, sixth-generation Core v Pro processor. It the need to do that for the individual cloud customer.[8]
can combine a variety of hardware-enhanced factors at the
same time to validate a user's identity Hardware V. CONCLUSION
authentication can be particularly important for the Internet Computer security topic that is becoming more important
of Things (IoT) where a network wants to ensure that the because the world is becoming highly interconnected, with
thing trying to gain access to it is something that should have networks being used to carry out critical transactions. The
access to it.[8] latest technologies, the new cyber tools and threats that
come to light each day, are challenging organizations with
2. User-behavior analytics not only secure their infrastructure but also require new
Once someone's username and password are compromised, platforms and intelligence to do so. Nowadays, many
whoever has them can waltz onto a network and engage in countries and governments are stately strict laws on cyber
all kinds of malicious behavior. That behavior can trigger a securities in order to prevent the loss of some important
red flag to system defenders if they're employing user information.
behavior analytics (UBA). The technology uses big data
analytics to identify anomalous behavior by a user. Visibility REFERENCES
into an activity that does not fit the norm of the legitimate [1] https://www.ecpi.edu/blog/new-cybersecurity-
user can close a blind spot in the middle of the attack chain. technologies-what-is-shaking-up-the-field
If the think of the attack chain as initial penetration, lateral
[2] G. Nikhita Reddy, G. J. Ugander Reddy (2014)."A STUDY
movement, and then compromise, theft, and exfiltration of
OF CYBER SECURITY CHALLENGES AND ITS
sensitive data, the middle links in that attack chain have not
EMERGING TRENDS ON LATEST TECHNOLOGIES".
been very visible to enterprise security pros, and that's why
the interest in user behavior analytics today.[8] [3] Krzysztof Cabaj, Zbigniew Kotulski, Bogdan
Księżopolski and Wojciech Mazurczyk. (2018) “Cyber
3. Data loss prevention security: trends, issues, and challenges”, EURASIP
A key to data loss prevention is technologies such as Journal on Information Security; New York Vol. 2018,
encryption and tokenization. They can protect data down to Iss. 1.
field and subfield level, which can benefit an enterprise in a
[4] Jitendra Jain, Dr. Parashu Ram Pal (2017)."A Recent
number of ways:
Study over Cyber Security and its Elements, ISSN No.
 Cyber-attackers cannot monetize data in the event of a 0976-5697.
successful breach.
[5] https://www.cisco.com/c/en/us/products/security/w
 Data can be securely moved and used across the hat-is-cybersecurity.html
extended enterprise business processes and analytics
[6] https://www.myanmar-responsible
can be performed on the data in its protected form,
business.org/pdf/SWIA/ICT/Chapter-04.05-Cyber-
dramatically reducing exposure and risk.
Security.pdf
 The enterprise can be greatly aided in compliance with
[7] https://www.i-scoop.eu/cyber-security-cyber-risks-
data privacy and security regulations for the protection
dx/,
of payment card information (PCI), personally
identifiable information (PII) and protected health [8] https://techbeacon.com/security/5-emerging-
information (PHI).[8] security-technologies-set-level-battlefield

@ IJTSRD | Unique Paper ID – IJTSRD26550 | Volume – 3 | Issue – 5 | July - August 2019 Page 983

You might also like