Foysal’s Expanded Definition of Cyber Security

To: Prof. Ellis

From: Foysal Ahmed

Date: 03/26/2021

Subject: Expanded Definition of Cyber Security 

Introduction

The purpose of this document it to inform about different type of cyber security. In this paper I will be talking about cyber security and the different type that protects out network. Network security, application security, information security, operation security, disaster recovery and business continuity and end-user education are few terms that. There is a lot of cyber threat that continues to grow everyday of the year. People get affect by cybercrime everyday anyone with a cell phone, bank account, files on the computer. Cyber security is set in this place to protect us from hackers and even terrorist from hacking any sensitive files. People have private information that they do not want to be out in the world or probably do not even want their family members or even friends to see. Cybercrime which is one or a couple of people causing disruption or targeting people for financial purposes (Kaspersky, 2021). Cyber-attacks get information pertaining to public affairs another type of threat is cyberterrorism “is intended to undermine electronic systems to cause panic or fear” (Kaspersky, 2021).

Definition:

Cyber security is very important part in the world. The purpose of cyber security “is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks” (Kaspersky, 2021). There are a few types of security that works in different ways Network security, application security, information security, operational security, Disaster recovery and business continuity, and end-user education. Network security is “the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware” (Kaspersky, 2021). Firewalls is one type of network security which is a barrier that protects your network from any unauthorized and untrusted when on the internet. Another one is access control which keep hackers or anytime of unwanted visitors gaining access to your network. Application security “focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.” (Kaspersky, 2021). Kaspersky is saying that this security is in place to prevent codes or data from being taken. 

Context:

 Juliana De Groot wrote in her blog that cyber security means “the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.” ( De Groot , 2020). She speaks on how important cyber security is important everywhere. From the government to the military and even the stores that store information from customers on there computer database. Just like Kaspersky, Groot also spoke on the elements of cyber security. Her definition network security is “The process of protecting the network from unwanted users, attacks and intrusions” ( De Groot , 2020). Which is basically saying the same thing as Kaspersky. She continues to speak on application security, Disaster recovery and business continuity. She added cloud security and mobile security. Cloud security is “Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges.” And mobile security is “Cell phones and tablets involve virtually every type of security challenge in and of themselves. ( De Groot , 2020).

Working:

The field that I am going into is cyber security. As a Cyber Security Specialist, I will be providing security to many software, data centers as well as networks. By this I will be helping businesses protect their computers from any hackers that try to get into their network. Cyber Security Specialist is also look out for threat; they conduct the necessary procedure to determine they threat. They also test and identify the network and system vulnerabilities. I will also be responsible for looking after the security that was built into the system software, hardware and other components. Another one is building firewalls into the network infrastructures, I will also work along side police when it is needed to discuss who hacked into the network and so on. In today we have a lot of cyber threat that is going on, from hackers to trojans, data breaches. It would be my job to protect all the things that would happen to people network system and keep their information safe. 

Reference:

Kaspersky. (2021, January 13). What is cyber security? Retrieved March 09, 2021, from https://usa.kaspersky.com/resource-center/definitions/what-is-cyber-security

De Groot, J. (2020, October 05). What is Cyber Security? Definition, Best Practices & More [Web log post]. Retrieved March 09, 2021, from https://digitalguardian.com/blog/what-cyber-security

Summary of Mendsaikhan et al.’s “Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph

To: Professor Ellis

From: Foysal Ahmed

Date:03-03-21

Subject: 500 word summary of an article about “Cyber Security.”

The following is a 500 word summary of a peer-reviewed article about quantifying the significance and relevance of cyber-security text through textual similarity and a cyber-security knowledge graph. Presenting various opportunities to socialize and business in general, these opportunities also bring different kinds of risks such as cyber-attacks, data breaches, loss of intellectual properties, financial fraud, etc. The idea of sharing threat information stems from the assumption that an adversary that attacks a specific target is also likely to attack similar targets in the near future. From the paper, we can know about quantifying the significance and relevance of the threat information applying different methods, such as the Entity Recognition (NER) model and the Cyber-security Knowledge Graph (CKG), the subjective relevance of the cyber-security text to the user, and to generate correlation features. This paper also shows that to mitigate cyber-security risks proactively, security analysts continuously monitor sources of threat information. 

“While information-sharing platforms have grown in popularity, the amount of shared threat information has grown tremendously, overwhelming human analysts and undermining the efforts to share threat information.” (2)

Even though there are approaches that automatically share information between machines through structured information sharing such as Structured Threat Information Expression (STIX) and its corresponding protocol, Trusted Automated Exchange of Intelligence Information (TAXII), the need to process unstructured text reports that might be shared via email or forums still exists. For example, dark-web forums provide valuable threat information if the noise can be segregated with less effort. Also, to establish situational awareness, a security analyst has to identify cyber threat-related information specifically applicable to his environment to monitor and prevent the possible intrusion proactively and control the possible risk. To ensure those all, the research first shows why they are so willing to research on this topic; then they find the problems out to be solved and show the existing methods that could not solve the problem. They proposed their solution and then tried to prove why that solution is significantly more important than the existing ones.

Finally, it is shown that due to the constraints such as a probable lack of identifiable cyber-security named entity in test data and the uncertainty of identified Mentioned Entities to exist in CKG, the effectiveness of the proposed architecture could not be proven directly on the raw test documents; however, by simulating the controlled environment by manipulating the test document achieved a classification accuracy of 88% using the logistic regression classifier. Since it is impossible to expect the controlled environment in a real-life situation, the experiment must be improved to reconcile the simulated dataset with real-life data. We believe by improving the NER performance and extending the scope of CKG, the experiment would come closer to producing production-grade results.

Cyber protection, as we all know, is the process of shielding computers, routers, handheld devices, electronic infrastructure, networks, and documents from malicious attacks, and It is also known as information technology security or electronic information security. As the term applies in various contexts, from business to mobile computing, and can be divided into a few common categories, research on this kind of topic is a crying need for the overall development of all.

References

Received September 9, 2020, accepted September 21, 2020, date of publication September 28, 2020, date of current version October 8, 2020. Digital Object    Identifier 10.1109/ACCESS.2020.3027321. 

Resource center. (n.d.). Retrieved March 02, 2021, from https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security.