CETM30 Fundamentals of Cybersecurity Sample
Part 1
1. Introduction
Cybersecurity is designed for protecting different devices from any threats. It is used for the protection of different networks from any external threats. Different businesses use cybersecurity systems for the protection of their private data. There are different cyber security professionals for protecting all confidential information, the productivity maintenance of the employees, also for increasing the interest of the customers for products along with services.
Cybersecurity helps in maintaining the privacy, availability, and integrity of all data, which means data that can only be accessed by the authorized parties, availability suggests that all the information, data, and systems should be available when there is a need, and integrity means adding new information or removing any unnecessary information or the alteration of different information. Authentication mechanisms are the main element of cyber security. If a user wants to access the account, he/she needs to provide the password as a mechanism to prove that the account belongs to the user.
Cybercrime is a global problem that is dominating the world of security for huge businesses and international companies, government sectors, banks, and many other organizations. There is a huge demand for the internet because the world lives on the internet, and users are not aware of cybercrimes or we can say they are ignorant of the situation.
Hackers are also becoming smart, they are more creative with their actions and malware, and viruses, so it is very important that everyone maintain certain protocols to protect all the systems. Here the subject topic will be web application threats in the cybersecurity domain.
2. Rationale
The generation of digital technology mostly depends on modern algorithms of digital operations. Most of the digital operations are being executed through digital platforms in terms of achieving higher scalability along with maximum efficiency and accuracy over the orthodox execution methods. However, an increasing number of cyber criminals have drawn prime attention in this context. It has been viewed that security in digital platforms is the prime concern in recent times. The discussion of cyber security has been initiated from this context.
Up-gradation of technology has presented centralized database mounting in modern applications. This concept has eased operations with higher productivity along with prominent accuracy.
However, a centralized database system can be a severe issue in terms of cyber-attacks. As per the view of Mahdavifa et al (2019), a cybercriminal can fetch all the data associated with a dedicated web application. Henceforth, securing data has been found as the optimal target concerning cybersecurity discussion.
After a severe hit of Covid 19, most of the developed and developing nations are being dependent on “work-from-home” applications and portals in recent times. The complexity of cyber-attacks along with strategic management of structure in the post-pandemic situation.
Henceforth, cybersecurity has engaged a critical concern in this work-from-home structure as a complete professional database can be obtained with smarter hacks performed by cybercriminals. This context has engaged most prior concern in this discussion.
Incorporating the proposed discussion, it has been viewed that transparent knowledge along with appropriate accessibility is required for operating the web credentials are two prime factors of discussion that are going to be analyzed in further illustration in the context of the target audience.
3. Target Audience
The digital world has dominated the entire generation. Different businesses, security portals, government sectors, large insurance companies, banks, military, agencies of law enforcement, and different IT sectors are the main target audience for this project to enhance the awareness of this very important issue.
People involved in different managerial segments of different organizations or infrastructures require proper knowledge to understand the importance of cyber security in web applications to recognize and manage any external threat.
As per the view of Kshetri et al (2017), different software users and web designers require the impact and different implications of cybersecurity, to identify any security requirements and develop the design according to that. System managers and network engineers who are responsible for various operations of infrastructures, all these components cover a wide range of operations including different networks, operating systems, and other applications.
People directly related to security management operations that involve handling different incidents, security monitoring includes logging analysis and software assessment, vulnerability management, and communication. As per the view of Harknett et al (2020), software developers produce codes, and application programmers write different programs, middleware programmers also should have the basic knowledge of secure coding like scripting.
Officials of different departments of central and state government, PSUs, network administrators, different law agencies, technical officers, etc all are the target audiences for this project. Also for home users, youth, and adults of this generation, their whole life is centralized in digital media. It is very important for them to understand the importance of cyber security so they can easily protect their personal information (Anwar et al 2017).
4. Importance of issue in cybersecurity
This project involves web application threats in the cyber security domain. The web application is the development of different programs for remote servers for delivering to different users using the internet. Web application security is developed for protecting the system and also reducing data fraud. The web application is the concept that different websites are built and are expected to work normally, even if the website is hacked.
