Cybersecurity Analysis and Strategies Report
Cybersecurity Analysis and Strategies Report
Paknajol, Kathmandu
Report on
Cyber Security
Submitted by: Submitted to:
Sameer Maharjan Dadhi Ram Ghimire
Programme: BIM 1st Semester TU Lecturer
Roll. No: 20
Email:[email protected]
Abstract
In the current digital era, cybersecurity has emerged as a critical issue due to our
increasing dependence on technology. This paper offers a thorough analysis of
cybersecurity, covering major issues, emerging trends, and risk-reduction tactics. It starts
off by outlining the layers, types and importance of cybersecurity along with wide range
of cyberthreats that affect people, companies, and countries; these include everything
from malware assaults to highly skilled social engineering schemes.
The report also explores the significance of implementing proactive defense strategies in
order to successfully fend off these attacks. It talks on the need of safeguarding digital
assets and maintaining data integrity with tools like encryption, firewall, and VPN.
Understanding how cyber dangers are changing can help people and organizations better
prepare for risk mitigation and potential.
i
Table of Contents
1. Introduction......................................................................................................................1
5. Cyber Threats...................................................................................................................6
8. Future of Cybersecurity..................................................................................................10
9. Conclusion......................................................................................................................12
10. References....................................................................................................................13
ii
1. Introduction
The activity of defending internet-connected systems, including hardware, software, and
data, against cyberthreats is known as cybersecurity. To prevent unwanted access to data
centers and other electronic systems, both individuals’ businesses employ it.
An good cybersecurity plan can provide a strong defense against harmful assaults that
attempt to access, alter, delete, destroy, or extort an organization's or user's systems and
sensitive data. Cybersecurity can also help avoid attacks that aim to disable or impair the
operations of a system or device.
An effective cybersecurity strategy should include many layers of defense across all
potential access points and attack surfaces. This includes a layer that protects data,
software, hardware, and network connections. Furthermore, all personnel in a business
who have access to any of these endpoints should be taught in the correct compliance and
security procedures. Organizations also employ solutions like unified threat management
systems to add another layer of security against threats. These technologies can detect,
isolate, and remediate potential problems while also notifying users if further action is
required.
1
2. Importance of Cyber Security
Cyber security is important because it safeguards individuals and organizations against
cyber-attacks and theft or loss of sensitive and confidential information. Cybersecurity
can monitor systems to protect personal data (PII, PHI, financial details etc.), trade
secrets, intellectual property and any sensitive government information.
i. Protection of Data
In today's digital age, data is one of the most precious assets for both individuals and
corporations. Cybersecurity procedures protect sensitive data from theft, illegal access,
and tampering while maintaining confidentiality, integrity, and availability.
Cyberattacks can cause considerable financial losses for firms by stealing funds, extorting
them, or disrupting their activities. Effective cybersecurity solutions help to reduce these
risks by preventing unwanted access to financial systems and transactions.
Customer retention and brand loyalty are years-long processes for any firm. Data
breaches have a significant negative impact on a business's reputation. Organizations that
implement a cyber security system can avoid unexpected setbacks.
2
Network and cloud security technologies can help to tighten access and authentication.
This can pave the way for future recommendations, ventures, and expansions.
i. Human layer
3
This layer is concerned with human behavior toward the system and how they secure the
system's data. To strengthen security at this layer, humans must be fully aware of the
potential harm that threats can cause to the system. They should follow solid security
practices, such as employing strong passwords, identifying phishing attempts, and dealing
with risks if the system is compromised. Concisely, this layer incorporates the user's
management controls.
This is the point at which other devices or networks can retrieve and access all data. This
comprises all of the devices connected to a specific network. It ensures that the system is
protected by both physical and digital security procedures, which are often implemented
with firewalls, intrusion detection systems, and other technologies.
This is the point at which other devices or networks can retrieve and access all data. This
comprises all of the devices connected to a specific network. It ensures that the system is
protected by both physical and digital security procedures, which are often implemented
with firewalls, intrusion detection systems, and other technologies.
This layer contains all of the security mechanisms necessary to protect the network from
unauthorized access. Restricted access is granted to the user so that if an attack occurs, it
does not affect the entire network and is limited to that network domain.
This layer prevents attackers from exploiting the endpoints (devices). Installing antivirus
software, for example, can safeguard mobile devices, desktops, and laptop computers.
This layer can be implemented on the network or in the cloud, depending on the needs of
the system. Endpoint encryption is the foundation of security at this layer, ensuring that
devices operate in a secure environment.
