Cain and Abel Cyber Security: Critical Analysis

Cain and Abel Cyber Security: Critical Analysis

Cain and Abel Software is a hacking tool. It is for both the good and bad sides. In this, you can check any network host, such as the incoming and outgoing network activity of any device. I’m going to be covering the password-cracking abilities with Cain and Abel. This tool is capable of wireless hacking via PC. It has the ability to crack any password.

Features of Cain and Abel Software:

    1. Networking sniffing
    2. Password Cracking
    3. Hack sites
    4. Using Linux
    5. Use various Tools
    6. Box pwning

How to download Caine and Able Software:

In this software, we can use network sniffing. Through this software, you can watch the activity of the user connected to the network. So I’ll show you how to do it. You can download and use this software from here.

How to use Caine and Abel Software:

    1. Its interface is very simple and easy. This software breaks passwords. It has the power to crack simple passwords. In which all websites and applications need a password. It has access to this information in any type of data.
    2. All this happens through a hacking process known as a sequel injection. In this regard, hackers can exploit flaws and coding designs to gain access to the database. Here we will talk about Cain and Abel Software hacking.
    3. Some of the most popular types of hashing algorithms are NTLM, md5, and sha-1. You will find the password one of the more popular types of password-cracking programs is Cain and Abel. We are going to focus on is under the cracker tab which used for cracking passwords on the left.
    4. You will see a list of different types of hashing algorithms. Let’s select NTLM hashes. What windows use to encrypt passwords to import hashed passwords? Click on the plus sign. Select the first option to import hashes from all the users on your current computer.
    5. You can import hashes from a text file or a database file. You click the next list of all the accounts. The system will show the popup window. Our area of interest will be the NT password column.
    6. If it says empty that means there isn’t a password on the account if it’s blank then it has a password. So right-click on the account. If you wish to crack and it will give you different cracking options dictionary.

These options are as under.

    • Dictionary Attack
    • Brute-force
    • Cryptanalysis attacks

Dictionary Attack:

    • It reads from a file of preset passwords.
    • You can download the large password file

Password Complexity:

In this half, the passwords on the web are lowercase letters and 6 characters long.

On an above-average computer, this will take only 30 seconds to crack.

Brute-Force Attack:

    • The next fastest way is through a method called brute force. It is a method of trying all possible combinations, numbers, and/or symbols and hashing them. It finds a matching combination.
    • This is where the complexity of your password pays off on average more than half the passwords. On the Internet are lowercase letters and six characters in length on my laptop. It only takes 30 seconds to crack.
    • So if that’s you and someone breaks into LinkedIn or Twitter’s databases. You’re screwed to use brute force and Cain and Abel. You right-click on the user select brute force and then select NTLM hashes.
    • It will bring up a new window with criteria of password complexity. You can see adding one number. Your password rises the crack time to four minutes.
    • Adding a number in uppercase letters takes more than an hour then throwing a symbol into the mix bumps. It is up to about five hours still this is a very short amount of time. When it comes to your security.
    • You include all those characters and then increase the length of your password to say ten the time to crack. It increases in this case. It’ll take about eighteen thousand years now. That’s more like brute force is the most common means of password cracking

Cryptanalysis Attacks:

    • There’s a third option called cryptanalysis. Which is the study of cryptography to see? It can adopt this method of crypt analysis attacks. That is called rainbow tables without getting complicated. A rainbow table can be a long string of millions of hashes.
    • Then the rainbow table will take a smaller pattern. The original hash is knowns as a reduction function and search for. Instead of searching the entire hash. It can be a lot faster assuming. You have enough memory to store all the hashing functions.
    • You can find rainbow tables to use by searching for them on Google. You have three different options to try and crack other hashing algorithms.

Conclusion:

Cain and Abel Software is a password recovery tool for all types of Windows. It allows easy recovery of various kinds of passwords through sniffing. The network cracking translated passwords using a dictionary, brute force, and cryptanalysis attacks.

Persuasive Speech on Cyber Security

Persuasive Speech on Cyber Security

The internet is a no man’s land. The whole world has melted into a global village as the internet permeates offices, homes, and mobiles. Cyber security is the practice of protecting networks technological systems, and programs from data breaching, digital attacks, data infringement, and unauthorized access. These attacks mainly focus on accessing, changing, or in other words perishing important information, and extorting money from users and organizations. To understand why cyber security is needed and crucial, an understanding of cybercrime is very necessary. Cybercrime is any illicit operation that is performed on the net or any network-based appliance. These crimes include identity theft, viruses, supplanting, cyberstalking, and phishing.

The main motive of cyber security is to protect information and systems from major cyber threats. Creating and maintaining effectual cyber security measures is challenging because globally, there are more devices than humans and attackers are increasingly skilled at modifying to known security measures. The biggest risk and threat for the cyber community of the world has to be hackers and spammers. Even the strongest security measures have not been able to catch these groups of people. Thus, increasing the need to secure and develop security measures to ensure the protection of everybody using the internet. Cyber threats keep evolving every single day. Increasing use of the internet throughout the globe coupled with globalization has increased the intricacy of cyber threats. Cybersecurity threats continue to increase in frequency and diversity. This has led to major security threats. Hence, the need for the installation of better security measures to avert the occurrence of these types of threats. Typically, the threats could be classified into three;

  1. malicious codes
  2. network abuses
  3. network attacks

Malicious codes consist of worms, viruses, spyware, worms, trojan horses, logic bombs, adware, backdoor programs, bots, and key loggers.

