0% found this document useful (0 votes)
28 views5 pages

24 sharmilaRARTICLE1

The document provides an overview of cyber security, emphasizing its importance in the digital age due to the rise of cybercrime. It discusses various safety measures, techniques, and ethical considerations necessary to protect personal and organizational data from cyber threats. The article highlights the need for comprehensive strategies and training to combat cybercrime effectively.

Uploaded by

jmordecai230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views5 pages

24 sharmilaRARTICLE1

The document provides an overview of cyber security, emphasizing its importance in the digital age due to the rise of cybercrime. It discusses various safety measures, techniques, and ethical considerations necessary to protect personal and organizational data from cyber threats. The article highlights the need for comprehensive strategies and training to combat cybercrime effectively.

Uploaded by

jmordecai230
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

See discussions, stats, and author profiles for this publication at: [Link]

net/publication/373757247

OVERVIEW OF CYBER SECURITY AND ITS SAFETY MEASURES

Article in International Journal of Humanities & social Science studies (IJHSSS) · September 2023

CITATIONS READS
3 1,378

1 author:

Sabitha Kabilan
SRM Institute of Science and Technology
19 PUBLICATIONS 20 CITATIONS

SEE PROFILE

All content following this page was uploaded by Sabitha Kabilan on 10 November 2023.

The user has requested enhancement of the downloaded file.


ISSN 2319-829X 163
HUMANITIES AND SOCIAL SCIENCE STUDIES, VOL. 12 ISSUE (1) NO 20 JANUARY – JUNE : 2023 163

OVERVIEW OF CYBER SECURITY AND ITS


SAFETY MEASURES
Sharmila R, Research Scholar, SRM Institute of Science and Technology, Ramapuram, Chennai - 89
sr8766@[Link]
Dr. J. Sabitha, Assistant Professor, SRM Institute of Science and Technology, Ramapuram, Chennai - 89,
sabithaj@[Link]

ABSTRACT
In the world of information technology, cyber security is crucial. Cybersecurity has emerged as the most
pressing issue in recent years, one that is essential in the digital age when cybercrime is on the rise. Stopping
cybercrime is the main goal of cybersecurity. Cybersecurity is essential, and we must be aware of all the safety
precautions needed to thwart cybercrime. This essay provides comprehensive information about cyber security
and its protective measures. Additionally, we’ll talk about the associated activities, how cybercrime truly occurs,
and all the measures taken by the government and numerous organisations to enforce cyber ethics everywhere.
Cybersecurity offers defence against cybercrime and teaches us the fundamental safety precautions that must
be taken to prevent any cybercrime. Information security online is a top priority whenever technology is used.

INTRODUCTION
Today, a person can send and receive any type of data via email, audio, or video with the simple
press of a button, but has he ever considered how securely his data is being delivered to the other person
without any information being leaked? Cybersecurity holds the solution. The infrastructure of modern
living that is rising the fastest is the internet. Many of the most recent technologies are altering the face
of humanity in today’s technological environment. However, because of this new technology, we are
unable to effectively protect our private information, which is why cybercrime is on the rise right now.
Today, more than 60% of all commercial transactions are conducted online; therefore, this industry
needs a high level of security for the most reliable and transparent transactions. The scope of cyber
security extends beyond only protecting data in the IT business to a number of other areas, such as
cyberspace. The newest technologies, including cloud computing, mobile computing, net banking, and
e-commerce, all require a high level of security.
The security of these technologies has become essential because they include crucial information about
a person. To ensure each country’s security and economic prosperity, crucial information infrastructure
must be protected and enhanced. The growth of new services and governmental policy now depend
on making the Internet safer (and protecting Internet users). A thorough and safer strategy is required
to combat cybercrime. Given that technology solutions cannot, by themselves, prevent every crime, it
is essential to give law enforcement agencies the resources they need to successfully investigate and
prosecute cybercrime. To prevent the loss of any crucial data, many countries and governments today
have strong rules governing cyber security. Every person needs to receive training in cyber security
to protect themselves from the rising number of cyber [Link] cyber security, computers are
protected from all damages caused by viruses, bacteria, internet bugs, etc. Additionally, it defends against
any cybercrime in which hackers are unable to access networks. It enables high-level computer security
protection. Cybersecurity safeguards private information, the reliability and availability of computer
systems, and system resource data.
ISSN 2319-829X
HUMANITIES AND SOCIAL SCIENCE STUDIES, VOL. 12 ISSUE (1) NO 20 JANUARY – JUNE : 2023 164

CYBER CRIME
Any illicit action that uses a computer as its main tool for commission and theft is referred to as
cybercrime. The concept of “cybercrime” as used by the U.S. Department of Justice has been broadened to
include any criminal action that keeps evidence on a computer. The growing list of cybercrimes includes
offences made possible by computers, like network intrusions and the spread of computer viruses, as
well as computer-based variations of already-committed offences like identity theft, stalking, bullying,
and terrorism, which have become major problems for individuals and nations. Cybercrime is typically
understood to be any crime that is carried out using a computer and the internet to steal. a person’s identity,
sell illegal goods, stalk people, or sabotage operations with evil software. The importance of technology in
people’s lives is increasing day by day, and as a result, so will the number of cybercrimes.

