The History About The Necessary Measures

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

CHAPTER 8

I. Certain Elements to Generate Awareness in Cyber-Security Educational Organization

The nature of the Internet as a device for communication and education is at times misused for personal gain, which results in cyber - attacks and increase in cyber - crime rates. In education system, the children must be made alert of the possible attacks and types of intruders. They have familiarity about the frauds & scams like cyber thefts, phishing and their historic records. They ought to know about the types of software, their defensive measures etc. The curriculum should also include the advance concepts like the safe use of social networking mobiles using GPRS. s They must also be cognizant of the terms like:

1) Hardware and Desktop Security

2) Wired Security or Wi-Fi Security

3) Password Protection/(File/Folder) Level Security

4) Malicious software:

• Hoaxes, Phishing

• Malware, Virus, Scare ware, Worm,

• Zombie, Trojans, Botnet, Adware and Spyware

5) Social Networking Attacks Security

Students are gaining information technology skills marks question on the educators' capabilities

ensure that optimistic habits of on-line behavior are being formed. Whereas, teacher giving information about security lacks the familiarity and up to date information pertaining to Cyber awareness issues, particularly with respect to security. Teacher training for the technology must be done for skills development and awareness. A new type of developing cybercrimes is the Hacktivists. The present record shows least awareness of cyber-crimes at all levels in India. There is an imperative need for introducing courses in various arenas. Cyber security is defined by the Department of National Security as, "Preventing, Detecting, and Responding to attacks." Indian Education organization prerequisites cyber security awareness programs with the increasing practice of Indian users in social networking and mobile devices.

4.1 Class Room Improvement Measures an Addition

Post Graduate, Graduate and Class XII level students as well as the employees of an association must be given: Case Studies, Mock test, Virtual environment formation giving the sensation of a problematic situation, it must be set in direction to create more awareness about the recent technologies and applicable threat, General awareness websites making, Power-point slides, and FAQ can be implemented in teaching for all the above mentioned level.

4.2 The Need of the Awareness Shown by the Class Room Conducted FAQ'S

Few expected questions on which the educational security professionals must be aware of:

Pilfering information through internet is known as: cyber- theft, crime, phishing?

An individual reading the confidential content is identified as: intruder, hacker, and impersonator?

A cyber- crime, which betrays people into giving their banking details, is: phishing, spyware, hacking.

Retrieving accounting details of an individual and using it for information is identified as: impersonation, snooping, spoofing?

A computer program automatically installed on the system, and spyware tracks private information entered and sends it to its creator. Unlike computer viruses, this leaves the computer owners totally heedless of its presence: worm, spyware, Trojan horse.

What is Adware?

Information security is the fortification of information system and information. True or False

Cyber security deals with the deterrent measures for securing information and information system. True or False

Microsoft and other big companies in 1999, had been hit by viruses, results in temporarily terminating their e-mail systems: Melissa

Who is Hacktivists?

There is mounting sign of politically motivated attacks over the internet, targeting the various organization and companies, from 'Hacktivists'. Hacktivists usually practice techniques involving moderately unsophisticated malware using the sheer weight of numbers.

What is Cyber-safety?

Cyber-safety are the steps which can be taken to avoid revealing information by "social" means, cyber-safety focuses on acting carefully and responsibly.

What is "Software loopholes"?

The weak links that gives entry points to the intruders into the system.

What is the difference between a Virus and a Hacker?

What is the difference between a Hacker and a Cracker?

Hacker is one who is expert in the computer programming to an elite level where they know the system thoroughly. A person who can crack the info in the computer is a hacker, here they uses their proficiency for own gains outside of the law. Ex. changing bank accounts, distributing viruses, stealing data etc.

Difference between Hacker and an Intruder

What are Zombies and Botnets?

A botnet is an aggregation of compromised computers connected to a central controller. It is a short for the computer network.

What is a Scare ware?

Fake security software warnings: These kinds of scam can be mainly advantageous for cyber criminals, many users trust the pop-up warnings telling them their system is infected and are tempted into downloading and paying for the special software to guard their system.

What should be the essential countermeasures for the overall public?

The three important countermeasures for defending information and data are technology, operations and awareness, exercise and education.

What is a Hoax?

A illusory attentive disseminated via forwarded email warning users of a computer virus, internet worm, or other security threat which in genuineness does not exist.

Students with different upbringing are not alert of this basic awareness about cyber security. Hence there is a necessity for awareness in educational organization.

5. Some Measures to be taken at Various Levels

Organizational Level Measures

Technical security controls are robust but must be properly specified, premeditated, developed, configured used and maintained. All of which involves humanoid participation.

Appropriate coordination of senior management, information safety, human properties etc. plays a vigorous role in ensuring data security of the customers

Improvement courses must be planned up in an order to generate good security professionals. Technology itself cannot safeguard the security in the absence of suitable processes implemented by permitted users.

Updating persons about risk to information security controls in a general sense and

providing direction whenever necessary.

People must be motivated to gadget security policies and act in a more security conscious mode. Increasing the notification & identification of cyber security fissure

"Employees are the last line of defense." Security mindfulness training can pay off by training users on what they can do to stop malicious activity and what to do in the event of such action. Of course security mindfulness training is not the be-all-end-all, it is an important layer of security to add to present security measures (Rothman, 2007) [10].

Tools are required for organizations to analyze their information systems' security, reliability, and resilience against cyber-attack [11].

General public are considered as a feeblest link in fortifying systems. It can be improved by:- Improving awareness of the necessity to defend system resources

Developing skills and information related to security

Constructing deep knowledge as required to implementation, design and function security programs for organizations and systems.

Awareness techniques should be shaped and frequently changed knowing the experience and the knowledge of the beginners.

Individual Level Measures

Protecting our isolated individuality information in cyber space

Detach system from the internet when not in use

Learned to known on line spams and marketing schemes which are frequently disguised as contests

Getting attentive of the laws pertaining to the custom of network

Knowledge of safe chatting and messaging services

Fortifying data by means of hard-to-guess password

Installing and updating anti-virus software and regularly downloading sanctuary guard updates

Backing-up data on computer system regularly and Understanding the menace associated with file sharing.

Humans must have accurate balance of decision making and delegation to maximize their effectiveness and to acknowledge their permitted responsibility for the actions of their automated systems [12].

Thwarting stranger entree to private computer files

Specific awareness about the laws and rights before using any novel software

Government Level Measures

Government should participate in funding cyber education and produce strong partnerships with local state and regional governments industry and educational organization

Government should provide appropriate laws for cyber-crime and impeach people who steal digital property or harm people on-line.

It must train its citizenry to watch for disbelieving events on line



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now