According to Cavelty (2008), network abuses include worm propagation, email viruses, denial of service attacks, unsolicited bulk email (UBE or spam), phishing scams, child pornography, and copyright infringement.

Lastly, network attacks include Denial-of-service (DoS) attacks, password attacks, SQL injection attacks, intrusions, and web defacement.

Local and global infrastructure is built on connected technology, and ensuring the security of this network is important for the productivity and safety of forever online society.

The three components of the CIA triangle are confidentiality, integrity, and availability. They are considered the three most important elements of cyber security.

  • Confidentiality

It’s important these days for everyone to secure their, private data from unauthorized parties. Confidentiality is all about protecting the revelation of information to unauthorized parties. But in precise words, it tries to ensure the identity of authorized access engaged in holding and sharing information is private as well unknown. Making sure the engaged parties’ identity is confidential just completes the CIA triad. Protecting confidentiality is subjected to having to determine and accomplish secure access levels for data.

Several frequent means that are used to handle confidentiality involve volume & file encryptions and access control lists.

  • Integrity

It maintains the authenticity of data over its complete life cycle by ensuring the unauthorized party is not able to interfere or tamper with it. This is a major element of the CIA Triad. It makes sure when an authorized person modifies information that shouldn’t have been modified, the loss can be managed. It also makes sure that information is not breached due to unintentional hardware or software malfunctions. Standard efforts to assure integrity comprise cryptographic checksums, access controls, backups, and uninterrupted power supplies

  • Availability

This is the last element and it speaks about the availability of your information. In rigorous terms, it facilitates the condition where authorized participants are able to access the data whenever required. Access channels, systems, and authentic devices all must work adequately for the data they protect and make sure it’s accessible when it‘s needed. Information unavailability is a result of malicious activities like DDoS attacks or software/hardware failure or insufficiency of bandwidth or other resources.

Therefore, the three main goals of the CIA Triad of Security are-

  1. Keeping sensitive information secure and private.
  2. Having the ability to recover data that has been damaged, lost, or compromised.
  3. Ensuring authorized users can freely access the systems, networks, and data needed to perform their daily tasks.

References:

  1. Goutam, R. K. (2015). Importance of Cyber Security. International Journal of Computer Applications
  2. Myriam Dunn Cavelty (2008). Cyber-Security and Threat Politics.
  3. Singer, P. (2014). What Do We Mean By Security Anyway? Brookings Institution. 

My Cyber Security Profession History Essay

My Cyber Security Profession History Essay

I was the first among my friends and neighbors to get a computer around the age of 10. I can recall the glee and childish exuberance surrounding every aspect of my being on that morning my mother arrived from England. I was just elated seeing the Hewlett parked logo at boot up, then the black screen with white lettering long before I knew it was called dos loaded. This was my first experience with anything called computing and from day one I fell in love with this object that became the center of my attraction. Today that love and desire to advance in my knowledge and fulfill my passion has not abated.  

Since my first interaction with the computer until now, I am constantly intrigued by the capabilities, advancement, and rate of change within computer systems and networks. My passion in computing is to improve business processes and systems by utilizing applications, devices, smart integration through API, etc. to enhance productivity. This trend stirred me to study Management Information Systems for my undergraduate degree. I studied courses like Applied program development, Database Management, Enterprise Architecture, and System Analysis Methods. These helped me gain a solid understanding of computer systems in the enterprise.  

I was hired as an assistant project manager for a doctor’s office and I was tasked with digitizing paper records. This project was part of a larger organizational conversion to an electronic medical records system which I ended up inheriting and piloting to the end. I later took the position of health information manager and I documented and trained staff for this purpose. This job gave me an opportunity to practice what I was studying.  

I have worked as a Field Engineer and Technical operations lead for a myriad of projects in local government, medical, and SMB.   

However, in the enterprise, I quickly learned that such smart processes preclude the element of security and the threat of breach and hacking is still a major concern.  I developed an ardent interest in this area, and I sought to understand the methods behind the breaches, how to counter them, and how to prevent future occurrences.  

As a Messaging Engineer with Smith and Nephew Inc., I was responsible for URL security and web browser protection. This brought me front and center with the prevalent threat of phishing and other emerging internet threats. This required constant research, analysis, and documentation for training level 1 and 2 support and also for reporting to my superiors. Another aspect of my job required me to team up with information security, Microsoft Engineers, and ForcePoint Engineers to formulate and program DLP and other security policies for Office 365. This inoculated me against the work-alone mentality and allowed me to interact with colleagues, senior management, and High-level engineers alike. It also helped me to accept new challenges and I gain expertise in problem-solving by harnessing existing resources, talents, and everyday concepts. 

Now my desire is to matriculate and undertake a study in Cyber Security and Leadership for my next frontier. I will be greatly honored if I am offered the opportunity to join this program. As a Level 3 Network Specialist for a US local government agency, I believe this program will provide me with the armamentarium to successfully combat and thwart current emerging threats facing us today. I also desire to take this knowledge back home to Ghana where I will set up a consultancy firm to facilitate sharing this knowledge among young students and proctor them to the world stage. Thank you for your consideration. 