TREND OF CYBER SECURITY


To make it simple for people to visit and enter their personal information while giving them easy
access to track every detail, cybercriminals develop phoney servers that seem exactly like the real ones
while containing malicious malware. Web server security must receive more attention in cyber security
so that consumers cannot be drawn into it and remain safe. When conducting any transaction, always
double-check and thoroughly investigate the server
i) Cloud and its services: Nowadays, everyone prefers to save their data in the cloud. This most
recent service is a difficulty for cyber security because it needs a lot of access and applications to
safeguard crucial information. Hackers are skilled in all methods of entry.
ii) Mobile networks: Everyone needs a mobile device. Everybody has a smartphone in their hand,
and its owner performs practically all activities on it. The widespread use of social media, banking,
photographs, videos, WhatsApp chat, and other services raises serious concerns about cyber security.
Nowadays, people use a variety of devices, including smartphones, tablets, and iPads, all of which
demand a high level of security with two-factor authentication. As a result, firewalls and cyber security
are becoming more permeable. Mobile devices are particularly vulnerable to cybercrime, so users should
download the most recent software and applications to safeguard themselves.
iii) Encrypted Code: The process of encrypting communications such that only users or programmers
can read them and hackers are unable to decipher the code since they are unaware of it. Code encryption is
therefore a necessity for any system or network. Each user is required to learn how to encrypt messages and
safeguard their data. Every level of encryption is crucial for maintaining the integrity and privacy of data. But
the biggest problem for cyber security is the use of encryption. In addition to protecting personal information
on computers and mobile devices, encrypted code also helps to protect information on all online networks.
iv) web hosts: Web application attacks that aim to extract data or disseminate harmful code continue to
pose a hazard. Through genuine web servers they have infiltrated, cybercriminals disseminate their malicious
code. However, assaults that steal data pose a significant threat as well and are frequently covered by the
media. We now need to put more focus on safeguarding web servers and web applications. Particularly
effective platforms for these cybercriminals to steal data are web servers. In order to avoid becoming a victim
of these scams, one must constantly use a safer browser, especially during critical transactions.

CYBER SECURITY TECHNIQUES


Access restriction and password protection: User names and passwords have always been a key
component of information security. This can be one of the initial cyber security measures.
Data authentication: Before downloading, the papers we get must always be validated, meaning
they must be reviewed to see if they came from a trustworthy source and that they haven’t been altered.
ISSN 2319-829X 165
HUMANITIES AND SOCIAL SCIENCE STUDIES, VOL. 12 ISSUE (1) NO 20 JANUARY – JUNE : 2023 165

Malware detectors: This software typically checks all of the system’s files and documents for
hazardous viruses or malicious code. Malicious software is generally referred to as malware and includes
items like viruses, worms, and Trojan horses.
Firewalls: A firewall is a piece of hardware or software that prevents hackers, viruses, and worms
from accessing your computer through the Internet. The firewall that is in place examines each message as
it enters or leaves the internet, blocking those that do not adhere to the established security requirements.
Consequently, firewalls are crucial in the detection of malware.
antivirus programmes: A computer programme known as antivirus software works to identify,
stop, and take action against dangerous software programmes like viruses and worms. The majority of
antivirus programmes have an auto-update capability that enables the programme to download profiles
of fresh viruses so that it can scan for them as soon as they are found. An anti virus software is a must
and basic necessity for every system.

