Expertsminds.com is right choice as your study partner for Cyber Security Assignment & Solution at your door step.

Home   Course  
Previous << || >> Next

Cyber Security Assignment help

Save your higher grade with acquiring Cyber Security Assignment help solution & quality homework writing services of Expertsminds.com

Project Summary

The project has discussed Cyber Security and its importance. Cyber Security can be defined as a process which helps to secure the network system, device, programs, data. The effectiveness of Cybersecurity can help to process social sites and important data securely by decreasing the cyber-attacks. Nowadays people mostly use social sites such as Facebook, Twitter, Instagram and this can be a major reason for the cyber-attack as these provide detailed information about a person. It has been seen that in recent years the cybercrimes have increased rapidly and it can affect the government, people, organization, thus cyber-security can be included as an utmost process to reduce it.

Objectives

- Cyber Security plays a key role in protecting the important data of the individual.
- Cyber-security provides a legal framework to reduce cybercrimes.

Method

Employees involved in cybersecurity department have to be alerted about the recent cybercrimes and has to process the function according to the influenced cybercrimes. Influenced technological system can also be included as an effective method to protect the cybercrimes and it can also be included as an effective factor to reduce the risks of cybercrimes.

Outcomes

Cyber Security can be assessed as an important process to develop the data security process of various organizations and individuals. It can also be assessed as the risk management process to protect the various social sites used by each and every individual.

Data need to be collected

The cybersecurity process can be influenced by collecting updated data related to cyber threats. The process can also be impacted as another major component of cybersecurity. The process can help to inspire the cybersecurity by providing the specific procedures and the roles of the department.

How data will be processed

People who involved in cybersecurity department has to be alert about cybercrimes and also they need to gather information about cyber threats. The employees involved in cybersecurity department can help to decrease the cybercrime by following this process. The process can also be impacted as another major component of cybersecurity (Walser, 2018). The process can help to inspire the cybersecurity by providing the specific procedures and the roles of the department.

Ethics Principles

1. Minimize the risk of harm

Possible harms

Cybercrime can be a big reason for identity theft as people have to add various personal detail in various social sites. Nowadays payment mostly is done online and it can be a big issue of cybercrimes. The hacker can also steal various accounting statement of an individual or any organization. This can be a way of suffering the financial loss for an individual as well as the organization. Thus it can affect in the organizational infrastructure and lead the organizational value through downwards. The scammers may send false mail, pretending that came from any financial office and requested to provide the personal data. Thus any individual has given the personal data, it can help the scammers to assess the financial details and lead the scammer to destroy the rate of accountability (Sadeghi, Wachsmann & Waidner, 2015). Cybercrime can also affect the business in both big and small organization. The scammers can take help from the organization's employees to collect various important data of the organization and thus the hacker can steal the personal details of the organization and lead the organization to down flow.

Mitigation of harm

Employees involved in cybersecurity department have to be trained properly to assess the cybersecurity process appropriately. The enhancement of technology may help to mitigate the cybercrimes and also helps to process the cybersecurity effectively. It can an effective process to measure vast cybersecurity and it has been used to secure the vast details of various organizations. Process of the specified cyber security also plays a key role in protecting the personal details and helps to reduce the risk factors of cybercrimes. The process has to describe the significant roles and procedures to regulate cybersecurity (Ponsard, Dallons & Massonet, 2016). The process also needs to be checked on a regular basis to assess the updated information on cyber threats. The employees in cybersecurity department also need to pay attention to update the recent information of cyber-attacks and have to be aware to reduce the risk factors of cybercrimes.

Obtain informed consent

- Project brief

The threats in the field of cyber security are ever growing with every passing moment the main motive of the research is to educate people with the threats of the cyber world, which ironically are very real unlike the existence of the virtual world. Obtaining effective resources are difficult as the field itself is precisely new and is growing in complexity with every new implementation possible. As an example we can say that now a day every car contains a tracking circuit which can be taken command of and actually used to completely shut down a car whereas such implication was just a word of the tales, few years back. In this spontaneously changing world, the virtual world or the cyber grid plays a huge role thus understand the current limitation and formulating ways to overcome such limitation are an integral part of growing forward. The project rather the research aims at providing the knowledge to the participants about the cyber world so they can acknowledge the potential risks. The world as it is right now faces multiple threats and the cyber world is no exception to it, the treats related to the cyber world are as real as the threats of the physical world we reside in. the world we live in today heavily depends on the cyber world for functioning thus building up the urgency of innovating new ideas to enhance the security structure of the cyber world. The research thus follows a mixed approach for understanding the needs in a much more intricate level.