Log Analysis in Cyber Security: Analytical Essay

Log Analysis in Cyber Security: Analytical Essay

Log analysis is the term used by analyzers to analyze computer-generated records to help organizations or businesses mitigate different risks. Log analysis helps network engineers to manage different applications and infrastructures. Security analysts solve security problems. This process helps companies comply with security policies, audits, or regulations, and understand service troubleshooting. System and understand the behavior of online users. Website administrators often extract web server logs to study customer profiles and learn more about their behavior and other marketing-related tasks. 

To track visitors to your site/platform and understand the number of visitors to your site, the pages on which they spent the most time, and why the number of visitors has changed, patterns like this will help you identify opportunities including when to post a new version or product, sending a mailing, the right time to offer discounts, etc. For HTTP Errors: A common use of log analysis is searching for HTTP errors. Through your analysis, you’ll be able to understand your HTTP errors, and on what pages they occurred so you can fix the problem and essentially prevent yourself from losing potential clients. The system operator will use operational logging to take useful information such as notification of failure or potentially actionable conditions. Application and system developers who use application debug logging which is a specific type of logging disabled in production systems but can be enabled on request. 

Troubleshooting the application: 

Logging data helps technical staff quickly Identify areas of poor performance, Application Status Assessment and Troubleshooting, Diagnostics, and Identification of Application Root Cause and Runtime. A security administrator From a security point of view, a newspaper aims to serve as a red flag in case of a problem. As the SANS Institute says, ‘Journaling can be the best friend of a security administrator. It’s like an administrative partner who is always at work, who never complains, who is never tired, and who is always on top. If instructed, this partner can provide the time and place of each event that occurred on your network or system. ‘ A business analyst (BA) Newspaper data usually contains a wealth of commercial information. Critical business information can be derived from log data and alerts when specific business objectives are met or achieved. 

  • Business Process Health 
  • Transactional data (transactions / s, etc.) 
  • SLA clients 
  • The income per hour Marketer 

Log file analysis can be a strategic advantage for digital marketers to gather information and analyze their impact on visibility, traffic, conversions, and sales. 

  • Understand which pages are useful and unnecessary 
  • Reveal pages that Google searches and those they do not see. Purchase information requests online
  • Determine which groups of visitors are most likely to convert to customers, members, or subscribers 
  • Define visitor groups based on the content they read, the actions they perform, and even the original URL. 
  • Optimize conversions 

Conclusion 

Computers, networks, and other computer systems generate records that document the activities of the system. Organizations use it to mitigate various risks and comply with regulations. Technical and non-technical people will use the result of the log analyses to Understand and deal with data breaches and other security incidents To troubleshoot systems, computers, or networks To understand the behavior of your users Forensic science However, log analysis also saves companies time when they try to diagnose problems, solve problems, or manage their infrastructure or applications. 

What Is the Cause of Cyber Security: Analytical Essay

What Is the Cause of Cyber Security: Analytical Essay

Cyber-attacks may not seem tangible in the digital world, but they can cause real damage. Technology and the internet join all countries together with the potential to be an asset or a weapon. A cyber-attack can reach a global level easily with low risk and the ability to cause damage on a high scale. Any nation that wants to cause damage to the United States in a quick and efficient way would use hacking If infrastructure is hacked it can cause physical issues such as blackouts, and the stop of operations, not allowing people to have access to their money, or shutting down power grids so that hospitals are unprepared for the lack of power, and even the failure of military equipment. There is also the issue of stealing information from public and private companies such as intellectual property and unpatented information, or the theft of national secrets to sell them or leak them, as well as personal information that is valuable and sensitive. They can disrupt communication networks or paralyze systems. That is why the most immediate threat to the U.S. during the next ten to fifteen years is cyber-attacks on infrastructure unless we find a way to protect its foundation.

The infrastructure of the U.S. can easily become compromised by a hacker in any part of the world. Many jobs, companies, and people depend on the organization and disposition of the framework of the U.S. and its institutions and expect them to be reliable. If a fraction of infrastructure is compromised, it can mean disarray on a wide scale, for example, Frank Cilluffo, the Director of the Center for Cyber and Homeland Security stated, “critical infrastructure such as U.S. banks and the energy sector (oil and gas) are primary targets for cyber-attacks and cybercrimes… (they) hold the potential to undermine trust and confidence in the system itself” (Cilluffo 3). These essential institutions are key factors for the advancement of the U.S. economy and so their cybersecurity is far more susceptible to an attack. Any nation-state that wishes to damage the U.S. from the inside out can do so by damaging the economy it relies on, and from any location.

The cybersecurity of infrastructure could be an improbable threat because there are concerns to U.S. national security that seem more immediate. For example, terrorism is unpredictable and causes more casualties at the moment. Most cyber-attacks could be preventable if proper cyber security were implemented and there have not been any catastrophic deaths from a cyber attack. It is also difficult to negotiate with terrorists where as most advanced nation-states with cyber capabilities can be dissuaded from using the information they have against the U.S.