A whole collection of different engineers in the security control domain for the protection of the web application and all its confidential data from any malicious agents. Some web applications contain defects that can be a huge risk for the organization and involve leveraging of some security development issues. Implementing security-related measures in the software development aspect ensures the protection against flaws and bugs (Shaukat et al 2020).
The security vulnerabilities present in the web application can be found through the testing of web applications. Web application testing involves different inputs for provoking errors so that the system can behave in an unusual way.
This web application security involves website cloning, which is to scam different confidential documents and data, damaging the credibility of different companies and reputable websites. This is a very common part of cybercrime, they create a similar-looking clone site containing minimal difference from the original web address.
So it is very important to secure the website using cybersecurity. As per the view of Quayyum et al (2021), different types of viruses, worms, spyware, ransomware, and harmful computer programs known as malware are used for hacking different systems. These viruses are delivered through downloads, even emails, for gaining access to confidential information. They can also hack different passwords for network entry. There are also MitM attacks, DoS attacks, and SQL injection.
Data breaching is a vast industry in financial aspects which is worth higher than any organization or industry. Cyberattacks possess the power to disable the financial aspect of any nation by different personal and financial information, different trade secrets, data leak, information leakage, and cloud leak. So the importance of cybersecurity is huge to protect the economy of any industry or organization as well as the entire nation (Williams et al 2020).
SQL injection is used by attackers to get unauthorized access to any web application by adding malicious code to the database query. It gives access to get all the sensitive data and to modify, update, add or delete any records from this database. It is very important to provide security.
5. Impact on Society – critical discussion of the threats to either individual in society or to organizations
Cybersecurity is crucial because this can secure all of the categories of respected data from damage as well as theft. This can involve the data that is sensitive, “protected health information” which also can be expressed as the PHI, data as well as information systems of the following industry.
By getting any incident early, the following organizations can decrease the entire impact. This following impact can involve the loss of economy, reputations that are damaged, and respective businesses that are disrupted. The teams of security can recognize when the following attackers are performing in the respected network (Sarker et al. 2020).
There are several factors that can provide to the following cost of the cybercrime. Every factor can be ascribed to a substandard focus on the best practices of the cybersecurity. If the system of cybersecurity is not operated properly then this can damage any organization in many ways. Some of them are-
- Reputational Cost
Mislaying of the trust of consumers, loss of current and future customers to the respected competitors, and poor coverage of media.
- Economic Costs
The thieving of the several intellectual properties, the information of the respective corporate, disruption in the trading as well as the cost of improving the following systems that are damaged.
- Regulatory Costs
The laws of the data breach, as well as the GDRP, suggest that the following organization can suffer from administrative fines or sanctions as the outcome of the cybercrimes.
As per the view of Berry and Berry, (2018), there can be several sorts of threads of this cybersecurity. Some of them are- the attacks of social engineering, attacks of malware, the “Advanced persistent threats” which also can be expressed as the APT, password attack, the “Man-in-the-middle attack”, and “Distributed denial of services” which also can be expressed as the DDoS and so on (Williams et al 2020).
As per the view of Almaiah et al. (2021), the threads of the web application have proceeded. Several threads like the XSS, Web site cloning, and SQL injection on the web applications are considered for the respected work. The following “cross-site scripting attack” which can also be expressed as the XSS attacks involve when any attacker collects the script that is malicious in the following data that is sent from any search of the following website or the form of contact.
As per the view of Ullah et al. (2019), the following website cloning is the procedure of generating a replica of the design of the website that is already existed or the content for creating a new form of website easily.
The respected SQL injection also can be referred to as the SQLI is a normal vector of attack that utilizes the malicious code of the SQL for the manipulation of the following backend database to access the following information that was not intended for display. The following SQL injection is a sort of cybersecurity attack that can target the databases utilizing the statements of the SQL.
6. Professional and ethical issues
As per the view of Humayun et al. (2020), there can be several primary ethical issues in the utilization of IT on the global networks that can be consisted of the privacy that is personal, the right of access to the following data as well as the following actions that are harmful on the Internet. There are also several issues that can be faced by professionals in the cybersecurity. Some of the ethical issues are-
Confidentiality
Confidentiality is an important ethical issue in the cybersecurity. The professionals of the security by the characteristics of the respected profession operate the personal, and private information that has to be kept for revealing the scan of the virus on anyone’s hard drive. The professionals of cyber security have to be followed (Svilicic et al. 2019).
