Mohammad Aminā€™s Expanded Definition of Cyber Security.

TO: Prof. Jason Ellis
FROM: Mohammad Amin
DATE: Due Date
SUBJECT: Expanded Definition of Cyber Security
 
Introduction 
I going to discuss abut cyber security. Iā€™m defining cybersecurity term. Iā€™m going to give definition and quotation to explain this term. In the following document Iā€™m going to discuss definition and provide quotes. And finally, Iā€™ll explain all of this in working definition in my own words.     
 
Definitions
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this:  some people have argued that the threat to cybersecurity has been somewhat inflated.
 
This definition means to prevent unauthorized persons from accessing electronic data and to protect all data from attacks by unauthorized persons.
 
Cybersecurity changes over time and these changes are different with a more complete understanding of cybersecurity self-efficacy and engagement trends.
 
This definition means, The type of cyber-attack changes over time so the type of cyber security also has to change. To protect against cyber-attacks, cyber security has to be modified and improved day by day. In order to increase their cybersecurity level in their own place.
 
Similar: The two definitions are to take appropriate action to prevent the theft of any information or the use of any information without permission. And cyber security needs to be updated over time. And ensure cyber security.
The first definition protects against criminal or unauthorized use of electronic information, and the second deals with changes in deals and the self-efficacy of cybersecurity over time.
 
Context


With the advent of electronic voting, some cybersecurity experts worry elections can too easily be rigged. Here Electoral System Electronics Cyber security experts fear that the polls could be rigged easily. I have found this context quote on this Book call Cybersecurity.
 
ā€œThe existing cyber-side and physical-side security defense systems are relatively isolated. For cyber-attacks, the main approaches to situation awareness and defense are executed at the cyber side, whereas the physical side has not been actively involved in these efforts. In many circumstances, state information of the physical side of the system can assist in the identification and traceback of cyber-attacks. The measures at the physical side can help prevent or reduce the risk caused by cyber-attacks.ā€ This quote means Cyber ā€‹ā€‹protection It cannot be physically provided. It has to be defended online to protect against online attacks. Situation awareness is implemented on the defensive side which can help in overall cyber security information cyber-attack detection and identification. Physical state information can help in the detection and identification of cyber-attacks. Physical measures help prevent or reduce the risks posed by cyber-attacks. I have found this quote from “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” 

Similar: In both cases there is a complete lack of cyber security where there is a lot of risk involved
Electronic voting has been mentioned in the first conflict where experts fear that if cyber security is not increased here, then the results of electronic voting may change. There is talk of rigging here
In the second conflict, it was stated that cyber security’s defense system should be physically and informally aware of cyber-attacks so that they do not undergo cyber-attacks in any process. Helps to reduce the risk caused.

Working definition

Cyber ā€‹ā€‹security is the act of preventing someone from stealing a document or misrepresenting information online without someone’s permission. Taking any information from the file without permission is called cyber-attack. And cybersecurity is about preventing anyone from taking information without permission.

Reference:
https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780199571123.001.0001/m_en_gb0994436?rskey=5p9BbD&result=5
 
L. C. Amo, R. Liao, E. Frank, H. R. Rao and S. Upadhyaya, “Cybersecurity Interventions for Teens: Two Time-Based Approaches,” in IEEE Transactions on Education, vol. 62, no. 2, pp. 134-140, May 2019, doi: 10.1109/TE.2018.2877182.
Higgins, Melissa, and Michael Regan. Cybersecurity, ABDO Publishing Company, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=5262186.
Created from citytech-ebooks on 2021-03-09 12:24:53.
 
Cite: M. Ni, M. Li, J. Li, Y. Wu and Q. Wang, “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” in Journal of Modern Power Systems and Clean Energy, doi: 10.35833/MPCE.2018.000830.
  

summary of “T. A. Ahanger” Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms

To Professor ELLIS

From Mohammad Amin

Date 03/03/2021

Subject: 500-word summary of Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms

Following 500-word summary article about IoT, IoT was created in 1999 and was officially launched in 2005 by the International Telecommunication Union, it was coined by Kevin Ashton. It has physical characteristics and virtual representation. The main idea of IoT is to convert miniature devices into smart objects and make them dynamic, it represents the parent class and enables intelligent communication with the information network. last few years, the concept of IoT has been applied in greenhouse monitoring, smart electric meter reading, telemedicine monitoring as well as intelligent transportation. With 5G network, IoT will make the online worlds much stronger but the biggest threat is to protect privacy. With 5G network, IoT will make the online worlds much stronger but the biggest threat is to protect privacy. The main goal of this study is to analyze the defense against IoT related challenge. Potential solutions to the security threats of IOT and review method to gain insight on the practical implication of security in the IoT. Patient data and staff can be monitored automatically using Iot technology. Many applications of Iot are used in smart cities. Protecting privacy is an important issue in digital environment but there is a risk of individual breaches of each device in the IoT network. In order to protect the authenticity of the information, only authorized users need to exchange information. The main goal of Iot is to provide accurate data to the user. IoT information must have protected so that no one can steal, delete or edit anything. Nonrepudiation is related to authentication of a legit party in getting access to the promised service. 

CYBER-ATTACKS ON IoT APPLICATIONS:

Sinkhole Attack creates the network traffic and collapses the network communication. Sinkhole attack creates counterfeit notes and sends route requests to neighboring notes.

Wormhole attack is an internal attack that make it very difficult to identify the attack as a result of unchanged network activity.

In a selective forwarding attack, a compromised node refuses to forward some of the packets in its outstanding buffer, such as control information or data packets in order to cut off the packetā€™s propagation.

Sybil Attack can create wrong reports, increase traffic load with spam and loss of privacy

Hello Flood Attack, usually within the range of the receiverā€™s device and can transmit to the receiver when it is incorrect. 

SET OF SECURITY REQUIREMENTS:

ā€˜Internet of Thingsā€™ A study titled IoT has presented a secure model of how data can be kept secure. The technology used in the network in this study emphasizes the need for a legal framework in accordance with international standards. Zhuo and Chao security system was disrupted there. According to the author, ā€œa security model for IOT in a study titled ā€˜ā€˜Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)ā€™ā€™. The author briefly discusses about the security and privacy concerns in IoT in this articleā€ (Babar et al.,2018, p.11025) They are added encryption methods, communication medium security, use of cryptography and protection of sensor/control data for tackling the Major security and privacy.Internet security issues presented a paper entitled certification approach. Abomhara and Koien 

Author discusses IoT and provides future direction for tackling current and future privacy initiatives. IoT will connect billion of devices, these have achieved the requirement for protection. Overall, this study discusses in detail the security threats to the IoT environment and solutions.

Reference: 

T. A. Ahanger and A. Aljumah, “Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms,” in IEEE Access, vol. 7, pp. 11020-11028, 2019, doi: 10.1109/ACCESS.2018.2876939.