PowerPoint#1

Running head: CHALLENGES OF CYBER SECURITY 15


Challenges of Cyber Security






Challenges of Cyber Security

Currently, computer security constitutes one of the fields with increasing significance because many people rely on computer systems and the internet for various operations. By the term ‘cyber security’, it refers to the provision of safety measures for computer systems against theft and destruction to the hardware, software and the information contained therein. It also includes protecting computer systems from any form of interference that hinders their efficiency to service delivery. According to (Vasconcelos et al., 2017), cyber security means limiting the physical access to certain hardware and providing safety against destruction that could result due to malpractice or when system operators become tricked and deviate from what is known secure guidelines.

There are many challenges for cyber security measures to be effective. Computer system operators experience great challenges in providing reliable and effective cyber security. Therefore, the question is that; how should system operators get the proper training to overcome numerous cyber security challenges? It is important to pose the question because today there are many businesses that feel insecure. For example, most enterprises doubt the preparedness by system operators and their ability to ensure that there is security in the corporate networks. In addition, a recent research carried by Enterprise Strategy Group established that about a quarter of system operators do not possess the desired skills. Lack of enough personnel who are equipped with right skills is the key factor attributed to challenges of cyber security. While cyber security significantly assists in to protecting us, many enterprises together with their esteemed clients, from someone falsely representing something as beneficial to them or to infiltrate our systems, it is in great need to be expanded on in order to safeguard us, and to create a safer environment protecting companies and our personal information and data, but it can and does fail to provide us complete security, if safe practices are not followed.

Protecting the Home Front

Home front is an informal term commonly used by the civilians of a nation, which faces a war, and their active support system of the military. As a result, military forces largely rely on home front civilian aid services. However, due to increased potential of destruction to the home front, there is a need to offer them appropriate protection (Wang & Lu, 2013). The military has the ability to design systems to help protect and deal with the vulnerabilities to the home front from direct attacks. There a number of things, that can be done to protect the home front against various attacks.

First, one could use automatic light timers fixed throughout in their systems. Light timers can be programmed to switch on and off in a way that helps simulate an individual desired pattern, which is predetermined beforehand. Light timers, which provide battery backup, are the best option. It ensures that the light timers do not stop functioning in case of power blackout or power failure (Wang & Lu, 2013). The home front protective groups have used the strategy and it proved the most reliable. For example, they constantly engaged in training their personnel who work as system operators. This way, they have been able to acquire the most realistic, practical and reliable means of solving many contemporary issues of cyber security they face.

According to (Wang & Lu, 2013), encouraging both specific and scheduled training provides the best way of ensuring maximum protection. For example, specifically designed training offers are affordable and comprehensive programs. They train system operators and equip them with effective skills needed to protect the home front.

Security: How to choose a safe Password

The use of passwords in computer systems is essential and a secure password is required especially when browsing around the internet. Secure passwords keep the system safe from interruption and eavesdropping by other people. As a result, it ensures that unauthorized persons do not compromise sensitive and confidential information. In most situations, an individual will pick a random number that is easy for hackers to understand and thus allowing them access to personal information. According to (Keller, 2016), when choosing a password, it should have at least eight characters in length. For example, it should consist of digits, punctuation marks, and letters with mixed upper and lower case. Additionally, it is advisable to alter the password with unique letters and numbers that restricts anyone from hacking the password.

The following are some of the simple steps that can guarantee a secure password; first, it is not appropriate to use personal information when creating a password. It is because it makes it easy for a hacker to guess certain personal information such as name and date of birth. Secondly, avoid using actual words since there is specific equipment that enables hackers to obtain the exact password. Due to increased intelligence especially in computing, it takes a short time for a person to test nearly every word contained in the dictionary to detect a password (Keller, 2016). As a result, it is important one does not use exact words. Lastly, the mixing up of many distinct characters is encouraged since it makes the password highly secure. For example, one could mix letters both in lower and upper case combined with special symbols such as the dollar sign ($).

What is Key to Secure Passwords?

The question; what is key to secure passwords? Many system operators ponder a regular question through each time a security breach takes place. For example, when a serious vulnerability was recently established, it was a requirement that all employees alter their passwords. As a result, the key to a secure password involved running it through an online password checker. The online checker highlights the significance of using long, random, and unique passwords. For example, it specifies certain fields that display a person’s password character variation and how it appears in the dictionary (Keller, 2016). It is the key to a secure password because it is able to tell how long it would take for a hacker applying a brute force attack to access the password.