CYBER ETHICS
The internet’s code is known as cyber ethics. Everyone must adhere to cyberethics, which are crucial.
If everyone takes this role seriously, cybercrime will decrease. There is a good possibility that we will
use the internet in a proper and safe manner if we put these cyber ethics into practise. Several of them
are listed below:
Don’t be afraid to interact and communicate with others online. It’s simple to remain in touch with
friends and family, talk to coworkers, and share ideas and information with people nearby or halfway
around the world thanks to email and instant messaging.
Avoid being a bully online. Don’t hurt someone by calling them names, making up stories about
them, sending embarrassing images of them, or doing anything else.
Never steal or hack someone else’s content; this is considered plagiarism.
Respect copyright laws and never download software or materials that include the information of
others. Always use free online or software-based data.
It is always important to use information in a correct and legal manner because the internet is
regarded as the world’s largest library and has information on every topic in any subject area.
Never use someone else’s password to access their accounts.
Never attempt to corrupt someone else’s computers by sending malware to them.
Never give out your personal information to anyone since there’s a possibility that someone will
misuse it and get you into trouble.
Never try to impersonate someone else online or build a phoney account on them since doing so
could get you and the other person into trouble.
SAFETY MEASURES OF CYBERSECURITY
Basic precautions must be taken by everyone who use internet and online transactions and work:
Internet Security Suite: To safeguard and secure their information from malware, one can utilise a
variety of anti-malware programmes that are available for purchase both online and offline.
Strong Password: One should frequently use strong, new passwords. When using public or shared
computers or laptops, it is very important to change your password periodically by using a combination
of letters, numbers, and unusual characters.
Regular Software Updates: As criminals use known exploits and holes to get access to systems, it is
crucial for OS and internet security to update regular software in order to prevent any type of cybercrime.
Control social media settings: It’s crucial to protect sensitive information at all times. Social
networking information is monitored by cybercriminals, so it must be protected and passwords changed
ISSN 2319-829X
HUMANITIES AND SOCIAL SCIENCE STUDIES, VOL. 12 ISSUE (1) NO 20 JANUARY – JUNE : 2023 166

frequently. Share as little information as possible on social media to prevent people from figuring out
the answers to security questions.
Strengthen Your Home Network: Your home network needs a virtual private network and a
strong encrypted password. A VPN, or virtual private network, enables you to establish a secure online
connection with another network. You can connect to public networks more safely thanks to it. Using a
VPN on both a public and private network to safeguard everything is a brilliant idea.
Protect Your Personal Computer: You may accomplish this by turning on your firewall, running anti-virus
and malware protection, and periodically upgrading and updating your software to thwart spyware attacks.
Secure Mobile Devices: Applications must be downloaded from reputable sources, mobile devices
must be kept up-to-date, and they must be password protected with two-factor authentication.
Install the most recent operating system: To guard against potential assaults on out-of-date
software, Windows, Mac, and Linux must all use the most recent operating systems.

CONCLUSION
One of the most prevalent crimes today is cybercrime. Hackers and thieves are like those who sit online
and observe all the information. Cases involving the surveillance of personal information and internet
banking are frequent and on the rise. We may see daily cybercrime using data such as OTP calls, online
money transfers, personal information data, etc. These crimes, such as disclosing information about their
work, projects, plans, infrastructure, etc., even affect organisations. Cybercrimes cannot be completely
eliminated, but we can try our best by accessing networks and doing online work in a secure manner.
Cybersecurity employs all possible precautions for all networks, programmes, software, and data in order
to prevent cybercrime. To safeguard and provide assurance, integrity, and availability of information and
data online, networks must be protected and prevented from purposeful and inadvertent intrusion.

REFERENCES
[1] S
. B. N. Godbole. Cyber Security: Understanding Cyber Crimes [Link] cyber-
security
[2] I nternational Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 Page nos.68 – 71
ISSN 2229-5518, “Study of Cloud Computing in HealthCare Industry “ by [Link] Reddy, [Link] Reddy
[3] R
achna Buch, Dhatri Ganda, Pooja Kalola, NiraliBorad, World of Cyber Security and Cybercrime. Recent Trends
in Programming Languages .ISSN: 2455-1821 (Online) Volume 4, Issue 2
[4] M
.S. Mohsienuddin, Cloud Computing in IT and How It’s Going to Help United States Specifically (October 4,
2019). International Journal of Computer Trends and Technology (IJCTT) – Volume 67 Issue 10 - October 2019.
Available at SSRN: [Link]
[5] [Link]
[6] R
.R. Nadikattu, New Ways of Implementing Cyber Security to Help in Protecting America (May 14, 2020).
Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at
[7] SSRN: [Link]
[8] M
. Lakshmi Prasanthi. Cyber Crime: Prevention & Detection International Journal of Advanced Research in
Computer and Communication Engineering Vol. 4, Issue 3, March 2015
[9] R
. Hewett, S. Rudrapattana, P. Kijsanayoth. Cyber-security analysis of smart SCADA systems with game models.
Proceedings of the 9th annual cyber and information security research conference, ACM, 2014, pp. 109–112.

View publication stats

You might also like