Home » Project Material » Cyber Security

Cyber Security

ELECTRICAL ELECTRONICS ENGINEERING

INSTRUCTIONS:

  • You are perusing the project material titled “Cyber Security.”
  • The project material on Cyber Security is available for instant download.
  • Preview Chapter One of Cyber Security at no cost.
  • To access the complete project material for Cyber Security, kindly make a donation to support the ongoing maintenance and operation of this website.
  • The provided work on Cyber Security is intended solely for academic research purposes and should be utilized strictly as a set of guidelines.
  • Our objective in distributing Cyber Security is to aid individuals unfamiliar with project research, specifically writers seeking assistance in this area.
  • Kindly refrain from directly replicating the content provided in Cyber Security materials.
  • Feel free to reference “Cyber Security” in your work, provided that you paraphrase appropriately.
  • Unauthorized reproduction of Cyber Security content is prohibited under our Terms of Use.
  • UniProjects assumes no responsibility if you replicate the content of this Cyber Security.

Cyber- security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This work provides an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It looks at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The aim of this work is to name some challenges of cybercrime and present practical and logical solutions to these threats.

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

CHAPTER ONE

1.0      INTRODUCTION

1.1      BACKGROUND OF THE PROJECT

  • AIM OF THE PROJECT
  • PURPOSE OF THE PROJECT
  • BENEFIT OF CYBER SECURITY
  • SIGNIFICANCE OF THE STUDY

CHAPTER TWO

2.0      LITERATURE REVIEW

  • REVIEW OF THE STUDY
  • OVERVIEW OF CYBER-CRIME AND CYBER- SECURITY
  • VULNERABILITIES AND ATTACKS
  • E-CRIMES THOSE ARE PECULIAR TO NIGERIA
  • TYPES OF CYBER ATTACKS
  • HISTORICAL BACKGROUND OF CYBER ATTACKS

CHAPTER THREE

3.0     METHODOLOGY

3.1      METHODS OF AVOIDING CYBER ATTACK

3.2     CHALLENGES OF CYBERCRIME

CHAPTER FOUR

  • CATEGORIES OF CYBER CRIME
  • EMERGING CYBER TRICKS IN NIGERIA
  • EFFECTS OF CYBER CRIME

CHAPTER FIVE

  • CONCLUSION
  • RECOMMENDATION
  • REFERENCES

 

CHAPTER ONE

1.0                                                        INTRODUCTION

1.1                                           BACKGROUND OF THE STUDY

The term cyber security is used to refer to the security offered through on-line services to protect your online information. Cyber Security and Information Security differs only in its response and Reduction/Prevention. Cyber security encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations and Compliance including Third Parties involved in delivering an objective With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also

Our world today is ruled by technology and we can’t do without it at all. From booking our flight tickets, to catching up with an old friend, technology plays an important role in it. However, the same technology may expose you when it’s vulnerable and could lead to loss of essential data. Cyber security, alongside physical commercial security has thus, slowly and steadily, become one of the most important topics in the business industry to be talked about. Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.

Cyber security becomes important as Businesses are being carried now on Network of Networks. Computer networks have always been the target of criminals, and it is likely that the danger of cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm.

1.2                                                   AIM OF THE PROJECT

The main aim of this work is to carry out a research on a cyber security. This study will helps to spread awareness among normal people about emerging security threats. The objectives of the work are:

  1. To improve their knowledge about cyber security
  2. To overcome several security loopholes on their computer operation.
  • To provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks
  1. To help people reduce the vulnerability of their Information and Communication Technology (ICT) systems and
  2. To help individuals and institutions develop and nurture a culture of cyber
  3. To work collaboratively with public, private and international entities to secure cyberspace.
  • To help understand the current trends in IT/cybercrime, and develop effective
    1. Integrity, which may   include authenticity and non-repudiation.

1.3                                                PURPOSE OF THE STUDY

The purpose of cyber-security is to prevent data breaches, identity theft and cyber-attacks as well as risk management in some cases. When an enterprise applies an effective incident response plan and has a strong network security, it is better positioned to mitigate and prevent cyber-attacks. For instance, end user protection guards against theft or loss of information while scanning computer devices for malicious codes. In light of this, organizations and the cyber-security stakeholders must remain up-to-date with the emerging technologies, threat and security intelligence trends in order to design the ideal cyber-security measures.

1.4                                            BENEFIT OF CYBER SECURITY

This helps to ensure that all internet connected assets and information are secured from cyber-threats that take many forms such as;

Ransomware: it is deployed by an attacker in the form of a malware that locks a target’s computer system and files through encryption. The attacker demands a lump sum payment in order to decrypt and unlock the computer systems and files.

Malware: this is any program or file that is deployed with the aim of harming a computer user like; computer virus, worms, spyware and Trojan horses.

Social engineering: this is a new form of cyber-attack that is executed through tricking system users into breaching security procedures to grant the attackers access to sensitive and private business information that is protected.

Phishing: this is a type of cyber fraud that entails sending out fraudulent emails that bear a resemblance to emails from reputable sources. However, the fraudulent emails are designed to steal sensitive user information such as login information and credit card details.

Evidently, upholding cyber-security requires coordination of security efforts within an entire information system that includes; network security, application security, information security, end-user education, operational security and disaster recovery. The major cyber-security challenge is the ever evolving nature of security threats and risks. The traditional cyber-security approach focuses on core system components and preventing the known threats. Meaning that, some of the security components are left undefended and the systems are not fully protected against risks that are deemed to be less dangerous. Fortunately, this is gradually changing as companies and security stakeholders invest more resources on improving cyber security technologies and services.

1.5                             SIGNIFICANCE OF THE STUDY

This study is useful and necessary since it helps the reader to know and be aware of cyber attack and in securing data from threats such as data theft or misuse, also safeguards your system from viruses.

Frequently Asked Questions

If you’re referencing specific information, quotes, or ideas from “Cyber Security”, provide a citation in the appropriate format such as APA, MLA, or Chicago.

The title page of downloaded document contains information about the author, editor, and publisher of Cyber Security material.

Select “Donate & Download,” on top of “Cyber Security” and upon completing your donation, you will be directed to the download page or you can chat with us for alternative donation methods.

You have the opportunity to upload content similar to “Cyber Security” and receive payment for each download of the material. Engage in a conversation with our representative if you have any topics related to Cyber Security.