This layer implements security techniques to protect data transport and storage. Data loss
can be prevented by using backup security measures. For example, disk encryption and
two-factor authentication protect data transport and storage.
4
vii. Mission-critical assets
This is the most important data to secure (user credentials, personal and essential
information), thus all security measures are maintained and created around it. Users can
secure their data by creating frequent backups and recovery strategies.
i. Network Security
The goal of network security is to protect computer networks from unauthorized access,
misuse, and attacks. Firewalls, intrusion detection and prevention systems (IDS/IPS),
VPNs, and network segmentation are among the techniques used to protect against cyber
threats and assure the confidentiality, integrity, and availability of network resources.
Endpoint security tries to defend specific devices, such as desktops, laptops, smartphones,
and tablets, against cybersecurity attacks. It entails installing antivirus software, host-
based intrusion detection/prevention systems (HIDS/HIPS), and device encryption to
prevent malware infections, illegal access, and data breaches on end points.
Application security is concerned with the security of software programs and the
prevention of security vulnerabilities that attackers may exploit. Secure coding methods,
vulnerability assessments, penetration testing, and web application firewalls (WAFs) are
used to detect and remediate application security issues.
Cloud security is concerned with securing data, apps, and infrastructure hosted in cloud
environments against cyber attacks. Encryption, access controls, data loss prevention
(DLP), and security monitoring are among the safeguards used to maintain the security
and compliance of cloud-based resources.
5
v. Data Security
The goal of data security is to secure sensitive information from unauthorized access,
disclosure, alteration, and destruction. It uses encryption, access controls, data masking,
and data loss prevention (DLP) technologies to protect data at rest, in transit, and in use.
IAM focuses on managing user identities, permissions, and access privileges to ensure
that only authorized users have access to resources and data. It includes authentication
mechanisms, such as passwords, biometrics, and multi-factor authentication (MFA), as
well as access control policies and user provisioning/de-provisioning processes.
SecOps monitors, detects, and responds to security problems in real time to guard against
cyber threats. It combines security information and event management (SIEM), threat
intelligence, incident response planning, and security orchestration and automation to
improve the organization's security posture and resilience.
IoT security aims to protect connected devices, sensors, and systems in the Internet of
Things (IoT) ecosystem from cyber threats. It comprises methods such as device
authentication, encryption, firmware updates, and network segmentation to reduce the
security concerns associated with IoT deployments.
5. Cyber Threats
Cyber threats are harmful behaviors or strategies used to exploit weaknesses in digital
systems, networks, and data. These dangers offer major hazards to individuals,
organizations, and governments, resulting in financial losses, reputational damage, and
disruptions to essential infrastructure. Here are some typical cyber threats:
6
Fig 1.3 Cybersecurity Threats
i. Malware
ii. Phishing
iii. Ransomware
Ransomware is a type of software that encrypts files or locks computers, making them
inaccessible to users until a ransom is paid. Ransomware attacks frequently target
individuals, businesses, and organizations, demanding cryptocurrency in exchange for
decryption keys. Ransomware can be spread by phishing emails, malicious attachments,
or corrupted websites.
7
A DNS attack is a hostile attempt to disrupt the Domain Name System, which converts
domain names to IP addresses. These assaults, including DNS spoofing, amplification,
flooding, and tunneling, seek to alter or overwhelm DNS infrastructure for malicious
objectives. To prevent these threats, corporations use data integrity protections such as
DNSSEC, as well as firewalls and monitoring systems to detect and counteract malicious
behavior.
SQL injection is a form of online application attack that uses weaknesses in the database
layer to execute malicious SQL queries. SQL injection can be used by attackers to
overcome authentication systems, extract sensitive data, and change database entries.
i. Firewalls
A firewall is a sort of network security device that monitors and controls incoming and
outgoing network traffic in accordance with predetermined security rules. It acts as a
firewall between the internal and external networks, preventing unauthorized access.
Firewalls can be hardware-based, software-based, or a hybrid of both. They can prevent
hackers from gaining access to the internal network and are considered the first line of
defense against cyber threats.
ii. Encryption:
8
Encrypting text entails converting plain text into ciphertext, which can only be decrypted
using a secret key. Encryption protects sensitive data such as passwords, financial details,
and personal information. It is widely used for email communication, internet commerce,
and data storage. Depending on the level of protection required, encryption can be
conducted at the file, disk, or network level.
