See discussions, stats, and author profiles for this publication at: https://www.researchgate.
net/publication/372936905
An In-Depth Analysis of Cybersecurity
Article · February 2023
DOI: 10.5281/zenodo.7698121
CITATIONS READS
0 582
2 authors, including:
Md HASANUR Rahman
Chongqing University of Posts and Telecommunications
4 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Md HASANUR Rahman on 05 August 2023.
The user has requested enhancement of the downloaded file.
Research
An In-Depth Analysis of Cybersecurity
MD HASANUR RAHMAN
School of Electronics and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing,
China.
Abstract: Understanding cyber security and how to put it to use is vital in today's technologically and network-
connectedly driven society. Without proper safeguards in place, critical systems, files, data, and other digital assets
are at risk of being compromised. The same level of security is required for all businesses, regardless of whether or
not they specialize in IT. Even as new cyber security technology emerges, cybercriminals remain one step ahead. As
a result, they are using more sophisticated hacking methods to target the vulnerabilities of numerous companies.
Due to the accumulation, practice, and storage of vast amounts of data on PCs and other devices by military, political,
financial, medical, and corporate institutions, cyber security is vital. Financial data, intellectual property, personal
information, and other types of data for which unauthorized access or acquaintance could assure negative worries
may make up a sizeable portion of that data.
Keywards: Cybersecurity, Information Security, Network, cyber-attacks, social engineering, cybercriminals.
*Corresponding Author:
[email protected] Accepted: 06 February, 2023; Published: 20 February, 2023
How to cite this article: MD HASANUR RAHMAN (2023). An In-Depth Analysis of Cybersecurity. North American Academic Research,
6(2), 11-19. doi: https://doi.org/
Conflicts of Interest: There are no conflicts to declare.
Publisher’s Note: NAAR stays neutral about jurisdictional claims in published maps/image and institutional affiliations.
Copyright: ©2022 by the authors. Author(s) are fully responsible for the text, figure, data in this manuscript submitted for possible open access publication under the
terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Introduction
In a definition, cyber security is a collection of measures used to ensure the safety of a user's digital space. The user,
their equipment, their network, their programs, and their operating system are all part of the user's environment.
The primary goal is to lessen exposure to dangers like cyberattacks.
Internet-specific computer security is known as "cyber security." The primary goal of security is to prevent the gadget
from being compromised by enforcing a set of rules and procedures to prevent attacks from happening over the inter-
net.
Many different strategies exist to defend against cybercrime and strengthen online safety. The prevalence of cyberat-
tacks is growing in tandem with the proliferation of internet services and resources.
Definition
Cybersecurity is the process of securing computer systems, networks, and data from unwanted access, theft, damage,
or interruption. It involves the use of technologies, methods, and policies to safeguard computer systems and networks
from cyber threats such as viruses, malware, hacking, and phishing assaults, as well as guaranteeing the confidentiality,
integrity, and availability of sensitive data and information. The purpose of cybersecurity is to avoid or limit the harm
North American Academic Research. 2023, 6(2), https://doi.org/ Monthly Journal by TWASP, USA NAAR Home (twasp.info)
NAAR, February 2023, Volume 6, Issue 2, 11-19 12 of 19
from security incidents, safeguard the privacy and security of sensitive information, and ensure the continuity of vital
business processes.
How can Cyber Security facilitate work efficiency?
Cybersecurity makes working easier by providing a secure environment for conducting business activities, protecting
sensitive information and data, reducing the risk of cyber-attacks, and increasing trust among employees, partners, and
customers. Cybersecurity measures like strong passwords, encryption, firewalls, and regular software updates help to
prevent unauthorized access to sensitive information and minimize the impact of security incidents. This creates a more
secure and efficient working environment, allowing employees to focus on their core responsibilities without worrying
about security threats.
Varieties of Cyber Security
Phishing: Phishing is a sort of social engineering in which cybercriminals trick their targets into divulging confidential
information or downloading malicious software. Modern phishing attempts can be extremely convincing since they
frequently are exact replicas of the target website, allowing the attacker to spy on the victim while they browse and
bypass any further security measures. In 2020, the FBI's Internet Crime Complaint Centre reported more phishing
attacks than any other form of computer crime.
Ransomware: One of the most destructive types of cybercrime is ransomware. Attackers frequently succeed in extorting
substantial sums of money from their victims. Sometimes they demand millions of dollars from their victims, and some
of them are eager to comply rather than overlook the risk of data loss or exposure.
Malware: Malware, an abbreviation for "malicious software," is any piece of software designed by cybercriminals
(sometimes known as "hackers") to steal information from, or otherwise harm or destroy, a computer or network.
Common forms of malicious software include viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Extensive amounts of information have been stolen in recent virus assaults.
Social engineering: To get access to restricted areas, sensitive data, or assets, social engineers will often use deceptive
tactics that rely on people's natural human tendencies to make mistakes. Human hacking schemes are commonly used
in cybercrime to trick unsuspecting users into disclosing sensitive information, spreading malware, or gaining
unauthorized access to protected networks. There are many other ways to be attacked, including online, in person, and
through other contacts.
Social engineering fraud takes advantage of weaknesses in the way average people reason and behave. That's why it's
so important to be aware of social engineering assaults and how they can be used to manipulate a user's actions. A
successful attack on a user requires the attacker to first learn what drives the user's activities, and then utilize that
knowledge to successfully trick and manipulate the user.
Additionally, hackers aim to take advantage of a user's naivete. Due to the rapid development of technology, many
people are unaware of the dangers they may face from things like drive-by downloads. A user's phone number, for
example, may have more worth than they think. The upshot is that many people don't know what measures to take to
safeguard their accounts and data.
Goals of Cybersecurity
Protection of the global digital and cyber environment is another modern necessity that has risen to prominence in
recent years. Since most business now happens online, more vulnerabilities exist for sensitive information and firm
NAAR, February 2023, Volume 6, Issue 2, 11-19 13 of 19
resources. It goes without saying that any vulnerability to an organization's data or infrastructure also poses a threat
to the entire enterprise.
Any number of things, from simple coding mistakes to sophisticated attempts to commandeer cloud resources, can
pose a threat. The organization can better plan for potential losses if it regularly assesses risks and estimates how
much it will cost to rebuild. Therefore, it is crucial to grasp the importance of cyber security and to establish unique
cyber security objectives for each company.
Cybersecurity refers to the measures taken to protect data stored online and on mobile devices from intrusion, de-
struction, or unauthorized access. For data, networks, and devices to be safe from cyberattacks, a secure and risk-free
setting is a top priority for cyber security.
The three aims of cyber security are
• Protect - Confidentiality of data.
• Preserve - Integrity of data.
• Promote - Availability of data for authorized users.
Information security policies can be directed by the CIA model, which prioritizes confidentiality, integrity, and availa-
bility. The triad comprises the three most important aspects of security.
When implementing new software, building a database, or ensuring access to sensitive information, the CIA criteria is
commonly used.
The CIA trio includes:
Fig. 1: Goals of Cybersecurity.
Confidentiality
Confidentiality is like privacy in that it keeps information from being shared without permission. It involves making
sure that only the people who are allowed to see the data can see it and that no one else can find out anything about
what it says. It makes sure that important information doesn't get to the wrong people and that it gets to the right ones.
Encrypting information is a great way to keep information secret.
NAAR, February 2023, Volume 6, Issue 2, 11-19 14 of 19
Tools for Confidentiality
Fig. 2: Tools for Confidentiality.
Encryption: Using an algorithm, encryption is a way to change information so that it can't be read by people who aren't
supposed to. The two main types of encryption are asymmetric key and symmetric key.
Access Control: In access control systems, users need to show credentials like their name or the serial number of a
computer before they can get in.
Authentication: Authentication is the process of making sure that a user's identity or role is correct. It can be done in a
number of ways, but most of the time it is a mix of-
• something that they have (storing secret keys),
• something they are aware of (like a password),
• something about the person (like a human with a fingerprint).
Authentication is needed by all organizations because it lets them keep their networks safe by letting only users who
have been authenticated access their protected resources.
Authorization: Authorization is a type of security that lets you do or have something. It is used to see if a person or
system can access resources, such as computer programs, files, services, data, and application features, based on an
access control policy.
Physical security: Physical security is the set of steps that are taken to keep unauthorized people from getting to IT
assets like buildings, equipment, people, resources, and other property. It keeps these things safe from things like theft,
damage, fire, and natural disasters.
NAAR, February 2023, Volume 6, Issue 2, 11-19 15 of 19
Integrity
Integrity is the way to make sure that data is real, correct, and safe from changes made by people who shouldn't be able
to. It is a property that information hasn't been changed in any way and that the source of the information is trustworthy.
Tools for Integrity:
Fig. 3: Tools for Integrity.
Backups: Data is archived on a regular basis as part of a backup. It is the process of making copies of data or files in
case the originals get lost or damaged. It is also used to make copies for historical purposes, like longitudinal research,
statistics, or historical records, or to meet the requirements of a data retention policy.
Checksums: A checksum is a number that is used to make sure that a file or data transfer is in good shape. In other
words, it's the process of figuring out how to use a function to turn the contents of a file into a number. They are often
used to make sure that two sets of data are the same. A checksum is based on the whole contents of a file. It is made so
that even a small change to the input file will probably cause the output value to change.
Codes for Data Correction: This is a way to keep track of data so that even small changes can be found and fixed
automatically.
Availability
Availability is the ability of people who are allowed to do so to access and change information in a timely manner. It
makes sure that only authorized people have consistent and reliable access to the sensitive data.
Tools for Availability
• Physical Protections
• Computational Redundancies
Physical Protections: When information is physically protected, it can still be accessed in spite of external threats.
NAAR, February 2023, Volume 6, Issue 2, 11-19 16 of 19
Computational Redundancies:
• It's used to protect against random failures.
• It safeguards backup servers and data storage in the event of system breakdown.
Advancetance
It has a lot of good things about it. As the name suggests, it makes the network or system safe, and we all know that
making something safe has a lot of benefits. Listed below are a few of the benefits. Securing society: Cybersecurity is all
about keeping a company's network safe from attacks from the outside. It makes sure that people are treated well and
feel safe around their important information.
Data that is hard to protect – Data about students, patients, and transactions must be kept safe from unauthorized access
so that it can't be changed. It's what we can get by being safe online.
Stopping illegal access helps us protect the system after it has been accessed by someone who isn't allowed to. The
information is highly protected and can only be accessed by authorized users.
Cyber security protects against information theft, protects workstations from theft, reduces PC freezing, gives operators
privacy, suggests strict rules, and is hard to work with for non-technical people.
It is the only thing that can protect computers from worms, viruses, and other unwanted programs.
It protects a system from hateful attacks, deletes or keeps hateful basics in a network that already exists, stops illegal
network access, gets rid of programming on or after other bases that might be co-operated, and secures complex data.
Cyber security makes the Internet safer, improves cyber flexibility, speeds up system data, and gives industries a way
to protect their information. It keeps private information about people safe, protects networks and capital, and fights
against computer hackers and identity theft.
It prevents data theft because bad actors can't mess up the way the network is built by using a high-security procedure.
Protect the hacking method.
Give the data and the organization's privacy. By following security rules and system protocols well, this can be done.
Disadvantages
Firewalls can be hard to set up correctly. If they aren't set up right, operators may not be able to do anything on the
Internet until the Firewall is properly connected, and you'll have to keep developing new software to keep security up
to date. Cybersecurity can be pricey for regular users. Cybersecurity also wanted to cost a large number of operators.
Rules for a firewall are hard to set up correctly. Makes the plan safe for the week, or sometimes too high. The norm is
expensive. If the firewall rules are wrong, the operator has no right to use different network facilities.
Conclusion
Cybersecurity will be hard to explain and may never end as digital skills interact with humanoids in almost every part
of policy, society, the home, and the outside world. The idea behind this project was that the mechanisms of
"cybersecurity" would speed up in the second half of the 2010s. Usually, that move speeds up, but how it works depends
on the situation. It's the most important thing we're looking into. In the near future, cybersecurity could become the
NAAR, February 2023, Volume 6, Issue 2, 11-19 17 of 19
"master problem" of the internet age. That puts it at the top of any list of challenges to civilization. It's more like a fight
for survival, like the weather, than a working fear that technology businesses must succeed. This will change how
people and digital machines interact with each other. These five situations are meant to show some of the good and bad
things that can happen. In our work, we have brought together different ideas about armed-to-military "cyberwar." This
was a showing select to tie the problems together. Cyberwar or cyber warfare will happen because the internet is a
challenging place, just like the sea, land, air, and space. Others have worked hard on cyber warfare scenarios that can
be used with this text to round out our collection of market-, user-, technology-, and social-sector-driven scenarios. We
know that a big fight between powerful forces that takes place mostly or only in cyberspace would break up many of
the driving forces we describe. Again, we've decided to think of this event as a surprise or "wild card" instead of a major
trend, at least for now. We need to be able to think outside the box enough to see how the problem set might change
and what new opportunities will open up. 2020, the goal year, is not too far away.
Situation thinking suggests that there are two main reasons for what is going on.
First, societies change more quickly than most people think. Even though we may all be tired of internet hype, especially
with all the talk about how fast things change, it is still possible that the world will look different sooner than we think.
Another idea is that it's easier to think of negative things than positive things. That makes sense in environments that
are shaped by evolution and natural mixtures, where avoiding risks that could be harmful is good for survival, but it
may not be as helpful in artificial environments where humans have more change. The internet is one of the most
complicated places people have made, but it is still (for now) a static place because different cultures build and program
numerical machines. Both acceptance and satisfaction are difficult.
We think that these situations make people think and talk for a long time, which leads to more questions than answers,
more bold research ideas, and more creative policy proposals than clear statements about what should or shouldn't be
done. So, with that in mind, here are some of the most important immediate points and problems with this attempt. Of
course, we learn the most when actors and governments use situations like this to make more specific and clear
proposals based on their own benefits, skills, willingness to take risks, and position. So, readers should ask: What would
cybersecurity mean from my point of view in a scene of possible futures that include the things these scenarios highlight,
and what would I or my organization(s) do next? Importantly, what will be needed beyond basic research and strategy
to get the best cybersecurity results I can predict?
Acknowledgement
I want to express my sincere gratitude to everyone who helped make this research project a success. I would like to take
this opportunity to express our sincere gratitude and appreciation to everyone who has supported this study and has
been with us from the very beginning of our journey.
I want to start by thanking God, the Almighty Creator, for giving me the knowledge, understanding, courage, and
fortitude to finish this study. Additionally, we value your guidance and support all the way through the course's
conclusion.
NAAR, February 2023, Volume 6, Issue 2, 11-19 18 of 19
Network and Information Security is a promising field of research.
Author Contributions: At first page.
Approval: All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable
Acknowledgments: Not Mentioned.
Conflicts of Interest: The authors declare no conflict of interest.
References
[1] Computer Security[J].Wikipedia https://en.wikipedia.org/wiki/Computer_security
[2] Cybersecurity tools and the best ways to use them protect important systems and sensitive information from a
growing number of threats that are always changing. [Z].IBM https://www.ibm.com/topics/cybersecurity
[3] Sachine Sangkar Bhosale, et al.Research Paper on Cyber Security[J].Research Gate, June 2021
https://www.researchgate.net/publication/352477690_Research_Paper_on_Cyber_Security
[4] ISBuzz Staff, et al. cybersecurity can boost plant productivity[R].Information Security Buzz, Sep 19.
https://informationsecuritybuzz.com/cybersecurity-can-boost-plant-productivity/
[5] The Different Types of Cybersecurity[R].Check Point, https://www.checkpoint.com/cyber-hub/cyber-security/what-
is-cybersecurity/
[6] The Different Types of Cybersecurity[B].Uniserveit https://uniserveit.com/blog/different-types-of-cybersecurity
[7] What is Phishing[R].Phishing.org, https://www.phishing.org/what-is-phishing
[8] Phishing[R].Wikipedia https://en.wikipedia.org/wiki/Phishing
[9] Ransomware Statistics[R].Antivirus Guide https://www.antivirusguide.com/cybersecurity/ransomware-
statistics/?gclid=CjwKCAiAuOieBhAIEiwAgjCvcryr8xFwFzI2JqJZkZ5ECeJPAdKXzc52kmXjB04ZviJuT1bkNFFCyRoC
3DMQAvD_BwE
[10] What is malware?[R].Cisco https://www.cisco.com/site/us/en/products/security/what-is-malware.html
[11] What is Social Engineering?[B].Kaspersky https://www.kaspersky.com/resource-center/definitions/what-is-
social-engineering
NAAR, February 2023, Volume 6, Issue 2, 11-19 19 of 19
[12] Goal of Cyber Security[B].Careerera https://www.careerera.com/blog/what-is-the-goal-of-cyber-security
[13] Cyber Security Goal[B].Wikitechy https://www.wikitechy.com/tutorial/cyber-security/cyber-security-goals
MD HASANUR RAHMAN
School of Electronics and Information Engineering,
Nanjing University of Posts and Telecommunications,
Nanjing, China.
[email protected]
WeChat: mhr-JunioR
View publication stats