The reason I believe this to be the most important threat is because it is one of the biggest liabilities for the United States. Other countries do not compare to the military or economic level of the U.S. but they can infiltrate our systems through network hacking and affect the advantage that the nation holds over the rest of the world. It will also be a big problem to deal with because there are so many large corporations and industries that are connected to power grids and networks and they do not have the appropriate cybersecurity upgrades to keep up with the advanced technology that they use. Although terrorism causes casualties there are many instances where cyber attacks have led to deaths and if not taken care of can reach catastrophic rates. Terrorists are likely to use cyber attacks as a means to cause a physical attack, making the threat of cyber attack all the more likely. Technology affects the daily lives of Americans and if it is compromised it can have significant effects on the U.S. economy, public health, and safety, so cyber threats have the capability to affect the functioning of life as we know it, not just because of the physical attacks but also due to the informational attacks. The problem alone is widespread but it is also hard to deal with because they can come from anywhere in the world, making the attack difficult to deter.

Cyberattacks are hard to prevent since they can be launched from anywhere in the world. Intelligence agencies can collect information on the nation states and private companies with the most motive to attack and the highest cyber hacking abilities, such as their ability to infiltrate our network and figure out what kind of resources and tactics they are using so that we can be put into a position to retaliate with a physical attack if necessary. Intelligence agencies should also focus on the information security of all major infrastructures that are determined to be important for public safety, health, or a corporation that has an economic significance for the U.S. The information security in this case would be digital and includes cybersecurity and, network security which is the identification of malware and viruses and their prevention.

The solution posed could be non-viable because it is not finding the specific attacker, it is simply finding who is most likely to commit an attack. However, if we are collecting information on all transgressors it will be easier to decrypt the kind of malware or encryption they have used to hide their location. The basis of the solution is also prevention so that the attack does not occur in the first place. This can be used whether it be a nation-state or nonstate actor. If we wait to act until after we have been hacked, it will be a bigger problem and harder to deal with. If countries are already collecting data on us we should justifiably be doing the same thing to them.  

Root Cause Analysis on Cyber Security: Analytical Essay

Root Cause Analysis on Cyber Security: Analytical Essay

Cybercrime has become more prevalent in recent years. Discuss three different cybercrimes which were prevalent in 2018.

When a crime is committed in the cyber world with the purpose to destroy, hacking the data system, or earning ransom is known as Cybercrime. For example:

Network and data breach: It can be done via hacking a network system (Captures the data by hacking SSL tunnel-Secure Sockets Layer tunnel between a server and client, data generally transmitted in encrypted form but can be decrypted with keys). It happens while the user is accessing Internet banking and social network sites. Another way to achieve such crime is Key-Logger software. With the help of a key-logger, it is feasible to note down the pattern used to type passwords in Internet Banking Password mainly. So it is always recommended to use Virtual-Keyboards to access Internet banking sites.

Three listed famous cybercrime attacks:

1. WannaCry Cyber Attack: 

In May 2017, the WannaCry ransomware cybercrime attack happened worldwide by the WannaCry ransomware cryptoworm, the purpose of the attack was to target computers running the Microsoft Windows operating system by encrypting the data, and attackers demanded ransom payments in the crypto-currency such as Bitcoins.

RCA (Root cause analysis) report: Vulnerability in Microsoft Windows security called EternalBlue. Shadow brokers, a hacker group were involved in this crime.

Tax-calculator system software was designed and propagated on the internet by email, and malicious USB drives. This isolated the systems of users who interacted with software and infected their data which was made encrypted and could only be decrypted by paying ransom to the attackers. Active and unpatched (not updated) were infected during WannaCry Attack. (Cisco Systems, 2018)

2. FormJacking Cyber Attack: 

In 2018, Formjacking was the latest cybercrime attack by hackers to target e-commerce, and banking sites to collect the payment information of users. Hackers’ main target was to hack the payment card details of users. Big firms like British Airways, Ticketmaster, Kitronik (British Electronic retailer), and Vision Direct (A contact lens seller) were targeted during this attack.

RCA (Root cause analysis) report: A Java script was injected into web browsing when users were interacting with third-party customer support via Chabot. It loaded a malicious code into the user’s system with the aim to get the payment details of users.

(Symantec Corporation, 2019) (Symantec Corporation, 2019)

3. Mirai – Distributed denial of services attack (Internet of things – IoT): 

A malware attack specially designed to target network device that runs on Linux-based operating system(Designed by ARC – Argonaut RISC Core- “Organization introduced 32-bit central processing unit embedded systems) such as Routers. This was an IoT attack.

RCA (Root cause analysis) report: Mirai malware injected a botnet in Linux-based networking devices such as Routers and IP Cameras which were left unpatched. It turned the router into a network of remotely controlled BoTs known as a botnet. This botnet is commonly used for D-DOS attacks. These botnets were capable to take full control of devices. (Symantec Corporation, 2019)

Air Force Speech on Cyber Security

Air Force Speech on Cyber Security

Cyber Security an Invisible War

The guard of our Nation has customarily been finished by using physical people as ground power. These ground powers push their way through foe lines to accomplish their destinations. As our reality changes and advances as new technology is presented, so do our ground powers. This is accepting structure as people keeping an eye on PCs searching for adversary warriors to get through our guards, our cyber safeguards. Today, an ever-increasing number of troops are being pulled off the forefronts for the utilization of technology. This comes as cyber-assaults and the utilization of automatons. These two elements may not appear to be connected, in any case, they are interlaced in the manner in which our country safeguards ourselves and our partners.