What will be the participant asked to do?

The participants for the research would be asked to perform few general tasks that would help them to know if there are prone to any cyber security threat and then after the assessment of their current standings into the scenario they would be provided with the counter measures to such threats. Performing generic tasks from the participants' view would help the researcher tap into the possible loopholes into the participants' approach towards the threats of the cyber grid. Primarily the participants would be presented a number of multiple choice question and their responses would be recorded, anonymously, for data analysis.

What will the participant gain from participating?

The participants will implicitly gain an experience and the knowledge to protect themselves from security threats from the cyber world. There are many a loopholes in the cyber world utilizing which one can be exploited and thus this research aims at providing the minimum ideas to people which when implemented, it can save them from such cyber security threats. Primarily, the participants would gain an experience for identifying the cyber security threats and would let the participants uncover the real magnitude of the threats they are prone to without knowledge. Once the individual, here the participant, would have enough or the primary knowledge of the environment they are a part of they would have a keen eye towards identifying any possible cyber threat that might be target their way (Steinbart, Raschke, Gal, & Dilla, 2018).

How will the information I give be used?

The information provided to the participants would help in upbringing the basic understanding into the dos and the don'ts regarding the threats of cyber grid. The information provided would be conveyed through the help of audio visuals thus aiding into the cause, as audio visual interactive sessions are always more efficient than a monotonic discussion. By doing so, the participants can efficiently acknowledge the threats to the cyber world and will know how to tackle them. Some preliminary steps to fight cyber demons would be illustrated in person, thus providing the participants a better idea of the whole implication of counter measures to such risks.

What are the potential risks of participating in this project?

We would aim to risk no instance of the project as it would simply be an irony as the main aim of the research is to acknowledge the risks of cyber security and if any instance or data be compromised, that would be reprehensible. The two main concerns in such kind of researches are the approaches followed solely depend on the intractability of the participants and thus the collected data at times can often be unreliable. This in turn can cause anarchy while analysis of the data as the expected results are not met and thus the results become obsolete. Other than this the main concern from the participants are often seen as the concern of the participants' confidentiality. If the confidentiality standards are not met then the identity of the participants reflect to the opinions they would present while the research or the study and thus the participant may often subject themselves to collective opinion, which causes a loss of data integrity (Pan et al., 2017).

How will this project be conducted?

The project would be conducted in multiple steps. The first step of the whole project is to get an approval from the authorities and then providing the necessary insight about the project and the aim to the possible participants. This would help the participants feel much more secure while participating in the project thus they won't be open to influence or any collective opinion which would simply result into a discrete data being produced. Once the time schedule and the participants are decided, the projects are to be carried out so in data can be recoded and be processed for further analysis. While conducting the project the information as mentioned would be provided for the better understanding and iteration from the participants. The success of the project can only be decided once the whole study has been carried out.

Who is conducting the study?

The study is being conducted by Dr Amir Ghapanchi.

18 year old

As per the consent which has already been decided, the minimum age cap required for a participant to be a part of the research will be set to 18 years. As it has been observed that any research study conducted with the use of the participants, under the age of 18, has been inconsistent. The reason mainly due to the fact that until the age legal age of 18, individuals tend to have immature sense of opinions thus creating conflicting results (Leszczyna, 2018). For a research being conducted of such calibre, inconstancy in data is unprecedented thus keeping the minimum standards to 18 years of individuals, this maintaining the minimum standards of maturity.

Risk being fully explained

The participants are invited to take part in the research project entitled "Cyber Security". This project is being conducted by Dr Amir Ghapanchi, Professor Yuan Miao and Dr Alasdair McAndrew from College of Engineering and Science at Victoria University. As per the information we have been subjected to and we have observed, there are no plausible risks towards the participants. The general tasks and the questioner that would be provided to the participants for the project would be kept confidential at any cost and thus would ensure all sense of confidentiality, thus the interested participants are invited to take part in the project and provide their valuable opinions onto the matter of concern.

