The research question of this proposal is: what are the possible interventi ons that can be. implemented in many organizations to prevent their data, networks, and s ystems from cyber-. attack Estimated Reading Time: 4 mins Information Security Risk Management. Discussion As observed at the 4th International Conference on Global e-Security in London in June ‚ Information Security Risk Management (ISRM) is a major concern of organizations blogger.comgh the number of existing ISRM methodologies is enormous‚ in practice a lot of resources are invested by organizations in creating new ISRM methodologies Missing: network security Research Proposal For Phd In Network Security It includes worms, Trojans and viruses Cyber Sec urity Products and researches, Therefore, most of the organizations use Cyber risk assessment as a step to identify how exposed they are to the cyber attack
Research Proposal Network Security – Share this
edu no longer supports Internet Explorer. To browse Academia. edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser. Log in with Facebook Log in with Google. Remember me on this computer.
Enter the email address you signed up with and we'll email you a reset link. Need an account? Click here to sign up. Download Free PDF. Cyber Crime Research Proposal. Effiong Effiong, research proposal network security.
Download Download PDF Full PDF Package Download Full PDF Package This Paper. A short summary of this paper. Download Download PDF. Download Full PDF Package. Translate PDF. Cyber-Crime Control, Prevention and Investigation A PhD Research Proposal Submitted to Cranfield University College of Management and Technology Defence Academy of the United Kingdom Shrivenham SN6 8LA United Kingdom On July 31st, By Engr. Effiong Ndarake Effiong, CEng, MBCS, CITP, research proposal network security, CEH, CHFI, MCSE, CCNA, MCTS, NCLA, DCTS, MIAM, B.
Preamble: Over dependent of Governments and Businesses in technology give birth to the rising wave of cybercrime. Cyber terrorism is also on the increase. In the near future, wars between nations will be shifted from the physical combat to cyber space. Cyber wars will be valuable tools in the hands of the enemies against world powers; cybercrime will also be a million dollar business.
In the light of this, we will need clear and concise techniques in fighting cybercrime thereby reducing it to the barest minimum. This crime can be difficult to control or prevent as the attackers are often times faceless, the attacker can be your next door neighbor or a person in a different geographical location or continent.
This type of crime can be targeted toward Government, Agencies, Ministries, and Businesses irrespective of size and even individuals. The skills required of an attacker is dropping by the day as there are freely available and downloadable tools on the internet that even script kiddies can download and run against any vulnerable target without understanding what the tools does. Attacks techniques are also getting sophisticated as more and more tools are out there that try to make the attacked extremely difficult if not impossible to detect.
With this, it is therefore my desire to research into ways of controlling, preventing and investigating where possible the cybercrime activities of the cyber space, thereby making our cyberspace maximally secured since there cannot be total security. By so doing it will boost our economic gains from the cyber space, research proposal network security.
The procurement and retention of highly skill cybercrime expert by Government and Business Enterprises cannot be overemphasized. This will ensure compliance with international acceptable standard of usage of computer and other technological devices in the work places. Although prevention as they say is better than cure, irrespective of the deterrent measures to prevent and or control cybercrime, there may still be breaches, where this occur, Forensics Experts will be called in to conduct a sound digital forensic investigations, analysis, documentation and reconstruction of the crime scene and present the evidence of the findings to Engr.
Digital Asset need to research proposal network security protected to guaranteed it Confidentiality, research proposal network security, Integrity and Availability CIA triad. Information stored in Human brain, electronic devices physical media and those on transit needs to be protected. Hence the urge for this research topic. This research will therefore be broken down into three major categories namely: 1. Cyber-Crime Control CCC 2.
Cyber-Crime Prevention CCP 3. Cyber-Crime Investigation CCI Cyber-Crime Control CCC : This will deal with the formation of adequate policies to control cybercrime activities.
