Cyber- security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This work provides an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It looks at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The aim of this work is to name some challenges of cybercrime and present practical and logical solutions to these threats.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- AIM OF THE PROJECT
- PURPOSE OF THE PROJECT
- BENEFIT OF CYBER SECURITY
- SIGNIFICANCE OF THE STUDY
CHAPTER TWO
2.0 LITERATURE REVIEW
- REVIEW OF THE STUDY
- OVERVIEW OF CYBER-CRIME AND CYBER- SECURITY
- VULNERABILITIES AND ATTACKS
- E-CRIMES THOSE ARE PECULIAR TO NIGERIA
- TYPES OF CYBER ATTACKS
- HISTORICAL BACKGROUND OF CYBER ATTACKS
CHAPTER THREE
3.0 METHODOLOGY
3.1 METHODS OF AVOIDING CYBER ATTACK
3.2 CHALLENGES OF CYBERCRIME
CHAPTER FOUR
- CATEGORIES OF CYBER CRIME
- EMERGING CYBER TRICKS IN NIGERIA
- EFFECTS OF CYBER CRIME
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The term cyber security is used to refer to the security offered through on-line services to protect your online information. Cyber Security and Information Security differs only in its response and Reduction/Prevention. Cyber security encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations and Compliance including Third Parties involved in delivering an objective With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also
Our world today is ruled by technology and we can’t do without it at all. From booking our flight tickets, to catching up with an old friend, technology plays an important role in it. However, the same technology may expose you when it’s vulnerable and could lead to loss of essential data. Cyber security, alongside physical commercial security has thus, slowly and steadily, become one of the most important topics in the business industry to be talked about. Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
Cyber security becomes important as Businesses are being carried now on Network of Networks. Computer networks have always been the target of criminals, and it is likely that the danger of cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm.
1.2 AIM OF THE PROJECT
The main aim of this work is to carry out a research on a cyber security. This study will helps to spread awareness among normal people about emerging security threats. The objectives of the work are:
- To improve their knowledge about cyber security
- To overcome several security loopholes on their computer operation.
- To provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks
- To help people reduce the vulnerability of their Information and Communication Technology (ICT) systems and
- To help individuals and institutions develop and nurture a culture of cyber
- To work collaboratively with public, private and international entities to secure cyberspace.
- To help understand the current trends in IT/cybercrime, and develop effective
- Integrity, which may include authenticity and non-repudiation.
1.3 PURPOSE OF THE STUDY
The purpose of cyber-security is to prevent data breaches, identity theft and cyber-attacks as well as risk management in some cases. When an enterprise applies an effective incident response plan and has a strong network security, it is better positioned to mitigate and prevent cyber-attacks. For instance, end user protection guards against theft or loss of information while scanning computer devices for malicious codes. In light of this, organizations and the cyber-security stakeholders must remain up-to-date with the emerging technologies, threat and security intelligence trends in order to design the ideal cyber-security measures.
1.4 BENEFIT OF CYBER SECURITY
This helps to ensure that all internet connected assets and information are secured from cyber-threats that take many forms such as;
Ransomware: it is deployed by an attacker in the form of a malware that locks a target’s computer system and files through encryption. The attacker demands a lump sum payment in order to decrypt and unlock the computer systems and files.
Malware: this is any program or file that is deployed with the aim of harming a computer user like; computer virus, worms, spyware and Trojan horses.
Social engineering: this is a new form of cyber-attack that is executed through tricking system users into breaching security procedures to grant the attackers access to sensitive and private business information that is protected.
Phishing: this is a type of cyber fraud that entails sending out fraudulent emails that bear a resemblance to emails from reputable sources. However, the fraudulent emails are designed to steal sensitive user information such as login information and credit card details.
Evidently, upholding cyber-security requires coordination of security efforts within an entire information system that includes; network security, application security, information security, end-user education, operational security and disaster recovery. The major cyber-security challenge is the ever evolving nature of security threats and risks. The traditional cyber-security approach focuses on core system components and preventing the known threats. Meaning that, some of the security components are left undefended and the systems are not fully protected against risks that are deemed to be less dangerous. Fortunately, this is gradually changing as companies and security stakeholders invest more resources on improving cyber security technologies and services.
1.5 SIGNIFICANCE OF THE STUDY
This study is useful and necessary since it helps the reader to know and be aware of cyber attack and in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
Cyber Security. (n.d.). UniTopics. https://www.unitopics.com/project/material/cyber-security/
“Cyber Security.” UniTopics, https://www.unitopics.com/project/material/cyber-security/. Accessed 23 November 2024.
“Cyber Security.” UniTopics, Accessed November 23, 2024. https://www.unitopics.com/project/material/cyber-security/
Here’s a typical structure for Cyber Security research projects:
- The title page of Cyber Security should include the project title, your name, institution, and date.
- The abstract of Cyber Security should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Cyber Security should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Cyber Security, identifying gaps the study aims to fill.
- The methodology section of Cyber Security should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Cyber Security research study using tables, charts, and graphs to illustrate key points.
- Interpret Cyber Security results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Cyber Security study and restate its significance.
- List all the sources you cited in Cyber Security project, following a specific citation style (e.g., APA, MLA, Chicago).