A virtual private network (VPN), or secure network, allows users to safely connect to the
internet or an internal network. It encrypts data transferred over the internet, preventing
hackers from intercepting and reading it. VPNs establish a secure connection between
remote employees, branch offices, or business partners and the organization's network.
They can also be used to access geo-restricted information or get around internet
censorship.
When employing the security feature known as two-factor authentication (2FA), users
must produce two distinct forms of identification to gain access to an account. A
password or PIN is typically used as the first authentication factor, followed by a security
token or mobile device as the second authentication factor. 2FA provides an extra degree
of security to prevent password-based attacks.
9
digital communications. Meanwhile, the Internet of Things (IoT) provides new attack
surfaces and vulnerabilities as linked devices with poor security safeguards proliferate.
Securing IoT devices and networks is critical for preventing unauthorized access and data
breaches. Overall, while emerging technologies provide tremendous opportunity for
innovation, companies must carefully assess their security implications and invest in
proactive steps to successfully manage growing cyber threats. To maintain cybersecurity
in the continuously changing digital ecosystem, stakeholders must work together, conduct
research and development, and implement best practices.
8. Future of Cybersecurity
Cybersecurity has been in existence since 1971, when the first computer virus was
created.
That was the "creeper" virus, an innocuous application that replicates and spreads from
computer to computer. Every day, "threat actors" build new malware in an attempt to
develop new tools for frequently evil goals.
Cybersecurity professionals try to stop them, with each investing to outperform the other
in a cat-and-mouse battle.
Over the decades, the sophistication of all sides in the game has improved.
"Cyberthreats have grown in scale and complexity; the attack surface - the breadth of
exposed targets that an attacker might go after - has become exponentially larger with the
birth of the Internet and now again with the birth of the Internet of Things," said Eric
Knapp, a chief engineer at Honeywell and cybersecurity expert. "Meanwhile, the tools
available to detect and prevent threats has likewise improved." Both sides use machine
learning and artificial intelligence to continue the cat-and-mouse game. Quantum
computing will come next, dramatically increasing the capabilities of both attackers and
defenders. So, while the cat and mouse will continue to improve and speed up, the overall
game will remain relatively unchanged.
10
throughout the years. As a result, it has proven very effective. The groups behind
ransomware campaigns have a clear financial benefit. Ransomware is now being
used in broader assault campaigns, in which adversaries acquire sensitive
information before encrypting a target's data, and they also try to hinder data
recovery procedures by preemptively targeting backup and recovery software.
That trend will continue.
11
access to email, social media, or any public network connections at all.
Increased automation
Technology to enable efficient cybersecurity duties. It is merely a result of scale.
Successful cyber will always come down to people - talented human minds acting
as either the cat or the mouse. However, there are far too many things to keep
track of, too many threat varieties (there are easily over a billion viruses now), too
many vectors, and too many targets. This must be simplified. We're already
utilizing machine learning and artificial intelligence to help make sense of all that
data before it's delivered to human security specialists.
Computers have limitations, which attackers are aware of. Hackers frequently use
diversionary tactics to load security analysts' screens with red herrings or false
occurrences. Even the best analysts, armed with the best tools, will inevitably
become overwhelmed. The cloud has greatly aided in this regard, improving
scalability and lowering costs (making it economically viable). Quantum
computing will also play an important role in sifting through complex
circumstances and detecting or predicting even the smallest evidence of a threat.
9. Conclusion
In conclusion, cybersecurity is a vital defense mechanism that includes numerous levels
of protection to defend our digital assets from a wide range of cyber attacks. This report
delves into the various aspects of cybersecurity, from network security to endpoint
security, emphasizing their importance in strengthening our defenses against hostile
activities including malware, phishing, ransomware, and DDoS attacks. By implementing
robust cybersecurity technologies and methods like firewalls, encryption, and security
awareness training, organizations may better secure their systems, networks, and data
from cyber threats.
12
regulatory frameworks to realize their full potential while also ensuring proper
cybersecurity measures are in place to minimize emerging dangers.
10. References
[1] “Introduction” Retrieved from:
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://sprinto.com/blog/importance-of-cyber-security/
https://www.educative.io/answers/what-are-the-seven-layers-of-cyber-security
https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/
https://www.mass.gov/info-details/know-the-types-of-cyber-threats
https://www.linkedin.com/pulse/5-essential-cyber-security-technologies-every-business-
shashank-surve
https://www.linkedin.com/pulse/what-impact-emerging-technologies-cyber-security-
optimum-origens
13
https://www.honeywell.com/us/en/news/2020/10/the-future-of-cybersecurity
14