The significance of Two-Factor Verification

The two-factor verification refers to a technology that offers easy identification of users through a combination of two different devices. There are various devices and services designed to execute the two-factor verification, which range from tokens, cards, and the use of smartphone applications. For instance, the two-factor verification requires two factors to authenticate for permission to log on an application. In addition, there is the infrastructure software, which detects and permits access to a particular user (Ding et al., 2017, February). Access is permitted when the users correctly apply tokens. One commonly used hardware token includes the Yubikey. It is a small device that supports one-time passwords (OTP) and verification.

Therefore, the significance of two-factor verification is that, it offers an extra layer of security making it difficult for hackers to get access to a person’s computer system or other devices and online accounts. For example, by the attacker gaining access to the password alone, does not guarantee him or her authentication verification. Therefore, the two-factor authentication technology has been in operation over a long time to regulate and protect access of sensitive systems and confidential data (Ding et al., 2017, February). In line with, two-factor verification it provides high security since access to a system does not only depend on strength of the password that a user creates. In addition, since several attacks results from remote internet links, two-factor verification reduces threat from hackers.

Malware

The term ‘malware’ signifies malicious software and it constitutes one of the computer programs specifically created to infect a user’s computer. It often aims at inflicting harm in computers and other devices in many different ways and takes on various forms. For example, a few include virus, spyware and many others. Computer viruses have become probably the most common type of malware because they increase through multiplication resulting in several copies of them. Therefore, malware security protection is required to serve as a second layer of safety measures for a computer or a network (Kumar et al., 2016, February). There are several antivirus packages, which form part of the primary unit of technological protection to both personal, and enterprise computer systems.

In the designing of antivirus software packages, they come with many features to enhance their protection against malware. For example, one essential involves their ability to check and recognize a newly downloaded program. This way, it makes sure that any program recently downloaded is set free from any malware. The second best feature for an antivirus software package regards its ability to regularly clean the computer, detect, and destroy any malware (Kumar et al., 2016, February). The antivirus also requires periodic updates to allow it to recognize the latest malwares that offer threat. As a result, there is a need for good antivirus safety to enable it recognize and provide signals for possible malware threats.

Ways of detecting malware on the computer

Computer hackers are committed in finding clever methods that enable them to get malware on other people’s computers and networks. One simple way involves their attractive websites which pop up with interesting downloads. Links to these websites download malware onto the computer especially if the user does not protect his or her device with effective antivirus software. There are certain indications that one can observe to help detect possible malwares; first, a poor performance by a computer system and its prolonged startup times signals infection by malware (Kumar et al., 2016, February). Additionally, it is an indication that malware on computers and networks when there is a sudden closure of the browser or it occasionally becomes unresponsive. As a result, once malware is detected, then it is highly recommended that the user stop conducting online activities. It is because the user risks sharing sensitive information that hackers could use in corrupt deals.

Privacy

Privacy as used in the internet and cyber security refers to the security of personal data so that that your information is not published through the internet. It means different factors and technologies designed to offer safety for sensitive and private information. It is a compulsory requirement for all computer and network users. Privacy is often a cause of concern to all users who intend to engage in online transactions and other social networks (Wang & Lu, 2013). A person’s personal information may be used in fraudulent deals if a password is hacked or revealed to other users. It means that care should often be exercised to avoid being caught up in privacy risks such as phishing. Phishing refers to an internet hacking attempt used for stealing personal information such as security pins, passwords, or bank account numbers.

Ways to Avoid Identity Theft Online

There are serious cases of online identity theft that take place-involving criminals who delve into personal information. The following are some of the ways to prevent online theft; first, an individual should always watch for phishing websites. It is a website, which legitimizes itself as a business website but only aims at getting the user’s sensitive and personal information. In that case, there is a need for one to be vigilant of any sites, which require personal information such security number, phone number and bank account numbers among others (Wang & Lu, 2013). Secondly, practicing safe e-mailing measures could identify online theft. For example, when you receive email offers, even though it appears too good to be a reality, you should then avoid opening such emails or documents attached if they come from an unknown source. Lastly, one needs to be on watch for sites that claim that they offer reliable financial services. It is safe to transact with financial institutions online only if their authenticity can is trusted and confirmed.

Ways to Protect from Cyber Stalkers

Cyber stalking refers to a crime in which an online attacker sends threatening messages or e-mails to a different online user. For example, a cyber stalker often uses e-mail, instant messages, phone calls, and other online communication devices to stalk. Here includes some useful pointers that can help protect from cyberstalking. First, an online user needs to be vigilant at all times against any attempt by outsiders to get access to his or her online device. According to (Wang & Lu, 2013), Cyber stalkers often use certain software gadgets to watch their target victims. Secondly, it is important that a person regularly ensure that he or she logs out of the computer programs after each use. Thirdly, practicing good password management and security protects from cyberstalking. You should never share your password and alter it regularly.