Given opportunity to withdraw at any phase

The participants who would like to take part in the mentioned project do have the right to withdraw themselves off the project at any moment of time spectrum. This is to further imply that any participant may feel free to withdraw themselves from the research at will, they may not participate any further if they have any concerns regarding any possible risks to themselves.

Given opportunity to ask any question

The participants will be provided with open opportunities to clarify any queries or any questions, if any, with the researchers. Any queries or questions would be directed to the researchers and would be properly addressed. Before or during the commencement of the project, the participants would be provided with equal opportunities to help themselves with any queries.

Information will be kept confidentially

This to inform the participants of the research that every details regarding the participants' identity as well as all the recorded responses and individual opinions kept forward would be implicitly kept anonymous, respecting the person's confidential rights (Khan, & Al-Yasiri, 2018).

- Protect the anonymity and confidentiality

How will data be de-identified?

While conducting such a research, confidentiality of the participants matters the most thus here comes the implication of de-identification of the data. Putting it in simple terms de-identification generally mean to de-classify and break all possible links where the data collected cannot identify the source of the data (Elnagdy, Qiu & Gai, 2016). The process being a very intricate one, has very intelligent use, this in turn helps in maintain integrity of the data and thus supports such possible researches for the future. The process followed for de-identifying data to data sources for the research is simple, yet effective. The process followed would be a manual process where the participants would be provided with a questioner with so identifiable serial numbers, just the question with multiple choices to answer. And the rule to be imposed would be, that every participant who completes the questioners would drop in their response papers into a drop box. The data thus collected would be manually done and the manual data would be automated into the database with the help of a dedicated team of professionals. This process would ensure de-identification of the data collected (Heitzenrater & Simpson, 2016).

How will data be kept?

The data collected as mentioned, would be first collected in a manual format to ensure a detailed level of confidentiality. Once collected the data in a manual format, the data would be transformed into a digital format for ease of use as it is easier to perform data analysis on digital data rather than on manual data. The data conversion from analogue to digital would be performed with the help of dome dedicated team of individuals. Once the data has been transformed into the digital format it would be kept in a protected database cloud (Alguliyev, Imamverdiyev, & Sukhostat, 2018). The protection would be entitled using the latest technologies so the risk of data compromising would be at its least or at best possible scenario, negligible.

Who will access the data?

The data collected would be exclusively kept confidential and could only be used by officials related to the project and the analysts of the project data. The team related to the processing of the project would have limited access to the data however, the researchers or the team of researchers would have no limitations to the data. The data being kept in a database, the DBA (database administrator) would have full control of the data but with limited authorization.

How will results be published?

The data collected and analysed would be ready for being published, thus this would need an efficient way for publishing the data without any compromise. The data being published would preferably published through the use of an official email to the participant's individual email addresses, keeping all the data anonymous. The email would address every participant in a generic format and thus not addressing anyone precisely. However, if the participant has not provided with any email address, then the person would be provided the results through the help of a notice.

Include deception of participants?

Yes, through the research we had an intricate understanding of the current scenarios, for what can actually happen to any individual if the person is not savvy enough with the cyber world. We had met participants who could abruptly share their cyber horror story where the individual's identity was compromised just due to the fact that the person forgot to logout of their account off from a friend's computer. Eventually their id and the password was compromised, which led to a massacre of their personal stance into their social life. This was just a simple enough example of cybercrime, but the research came across cases where the details of the loss of cyber security were itself horrific.

Provide the right to withdraw

The participants who would like to take part in the mentioned project do have the right to withdraw themselves off the project at any moment of time spectrum. This is to further imply that any participant may feel free to withdraw themselves from the research at will, they may not participate any further if they have any concerns regarding any possible risks to themselves.

Conclusion

Therefore, it is safe to be concluded that Cyber threats are one of the vital part in any Internet operation. Thus following ethic principles will lead to a more effective solution to cyber world. Confidentiality and privacy of participants need to be encountered while implementing the project. Study shows that the program conducted on age group of 18 years and over participants to acknowledge the ethical principles. Hence, the participants will learn the impact of cyber threats and the process to mitigate the risks.

Expertsminds.com accepts instant and short deadlines order for Cyber Security Assignment help solution assignment – order today for excellence!

Tag This :- EM191102AVN0611CYBERS Cyber Security Assignment help

get assignment Quote

Assignment Samples

Get Academic Excellence with Best Skilled Tutor! Order Assignment Now! Submit Assignment