The United States military has discovered that cybersecurity is such a danger, that each part of the administration has built up a lifelong field in this profession. The Air Force Specialty Code is 3D0X2, Cyber Systems Operations. The armed force Military Occupational Specialty (MOS) code is 25D, Cyber Network Defender. The Navy rating is an Information Systems Technician. At last, the Marines’ MOS is 0689, Cyber Security Technician. PC frameworks are such a huge piece of what we do and use today, that each branch is expected to set up a method for securing these PC frameworks as they see fit. I will separate each assistance profession to show how they are utilizing the present technology to thwart assaults against our national protection PC frameworks.

As per Powers (2014), 3D0X2, Cyber Systems Operations AFSC is authoritatively settled on November 1, 2009. The rising need to make another profession field was obvious as increasingly more cyber-assaults began occurring on Air Force frameworks and software.

As indicated by the Air Force site (n.d.),

The Air Force depends vigorously on cutting-edge PC and software frameworks, so it is principal to protect those frameworks. It’s the activity of Cyber Systems Operations masters to configure, introduce and bolster our frameworks to guarantee they work appropriately and stay secure from outside interruption. These specialists upgrade our capacities and give us the best and most secure frameworks so we can remain on the ball in all that we do.

This statement of purpose sets the establishment of what the professionals are centered around pushing ahead. As technology is progressed, so will the manners in which our foes find to assault our frameworks. These experts should likewise adjust to help keep this from occurring. The Army’s form of cybersecurity is even more current. Vergun (2014) expressed, Once Soldiers get an endorsement to turn into a 25D and afterward get the essential preparation, they will have the MOS 25D, starting Oct. 1 this year. The U.S. Armed force (n.d.) states, Soldiers serving in MOS 25D will secure against unapproved movement in cyberspace space and perform evaluations of dangers and vulnerabilities inside the system condition. This is a less tedious variant of the Air Force definition, custom-fitted obviously, to the Army.

The United States Navy and Marine Corps additionally have their rating and MOS, individually, with regard to cybersecurity. The Navy rating of Information Systems Technician manages the Navy side, and the Cyber Security Technician manages the Marine Corps side. The Navy (n.d.) separates their rating as pursues:

Information technology (IT) assumes a significant role in everything from electronic mail frameworks to shipboard control frameworks to Special Intelligence (SI) frameworks. Naval force Information System Technicians (IT experts) are Enlisted Sailors who take part in an expansive scope of obligations including system organization, database management, and PC hardware and software usage. Their duties include:

    • Operating and keeping up Navy worldwide satellite media communications frameworks
    • Serving as administrator on centralized computer PCs and nearby and wide region systems
    • Implementing miniaturized scale PC frameworks all throughout the Fleet
    • Serving as a significant piece of the Information Dominance Corps in its strategic addition a profound comprehension of the inward activities of enemies and creating unparalleled information on the battlespace during wartime.

 

The last projectile of the Navy’s appraising is the thing that we have centered around, attempting to make sense of what our enemies will do next on the information matrix. The Marines (2015) breakdown their MOS as pursues:

Cyber Security Technicians are liable for all parts of guaranteeing Marine Corps information frameworks information accessibility, trustworthiness validation, privacy, and non-revocation. PC Network Defense Specialist actualizes and screens security measures for USMC Communication Information Systems Networks, and prompt the officer that frameworks and faculty cling to built-up security guidelines and legislative necessities for security on these frameworks.

The Marines make it one stride more distant than the Navy and coordinate a PC arrange protection authority into their workplace who practices on the edge side of the cyber world, which is the side we are keen on. As should be obvious, cybersecurity has become such an applicable danger, that the four parts of the military felt it was important to execute new vocation fields to battle this. There have been a few occasions in the United States Government and specifically the Department of Defense, where there have been ruptures in the cyber safeguard of our country. A portion of these ruptures have been little, others enormous and possibly disastrous for people looking for work. We will presently take a gander at a few occasions where cybersecurity didn’t have what it takes and demonstrate expensively.

There have been a few ruptures in cybersecurity since the PC and the web have become integral factors in practically all parts of current life. The biggest and latest of these breaks was the Office of Personnel Management (OPM) rupture that happened a year ago. As indicated by an OPM Frequently Posed Inquiry site (n.d.), OPM accepts the primary interruption in its frameworks that happened in December 2014 and got aware of the episode in April 2015. OPM then got aware of a second interruption in its frameworks in May 2015. A similar site refers to that a huge number of people were influenced, however no unmistakable number. What is frightening here, is the way that it took four months for OPM to see this huge of an information break. This rupture influenced a huge number of Americans and a huge number of administration individuals. While the OPM is certainly not an immediate arm of the Department of Defense, administration individuals’ information still courses through the OPM. As indicated by Larter and Tilghman (2015), Some military authorities accept the ongoing hack focusing on the regular citizen-run OPM held onto information from a huge number of Standard Form 86s, which are required for all help individuals and regular folks looking for security and freedom. That incorporates administration individuals from all positions, officials, and enrolled, in a wide scope of occupation claims to fame and assignments.