Security
Security is a further ethical issue, which can be redundant when the professional of the cybersecurity. The responsibility of the security of any professional of cybersecurity. Experts in cybersecurity can various lapse of ethics.
Threats to the privacy
There are several privacy concerns that are interweaved with the issues of cybersecurity in any complex relations. This cybersecurity can defend against like these sorts of threads like XSS attacks, website cloning as well as SQL injection. The following “high profile data breaches” can have occurred recently. The respective organizations that can acquire information that is personal about the following users can be responsible ethically that the information from the respective hackers.
There is no actual mechanism for the following enforcement. The professionals of the following cybersecurity have to behave ethically as well as prove to the following supervisors through the following actions that can be dignitary information that is very important. There are no compulsory standards for the respected ethics issues of the cyber that the professionals of cybersecurity can be obliged for following.
7. Conclusions
The environment of cyber security has a wide range of aspects. For this particular work, the web_application threats in the domain of cybersecurity have proceeded. The following XSS attack, Web site cloning, and SQL injection on the web applications are considered for the particular work.
The researcher has provided a detailed view of these threads of cyber security, the professional as well as the ethical issues, the impact of cyber security, and so on. Cyber security is very crucial because that can secure all the respected data from thieving of data as well as damage. The future of this following technology of security can rely on the new ways of centralizing the data as well as the operations of the operations that are automated.
The systems that are based on the cloud may involve sensitive data of the following company, and private details of the following customer. The following cyber threats have enhanced in complexity as well as scale, the breadth of the targets that are exposed that any sort of attacker may go after has become greater exponentially with the following Internet as well as the IoT. The following technology can be capable of performing effective cybersecurity.
8. References
A survey. Neurocomputing, 347, pp.149-176.
A systematic literature review. International Journal of Child-Computer Interaction, 30, p.100343.
Almaiah, M.A., Al-Zahrani, A., Almomani, O. and Alhwaitat, A.K., 2021. Classification of cyber security threats on mobile devices and applications. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications (pp. 107-123). Springer, Cham.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L. and Xu, L., 2017. Gender difference and employees’ cybersecurity behaviors. Computers in Human Behavior, 69, pp.437-443.
Berry, C.T. and Berry, R.L., 2018. An initial assessment of small business risk management approaches for cyber security threats. International Journal of Business Continuity and Risk Management, 8(1), pp.1-10.
Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7(1), pp.1-29.
Harknett, R.J. and Stever, J.A., 2011. The new policy world of cybersecurity. Public Administration Review, 71(3), pp.455-460.
Humayun, M., Niazi, M., Jhanjhi, N.Z., Alshayeb, M., and Mahmood, S., 2020. Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering, 45(4), pp.3171-3189.
Kshetri, N., 2017. Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), pp.1027-1038.
Mahdavifar, S. and Ghorbani, A.A., 2019. Application of deep learning to cybersecurity:
pandemic. Journal of medical Internet research, 22(9), p.e23692.
Quayyum, F., Cruzes, D.S. and Jaccheri, L., 2021. Cybersecurity awareness for children:
Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P. and Ng, A., 2020.
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Chen, S., Liu, D. and Li, J., 2020. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies, 13(10), p.2509.
Svilicic, B., Rudan, I., Jugović, A. and Zec, D., 2019. A study on cyber security threats in a shipboard integrated navigational system. Journal of Marine Science and Engineering, 7(10), p.364.
Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M.A., Al-Turjman, F. and Mostarda, L., 2019. Cyber security threats detection in internet of things using a deep learning approach. IEEE Access, 7, pp.124379-124389.
Williams, C.M., Chaturvedi, R. and Chakravarthy, K., 2020. Cybersecurity risks in a
Williams, C.M., Chaturvedi, R. and Chakravarthy, K., 2020. Cybersecurity risks in a pandemic. Journal of medical Internet research, 22(9), p.e23692.
Know more about UniqueSubmission’s other writing services: