ECET460 CourseProject Week1 SM Shahnewaz
ECET460 CourseProject Week1 SM Shahnewaz
ECET460 CourseProject Week1 SM Shahnewaz
Cybersecurity
Professor: Yu On Ng
Student: SM Shahnawaz
The purpose of this paper is to discuss Cybersecurity as it does apply to network security. No
online resources have been a revolutionary invention of modern technology and with the
advancements in technology happening day by day online resources are only getting better and
better. If used correctly online resources or information can be a real asset to the federal
government in perspective to surveillance, but if in the wrong hands this technology can be a
huge invasion of privacy and can also cause real damage to human civilizations.
This is where the concept Cybersecurity appear which refers to the protection of internet-
In a computing context, security comprises cybersecurity and physical security -- both are
used by enterprises to protect against unauthorized access to data centers and other computerized
systems. So, on this project, I am going to discuss Drone security vulnerabilities and also how
Table of Contents.............................................................................................................................3
Cybersecurity .................................................................................................................................4
Introduction..................................................................................................................................4
Conclusion ………………………………………………………………………………………10
References ……………………………………………………………………………………….11
4
CYBERSECURITY
Cybersecurity
Introduction
computing context, security comprises cybersecurity and physical security -- both are used by
enterprises to protect against unauthorized access to data centers and other computerized
systems. One of the most problematic elements of cybersecurity is the constantly evolving nature
of security risks. The traditional approach has been to focus resources on crucial system
components and protect against the biggest known threats, which meant leaving components
To deal with the current environment, advisory organizations are promoting a more proactive
and adaptive approach. The National Institute of Standards and Technology (NIST) for example,
recently issued updated guidelines in its risk assessment framework that recommend a shift
When a criminal is trying to hack an organization, they won't re-invent the wheel unless they
absolutely have to: They'll draw upon common types of hacking techniques that are known to
Malware:
“Malware” refers to various forms of harmful software, such as viruses and Ransomware
Once malware is in your computer, it can wreak all sorts of havoc, from taking control of
your machine, to monitoring your actions and keystrokes, to silently sending all sorts of
confidential data from your computer or network to the attacker's home base.
Social engineering is an attack that relies on human interaction to trick users into
protected.
Phishing:
It is a form of fraud where fraudulent emails are sent that resemble emails from reputable
sources; however, the intention of these emails is to steal sensitive data, such as credit
card or login information. In a phishing attack, an attacker may send you an email that
appears to be from someone you trust, like your boss or a company you do business with.
The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent
6
CYBERSECURITY
activity has been detected on your account). In the email, there will be an attachment to
open or a link to click. Upon opening the malicious attachment, you’ll thereby install
malware in your computer. If you click the link, it may send you to a legitimate-looking
website that asks for you to log in to access an important file—except the website is
actually a trap used to capture your credentials when you try to log in.
Denial-of-Service (DoS):
In some instances, these DoS attacks are performed by many computers at the same time.
type of attack can be even more difficult to overcome due to the attacker appearing from
many different IP addresses around the world simultaneously, making determining the
One of the most common ways an attacker can deploy a cross-site scripting attack is by
injecting malicious code into a comment or a script that could automatically run. For
Cross-site scripting attacks can significantly damage a website’s reputation by placing the
users' information at risk without any indication that anything malicious even occurred.
Any sensitive information a user sends to the site—such as their credentials, credit card
information, or other private data—can be hijacked via cross-site scripting without the
website owners realizing there was even a problem in the first place.
7
CYBERSECURITY
Cybersecurity Protection
The use of cybersecurity can help prevent cyberattacks, data breaches and identity theft and can
aid in risk management. When an organization has a strong sense of network security and an
effective incident response plan, it is better able to prevent and mitigate these attacks. For
example, end user protection defends information and guards against loss or theft while also
PREVENTION
Conventional defenses, including firewalls and antivirus software, remain an integral part of an
organization’s security lineup. They block the majority of standard attacks by hackers on IT
systems and curb the spread of malware. Additionally, educating employees on cyber security
and potential threats is a key aspect of any prevention strategy. This added layer of protection is
vital, as professional criminals can often exploit the human factor to pinpoint vulnerabilities and
obtain network access. Furthermore, it is important to deploy products and IT solutions that are
secure by design. And enterprises should determine what data is truly mission critical – and
ensure that robust defenses are in place for these key assets.
DETECTION
Dissecting the tactics employed by hackers can help hone defenses, making them more effective.
Companies should implement intelligent security management that aggregates information from
a variety of sources – and analyzes it in real time to shield systems from novel attack vectors. To
combat these emerging threats, T-Systems has partnered with FireEye, which specializes in
8
CYBERSECURITY
protecting systems from complex digital threats. The cyber security enterprise detects previously
Furthermore, major corporations should analyze attacks in dedicated cyber security centers and
As the cyberthreat landscape continues to grow and emerging threats, such as the internet of
things, require hardware and software skills, it is estimated that there are 1 million unfilled
cybersecurity jobs worldwide. IT professionals and other computer specialists are needed in
Chief Internet Security officer (CISO): this individual implements the security
program across the organization and oversees the IT security department's operations;
Security engineer: this individual protects company assets from threats with a focus on
Security analyst: this individual has several responsibilities that include planning
security measures and controls, protecting digital files, and conducting both internal and
All in all, small businesses are at a major risk of being hacked, the methods we discussed
above can help deter attackers from targeting your business and looking elsewhere for softer
targets to test their exploits on. It’s important to conduct a system-wide assessment to determine
the current state of your business’s security so as to know the next steps to take.
Though not all people are victims to cybercrimes, they are still at risk. Crimes by computer
vary, and they don’t always occur behind the computer, but they executed by computer. The
hacker’s identity is ranged between 12 years young to 67years old. The hacker could live three
continents away from its victim, and they wouldn’t even know they were being hacked. Crimes
done behind the computer are the 21st century’s problem. With the technology increasing,
criminals don’t have to rob banks, nor do they have to be outside in order to commit any crime.
They have everything they need on their lap. Their weapons aren’t guns anymore; they attack