The policies should also spell out appropriate punishment for cyber criminals if convicted by appropriate court of competent jurisdiction, this will be a deterrent research proposal network security to other who may want to engage in the act. Cyber Crime Prevention CCP : In this section, I will be focusing here on the training of both users and administrators of the cyber space, best practices, security awareness etc. to prevent cyber incidents, however, the underground hacking techniques will be taught to security administrators and managers.
Hackers mind set will also be a focus, the tools and techniques of the hackers will be exposed and the various ways of preventing and detecting cybercrime activities will be the core of research proposal network security training to be evangelized here.
Bearing in mind that users are the weakest security link. Tools that will help in this will be both commercial and open source tools which will include but not limited to: Core Impact Pro, Immunity canvas, research proposal network security, Metasploit pro and framework, BackTrack 5r3 research proposal network security Kali- Linux, email tracker pro, Saint, Cain and Abel, Nmap, Nessus, NetCat, GFI Languard, Retina, etc.
the list is endless, the good thing is that majority of them are free and open source. Cyber Crime Investigation CCI : Since there is no such thing as total security and an unbreakable system, I have to assume that at one point or the other, the system can be broken into irrespective of the controls and prevention. However, should this happen. The issue of investigations set in, unraveling the mysteries behind the attack, tracing the hacker through the cyber space.
This is a very interesting module as Engr. From identification, collection, preservation analysis, documentation and presentation of facts of cybercrime investigation will be a treated. Here I will also research proposal network security into Victimology: Victimology is the study research proposal network security victims of crime and the psychological effects on them.
Neglecting to follow cyber trails may not only risk losing valuable evidence, may also undermine professional competence for negligence. Tools that will be used here will include but not limited to the following Encase, Access Data FTK, Imager, Registry viewer and password recovery toolkit, DNA, all Access Data tools can be gotten from a single package called Access Data Ultimate Toolkit, ProDiscover, X-ways forensic, Sleuth kit, Autopsy, Raptor, SMART, Passware Kit, Simple carver, Data Lifter, Hardware write blocker and Duplicators, etc.
AIMS AND OBJECTIVE: As cybercrime incidents are on the increase, and it menace is affecting both Government organizations, Individuals and businesses, the main aim of this research will be to find out the truth which about cybercrime that is hidden and which has not been discovered as yet as it relate to the rate of increase, the sophistication of attack, motivation of the cybercriminals and ultimately find a way of reducing cybercrime activities and it effect on businesses to the barest minimum.
Where prevention and control is not totally possible, the research will focus on deterrent measures like recommending maximum and appropriate punishment for offenders.
In this regard, the research will review the existing law and suggest amendments where necessary, develop a detail and acceptable measures of tracking the research proposal network security criminals tracing the hacker to the cyber space.
Cyber Forensic techniques are the deal here. The research will be both descriptive and exploratory or formulative in nature.
Our Assets, Network Infrastructure, Availability Network Resources, Confidential Personal Data can be classified into three categories. Information stored electronically or on transit in the network digital ii. Information stored physically hard copies iii. Information in human brain. There may be more to it that need to be researched into, all these and many more need maximum protection. Why are intrusions so often successful?
There is need for us to know why we often fall for these cybercrime activities, issues concerning our cybercrime detection, response, research proposal network security, and escalation process needs to be reviewed, policies where applicable needs to be thoroughly looked into, sometimes, there may be no procedures for proactive auditing, or event management, focus have been may have been shifted to reactive measures to detect what happen which are often not successful.
What are the greatest challenges that we face today? Environment complexity, new technologies, new threats and exploits, limited focus on security, limited budget for security, research proposal network security, shortage of qualified security experts. There is no doubt that what some mobile devices like smart phones and others can do today, some desktop and even servers computers of the early day were not able to do, research proposal network security.
There must be a perfect trade off and an acceptable level of compromise between the security, functionality and ease of use.
