Tuesday, May 26, 2020

Cyber Security And Security Of The Users - 1520 Words

Abstract Vehicular networking technology is no more a futuristic concept - it is becoming a reality with the aim of providing services related to traffic safety, traffic efficiency and infotainment [1]. When these kinds of services are introduced, they also bring in the vulnerabilities associated with them, resulting in increased number of security threats and attacks. Hence, it is very important to ensure that these services do not compromise the safety and security of the users [2]. This paper aims to provide a brief overview of cyber security in vehicular networks by analyzing its vulnerabilities, challenges and solutions. I. Introduction Vehicular networks consist of in-vehicle networks and vehicular ad hoc networks (VANETs). The in-vehicle network consists of several Electronic Control Units (ECUs) connected to each other using different communication protocols like Controller Area Network (CAN), Local Interconnect Network (LIN), etc. [3]. The in-vehicle network helps in implementing applications like climate control, engine management, transmission etc. VANETs include vehicle to vehicle (V2V) communication and vehicle to infrastructure (V2I) communication; the combination of which enables in making driving safer and better. Keeping the safety applications in mind, the National Highway Traffic Safety Administration (NHTSA) announced in 2014 that it will start crafting a new rule which would require cars to talk to each other [4]. While this is a major step in makingShow MoreRelatedCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreThe Threat Of Cyber Terrorism1093 Words   |  5 PagesSolution Q. No. 2 The possible threat posed by cyber terrorism has motivated considerable alarm. Many security experts have exposed the danger of cyber terrorists hacking into government and remote computer systems and service areas of progressive economies. The possible threat is, indeed, very disturbing. So far, despite all the gloomy pre-dictions, no single example of real cyber terrorism has been recorded. This increases the question: about the threat? Psychological, political, and economicRead MoreThe Plan Of An Insurance Policy1496 Words   |  6 PagesAs mentioned earlier, taking insurance policy is a way to help maintain the risk of cyber attacks at an acceptable level. The plan in figure 2.2 shows an insurance decision plan of action. This plan of action is crucial in illustrating how insurance can help in maintaining the risk. The first step taken in the plan of action is conducting a thorough audit of the current information on security risks, which can be conducted during the assessment of risk process in the framework, after, the companyRead MoreThe International Security Threat Report989 Words   |  4 PagesThe â€Å"International Security Threat Report† provides data on cybersecurity attacks and threats throughout 2012. The report shows that there was a 42% increase in targeted attacks (page 10). Although the types of attacks have been evolving, the number of people affected and the amount of damage has increas ed. Cyber attacks have evolved in such a way that allows them to be a large threat for citizens, businesses, and governments. Cyber attacks have been putting the privacy and information of citizensRead MoreThe Impact of Mobile Devices on Cyber Security1132 Words   |  5 PagesThe Impact of Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on themRead MoreCurrent cybersecurity policy issues for the protection of the Internet infrastructure1573 Words   |  7 Pagesby cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet fr om the End Users. INTRODUCTION From the year 2000 to 2010, the users’ onRead MoreThe Technology That Enhances Real Time Analysis1726 Words   |  7 Pagesthe threats of cyber-attacks. IPS is responsible for detecting intruders breaking into the network systems, or detecting misuse of network resources by authorized users. In addition, when a threat is detected, IPS performs an action in respond to the threat. In such incidents, IPS performs various actions to include sending an alarm to the administrator, stop the traffic coming from the source address, and/or resetting the connection.6 Another tool that consolidates the network security of a companyRead MoreTaking a Look at Cyber Crime680 Words   |  3 Pagescomputer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitatingRead MoreCyber Criminals And The Internet1461 Words   |  6 Pagestoday’s world class business works on the internet. But this benefit can be enjoyed only if the internet users adopt safe online practices. Cyber criminals are the one who use online resources to steal your personal information which tend to lose of money and reputation. Never think that the money just comes from corporations, banks or wealthy people around the world. Individual online users like you and me are also targets for them. As long as we are connected to the internet the chances ofRead MoreThe Vulnerabilities Of Passwords And Security Essay1473 Words   |  6 Pagesrequired. They are the primary defense against intrusion. However, they can be easily captured and deciphered by cyber criminals. The security in this area is challenging due to the ineffectiveness of the creation of passwords and pins. Kirushnaamoni (2013) elicits that making logging in straightforward and convenient for users and trying to prevent password cracking is problematic. Cyber criminals will continue to persist and target the vulnerabilities in this area. Therefore, personally, financial

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.