To have a break to this extent on administration individuals’ recognizable information is cataclysmic. The OPM is a regular citizen-run office that has total oversight of each administration laborer’s close-to-home information. I accept with the hamburger up in cybersecurity over the four parts of the military, this information ought to be compartmentalized to each help branch to deal with their very own assistance by and by recognizable information. This by itself can help diminish the number of people influenced by a rupture. On the off chance that a break was to occur, odds are it would transpire of the compartmentalized regions, and be halted there moving forward without any more ruptures in different zones. To summarize, how I would split the information, OPM would be accountable for nonmilitary personnel government representatives just, while each help division would be responsible for their separate assistance individuals.

Changing gears to military-explicit occurrences, most likely one of the most noticeably awful cyber-assaults on the military came in 2008. Stewart (2010) expressed Deputy Defense Secretary William Lynn said the assault occurred after a contaminated glimmer drive was embedded into a U.S. military workstation at a base in the Middle East, transferring malevolent PC code onto the Central Command arrange. He proceeded to state, that code spread undetected on both characterized and unclassified frameworks, setting up what added up to an advanced foothold from which information could be moved to servers under remote control. He recalls when he previously joined the military, they could connect convenient hard drives, thumb drives, and CDs to the PC without anybody giving it a second thought. It was likewise a significant work component as execution reports must be composed, for the most part, on-off time. The administrator would take a shot at the report somewhat at work and move it to a thumb drive so they could deal with it at home during the end of the week. At the point when Monday moved around, they would appear, plug the thumb drive in, and transfer the report to keep taking a shot at it. It was standard practice. I recollect when this specific episode happened because the automatic response was to not enable anything to be connected to the PC that wasn’t at that point some portion of the PC. This caused a great deal of nervousness among laborers who had these reports to compose and were on a cutoff time. Thinking back, it was the best possible automatic response. Our military information frameworks contain a great deal of information about our troop developments and depictions and driving specifics on activities, which must be protected no matter what.

As indicated by Alternet (n.d.), this rupture was terrible to the point that the occurrence filled in as a wake-up for the Pentagon and incited significant changes in how the division dealt with computerized dangers, including the arrangement of another cyber military direction. This ties straightforwardly into the production of cybersecurity professions in the four fundamental parts of the military. This blaze drive episode features the requirement for a top-to-bottom thorough security application that can distinguish when information is being moved out of the fundamental framework to another. These kinds of uses should have the option to advance, as our foes do.

Numerous nations attempt to enter our cyber guard’s various occasions on some random day. Sanger (2013) expressed that, While some ongoing assessments have more than 90 percent of cyberespionage in the United States starting in China, the allegations handed off in the Pentagon’s yearly report to Congress on the Chinese military capacities were astounding in their unequivocal quality. China has the assets and individuals to be an imposing enemy in the cyber warfare field. Their technology is getting up to speed with our own quicker than we can pull away from them. A similar article expresses that China is putting resources into its electronic warfare capacities. With China putting such a great amount into their capacities, and with the apparent thought that they are our essential wellspring of cyber assaults, the U.S. military needs to keep in front of pace in shielding our national safeguard techniques from the hands of Chinese authorities. Presently, China isn’t our lone foe in this issue, notwithstanding, they are the predominant power in cybersecurity matters.

To help battle these cyber assaults, the Department of Defense has distributed the DoD Cyber Strategy. As indicated by this methodology, there are five fundamental key objectives. They are, construct and keep up prepared powers and capacities to lead cyberspace tasks; guard the DoD information organize, and secure DoD information and relieve risks to DoD missions; be set up to safeguard the U.S. country and U.S. fundamental interests from problematic or ruinous cyberattacks of huge result; construct and keep up feasible cyber choices and plan to utilize those alternatives to control struggle acceleration and to shape the contention condition at all stages; and manufacture and keep up vigorous universal collusions and associations to deflect shared dangers and increment global security and steadiness (Carter, 2015). These objectives are widely inclusive of the cybersecurity profession field destinations. In this procedure manage under the second vital objective, Carter states, While DoD can’t safeguard each system and framework against each sort of interruption – DoD’s all-out system assault surface is too enormous to even consider defending against all dangers and too tremendous to even think about closing all vulnerabilities – DoD must find a way to distinguish, organize, and protect its most significant systems and information so it can do its missions viably. This is indicating that the DoD is utilizing the criticality of various systems to determine which ones are imperative to assurance. While losing any system is awful, the passing of a basic system or framework could be calamitous for military activities around the globe.

Taking everything into account, the security of the military’s cyber system and frameworks is of most extreme significance to national security. There have been different endeavors to increase unwarranted access to the United States military information frameworks using hacking and other cyber-assaults. The ones referenced above are the ones that have had or will have enduring impacts for quite a long time to come. While a portion of the responses by government authorities are knee-yank in nature, they demonstrate that the information assembled unlawfully by our foes is basic to our country. The United States has been battling a war, not on the ground, yet in cyberspace. To be effective in this war, our military needs to proceed to improve and propel our advances in cybersecurity to keep up an upper hand over our adversaries. These new advancements should have the option to develop as our adversaries do and can distinguish when something is out of order in the system. For whatever length of time that PCs keep on being a significant piece of our lives and what we do, this war in cyberspace will proceed.