Data Breaches

Data breaching means an incident that involves intentional viewing, accessing or making use of data of a person or an application without legal authority. It is one of the security breaches practiced by hackers mainly to steal and make use of data without authorization. As a security breach, it could lead to data loss such as financial or health data getting lost. In addition, an attacker may steal data, use it for impersonation, and gain entry into a secured place. For instance, a hacker could steal login information of a network administrator and use it to access the entire network. Currently, cases of data breaching have significantly increased, causing a major threat to copyrights of many authors. As a result, it does not seem that the incidents will simply go away especially with the inception of worldwide web where a lot of information is obtained easily and illegally by cyber stalkers.

Defense against Data Breach

Any individual and organization irrespective of its size needs to be vigilant at all times so that is does not risk exposure to potential threats and data breaching. The following practices need to be in place to serve as defenses against data breach, first, by designing security systems that detect and protect any possible data breaching. Secondly, safeguard confidential and sensitive data from loss by installing data loss protection software (Jensen, Gouda, & Qiu, 2014, January). For example, protection software is able to block valuable data from being sent through e-mail. Thirdly, individuals and enterprises should be vigilant through creation of incident response plans. For example, when the company faces a possible attack then it will be able to react quickly and effectively to have the response plan defend against the attack.

Safe Computing

The term “safe computing” is commonly used without really understanding what it implies. It means following rules, stipulated to guide a person when using his or her computer or network. Safe computing’s intent is to protect devices against a potential virus or spyware (Vasconcelos et al., 2017). The following practices must occur to help in safe computing; first, a user has to ensure that his or her operating system has the proper updates. For example, one has to download and install the latest security software. It is can be easily done through the automatic update prompt located in the control panel. Secondly, one should ensure that he or she uses a safe browser that does not easily allow spyware. Lastly, a person should not at any time open attachments that he or she did not expect.

Significance of General Software Updates as well as Patches

The general software updates and patches often appear in little windows reminding users of the need for computer updates. They are important in updating operating systems and other software programs installed in the computer for various uses. If the user completes the updates as required, it saves from multiple revisions to the operating system such as incorporating new outlooks, removing some outdated features, and updating drivers and eliminates security gaps. By a security gap, it means software installed in a computer that has become vulnerable to attackers and viruses (Vasconcelos et al., 2017). For example, hackers, often target these security gaps simply by designing a certain malware that comes as a package to the system. Therefore, it is essential to carry out regular general software updates and patches to remedy any existing security gaps.

Meaning of Man in the Middle Attack

Man-in-the-middle attack (MITMA) is an attack where a user comes in between the sender and recipient of particular information. According to, (Jensen, Gouda, & Qiu, 2014, January), once he or she gets the information sent, he or she sniffs the information. The situation occurs mainly when a user sends unencrypted data that is easily accessible by the third party referred to as a man-in-the-middle attack.

Conclusion

Finally, it is worth noting that there are real vulnerabilities that come in different ways with the inception of technology. As a result, hackers take advantage of people’s ignorance in ensuring safe computing to avoid exposure to risks and theft. Practicing safe computing is the best way to ensure that every user is secure against all the challenges of cyber security. It is the most important and the most difficult practice especially for the new e-mail users. It is should be adhered to mostly because the spyware and viruses are installed onto an operating system by e-mail more than any others means. While cyber security significantly assists in to protecting us, many enterprises together with their esteemed clients, from someone falsely representing something as beneficial to them or to infiltrate our systems, it is in great need to be expanded on in order to safeguard us, and to create a safer environment protecting companies and our personal information and data, but it can and does fail to provide us complete security, if safe practices are not followed.


References

Vasconcelos, J. B., Kimble, C., Wang, W., & Lu, Z. (2013), P., & Rocha, Á. (2017). The application of knowledge management to software evolution. International Journal of Information Management, 37(1), 1499-1506.

Ding, J., Alsayigh, S., Lancrenon, J., Saraswathy, R. V., & Snook, M. (2017, February). Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. In Cryptographers’ Track at the RSA Conference (pp. 183-204). Springer, Cham.

Jensen, O., Gouda, M., & Qiu, L. (2014, January). A secure credit card protocol over NFC. In Proceedings of the 17th International Conference on Distributed Computing and Networking (p. 32). ACM.

Keller, H. (2016). The Internet, Technology, and Identity Theft. Consumer Economics: Issues and Behaviors, 390.

Kumar, S. R., Yadav, S. A., Sharma, S., & Singh, A. (2016, February). Recommendations for effective cyber security execution. In Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016 International Conference on (pp. 342-346). IEEE.

Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.