Why are most attacks gone undetected? This research will dig deep into why attacks often gone undetected, again focus will also be on detection, response, escalation and monitoring mechanism. Research proposal network security are attackers not getting appropriate jail terms? Sometimes even when intrusion is detected the offenders are either not being detected or there is no enough evidence to convince the jury to convict a cybercriminal. Where there is evidence, the get light sentence.
There is research proposal network security international law that operates everywhere. Whereas cybercrime is a global crime, there should be no geographical boundaries in implementing cyber laws as the entire cyber space should be regarded as a single research proposal network security for a single jurisdiction.
The research will see what is obtainable, desirable and applicable. What are the motivations for the research proposal network security The attacker must be willing to take certain amount of risk for the attack to be successful, this we must find out.
How can we tired the loose ends and make our cyber space more secure that it is currently? This very question will lead us to the aim of this result, making sure that our cyber space is secured, and to ensure that offenders are punished accordingly.
The United Kingdom Legislation and the United States Legislations will be our main focus, Other laws like The Securely Protect Yourself Against Cyber Trespass SPY ACT, the U. Direct Observation: we will collect data by observing the environment and users alike without actually interviewing them. Organize seminar and conferences inviting some of the season ethical hackers, penetration testers, computer forensics investigators, legal luminaries and policy makers in the industry, there will share ideas and answers questions, valuable datas will be collected by this method.
Online chatting with the underground community, discussions and posting of questions in the forums, research proposal network security, creating a virtual scenarios and asking for help will be immensely valuable. Setup a research Honeypot to attack attackers to attacked the box and we can learn more about their attacking techniques and various research proposal network security they took in compromising a system.
Survey and questionnaires, taking surveys online and sending the links to the survey to security professionals will be adopted. It therefore implies that there will be website specifically design for this research survey.
Through personal interview: I will conduct a personal interview to some selected corporation and agencies with a set of predefine questions that will help in answering the questions and providing the solution to the problems of cybercrime.
Persons who maybe Engr. By mailing the questionnaires. I will mail out the questionnaires where necessary to identified personalities who may not be rich physically or through phone. A mailing list of selected person will be compiled prior to the time of collecting data and will be used accordingly. Excursion to Computer crime lab, interaction and interview with the computer forensics examiners.
At least two of such labs would be visited, examples of proposed labs to be visited include but not limited to Federal Bureau of Investigations FBI computer crime lab, MI5, Scotland Yard, or London Metropolitan Police Crime lab will be a valuable source of data collection.
Attending court proceedings where cybercrime cases are tried and judgments of cybercrime related cases delivered will be a source of evidence collection and will help in understanding of what the judges how such cases are tried, understanding of the applicable law and what is necessary to convict a cybercriminal with digital evidence.
Depending on the financial resources available and the time frame to complete the task, a few options from above will be taken, I will prefer that most if not all of the defines methods be taken will respondent from across the globe and from small, medium to large enterprises. Data collected will be systematically and logically analysis, where possible I may come up with hypothesis for further testing, proof or disproof existing hypothesis as the case may be.
How To Write A Strong Research Proposal - Thesis or Dissertation
, time: 11:00Research Proposal Network Security : Research Proposal On Network Security Paper
Information Security Risk Management. Discussion As observed at the 4th International Conference on Global e-Security in London in June ‚ Information Security Risk Management (ISRM) is a major concern of organizations blogger.comgh the number of existing ISRM methodologies is enormous‚ in practice a lot of resources are invested by organizations in creating new ISRM methodologies Missing: network security Research Proposal For Phd In Network Security The procurement and retention of highly skill cybercrime expert by Government and Business Enterprises cannot be overemphasized. This network ensure compliance with international acceptable standard of usage of computer and network technological devices in the work places Research Proposal Network Security - Research Proposal. With NSF security, researchers from Iowa State have been applying this method to attacks on our electric power infrastructure. Social media analysis Social media communications can yield enormous amounts of data about communities — including hackers and cybercriminals
No comments:
Post a Comment