References

    1. Aviation-based armed forces. (n.d.). Cyber Systems Operations. Recovered from https://www.airforce.com/professions/detail/cyber-frameworks tasks/
    2. Alternet. (n.d.). The most exceedingly terrible Cyber Attack on US Military Came using Flash Drive: US. Recovered from http://www.alternet.org/rss/breaking_news/271139/worst_cyber_attack_on_us_military_came_via_flash_drive%3A_us
    3. Carter, A. (2015, April). The Department of Defense Cyber Strategy. Recovered from http://www.defense.gov/Portals/1/highlights/2015/0415_cyber-system/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
    4. Larter, D., Tilghman, A. (2015, June 18). Military leeway OPM information rupture ‘outright catastrophe’. Recovered from http://www.navytimes.com/story/military/2015/06/17/sf-86-security-freedom rupture troops-influenced pm/28866125/
    5. MOS Manual. (2015, May 19). Cyber Security Technician. Recovered from http://mosmanual.com/pages/mos/06/0689.php
    6. OPM FAQ. (n.d.).General Information on the OPM Breach. Recovered from http://www.secnav.navy.mil/OPMBreachDON/html_pages/FAQs.htm
    7. Forces, R. (2014, December 15). Aviation-based armed forces Enlisted Jobs: 3D0X2, Cyber Systems Operations. Recovered from http://usmilitary.about.com/od/airforceenlistedjobs/a/3d0x2.htm
    8. Sanger, D.E. (2013, May 6). The U.S. Accuses China’s Military Directly for Cyberattacks. Recovered from http://www.nytimes.com/2013/05/07/world/asia/us-denounces chinas-military-in-cyberattacks.html?_r=0
    9. Stewart, P. (2010, August 26). Spies Behind 2008 Cyber Attack, U.S. official says. Recovered from http://www.reuters.com/article/us-usa-cyber-assault idUSTRE67P00X20100826
    10. U.S. Armed Forces. (n.d.). MOS 25D, Cyber Network Defender. Recovered from http://www.armyreenlistment.com/reclass-25d.html
    11. U.S. Naval Force. (n.d.). Information Systems Technician. Recovered from http://www.navy.com/professions/information-and-technology/information-technology.html#ft-key-obligations
    12. Vergun, D. (2014, Aril 14). Cyber Network Defender MOS is presently open to NCOs. Recovered from http://www.army.mil/article/123328/Cyber_Network_Defender_MOS_now_open_to_NC

Business Impact Analysis of Cyber Security: Essay

Business Impact Analysis of Cyber Security: Essay

According to DC. Latham an Assistant Secretary of DCCCI, “Over the past decade there has been an incredible growth in the amount of classified information stored in computers” (Warner, M., 2012). This data is stored in cyberspace which constitutes of many optic wires, routers, servers, and computers which are interconnected (Purpura, P., 2007). With the start of the 21st century, many technological developments and improvements in the workplace as taken place but challenges and issues are inevitable (F. Mohammadi et, al. 2014). These technical problems are not new in this area, a first disaster occurred in 1988 which made thousands of computers crash and created disruptions in many software. Minor loopholes can cause major damage which directly or indirectly impacts companies’ performance and customers’ trustworthiness (DeNardis, L., 2007). These threats to the security of data lead to a new term called “Cyber Crime”. In a brief sense, Cybercrime means the mishandling of data. The most frequent threats are thefts, child pornography, cyber terrorism, and diffusion of malware (de Leeuw, K.M.M. and Bergstra, J. eds., 2007).

Literature analysis

In all businesses, data plays a very crucial role and if this data breaches it can cause fatal damage to the companies. The world has witnessed, the UK suffered 93% of data loss in large organizations and 87% of data loss in small and micro-enterprises. About 40 million credit card numbers and 70 million addresses, contact details, and other personal information of customers were disclosed in the USA. The expertise suggests by analyzing these incidents and giving a theory that, security management should be divided into two contexts, i.e. Technical and Managerial. The technical aspect cannot be fulfilled without the support of the managerial part while managers alone cannot guard the whole information system. Management must take care of software and hardware installations, security rules and regulation, organizing awareness campaigns, internal control, and data decisions. These activities control the different ways of data loss both internally and externally. Humans have a critical role in protecting information. Most of the scenarios of data loss are partly due to the blunders of employees. One of the many ways in which data loss can occur internally is the stealing of data for malicious intentions by the employee of the organization. Management controls this type of threat by implementing mandatory participation of employees in these awareness and training programs. The threat to information security also impacts the lifecycle of a business. The top-level employees or board of directors should implement the protection of data in the business strategies. Social media is also part of the insider threat to information security. As social media benefits us with unlimited information sharing and anytime and anywhere accessible options, but it rifts the trust of organizations in data protection (Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016).

The different types of threats that cybercriminals can cause on a company’s system are Malware, Trojan Horse, and Vishing. These threats can be commonly defined as online fraud and hacking of systems. Cybercriminals use social and emotional techniques rather than technical tricks to deceive people. They send emails that contain malware in the form of attachments or hyperlinks, or they misguide public attention by fake website names such as Paypal and Paypal, where people may add their personal information, and this information is misused by fake website hosts (Shaikh, A.N., es, A.M. and Hossain, M.A., 2016).

Current Practice Section

According to Karen A. Frenkel, ransomware is the biggest threat to an unpredictable situation where companies are unprepared to deal with the attack. Ransomware is the cheapest and very convenient way for cybercriminals to hack data and earn huge profits. The numbers say that almost the worth of 5 billion-dollar in damages were caused by ransomware in 2017. The author says in a different article that, big companies or large organizations are fighting this situation by giving their employees adequate training and defining the future causes of problems to their employees instead of enforcing strict policies. The author also notes a positive point on these attacks, these cybercrimes are inspiring companies to strengthen their cyber data and create a strong defense system. Companies have shifted their way to tackling the problem, in the past organizations used to spend huge investments in solving the problem, but in today’s world, these businesses are investing large amounts of investments in protecting the data and selecting the precise security tool.

The European Union has initiated General Data Protection Regulation (GDPR) which states that companies even which are not located physically in Europe but deal with European customers, must protect their personal information, appoint a data protection officer and follow specific guidelines while communicating with them (Samuel Greengard., 2017).

Internet is secured by country laws and enforcements, defensive products, and international co-operations and regulation. (Tonge, A.M., Kasture, S.S. and Chaudhari, S.R., 2013).

Conclusion

In a nutshell, the information security safeguard can be controlled by the integration of technical and managerial. When both technical and non-technical departments are in line and adopt a comprehensive approach to include whole business management then information can be safeguarded. 

Cyber Security Risk Analysis: Proposal Essay

Cyber Security Risk Analysis: Proposal Essay

Security Operation Center

A security operations center ( SOC) includes the people, processes, and technologies responsible for monitoring, analyzing, and maintaining an organization’s information security.

The infrastructure of the Security Operation Center

The security operation Centre has the following infrastructure

A) Software

  • Intrusion detection software and intrusion prevention
  • Firewalls
  • Vulnerability Scanners
  • SIEM

B) Hardware

  • Firewalls
  • Behavioral monitors
  • Asset Discovery

The proposal complies with the ISOIEC 27001:2013 which specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization. It also includes requirements for assessments and treating information security risks.

Tasks of the security operation center

  • 24×7 monitoring of IT security alerts, incidents, and issues
  • Supported by our 24×7 TukTuk Ev security operation center
  • Anti-spoofing configuration and protection
  • Cyber threats intelligence management
  • Cyber security incident response team

Responsibility of the Security Operation Centre

The security operation center has the following responsibilities:

  • Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management( SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
  • Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breach and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
  • Threat Hunting – tier 3 analyst is responsible for day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also joins tier 2 analysts into containing it.

Organization of security operation center

  • Organization of the Soc Monitor

TTEV security operation center integrates with your information systems, monitoring the systems 24x7x365 in real time for cyber alerts, incidents, and issues. The SOC services provide analysis and report for all the cyber activities detected.

  • Analyze

TTEV’s Security Operation Center automates the analysis of all the event logs. With an all-time updated cyber threats database analysis discards possible threats before execution.

  • Response

From the deep analytics of the event logs cyber threats are identified early and our team of certified ex-parts is quick to respond to an attack in time

  • Organization

TTEV’s Security operation center as a service organization of services it provides is categorized into three: monitoring, analysis, and response.

  • Monitoring

TTEV SOC integrates with your information system and scans all the events that take place in the assets and the network. The scanning is done in real-time and 24x7x365. The monitor keeps a record of all user activities. Our team

  • Analyze

From all the events recorded by the monitor, user activities on the network, and the assets events, our team performs an automated analysis of all the events. The analysis help identifies possible threats and malicious activities. With an all-time updated cyber threats database analysis discards possible threats before execution.

  • Response

Our team has certified cybersecurity experts with great expertise and experience. In the event of an attack, they are efficient in response to counter and mitigate the attacks. The team can perform a thorough risk analysis, identify cyber gaps and provide suitable remedies. The team will develop and implement policies to address vulnerabilities. Our experts will develop and provide a recovery plan and a business continuity plan in case a cyber-security attack is successful.

Responsibilities

Security team

  • Security analyst –responds to incidents first. They are responsible for developing and deploying policies to manage system users’ functions. The security analyst’s responses are either threat detection, investigation, or addressing the threats.
  • Security architects – they develop the security architecture. They select and maintain analysis tools to monitor security. They create tools and procedures to prevent and counter cyber threats. They develop protocols to be followed in case of an attack.
  • Security Operation Center Manager – manages the operations of the security team. The manager oversees the activities including training staff, hiring, and assessing their performance. The manager is obligated to ensure that the security procedure put up is incompliant with the laws and rules governing computer use and security.

The security operation center has the following responsibilities:

  • Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management (SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
  • Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breaches and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
  • Threat Hunting – tier 3 analyst is responsible for the day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also join tier 2 analysts in containing them.

Tasks and benefits

TTEV’s Security operation center provides real-time 24×7 monitoring and scanning of the assets and the network.

TTEV provides anti-spoofing protocols that protect privileged information from unauthorized persons. Filters will be applied in the access points to your firms to ensure that unauthorized persons do not identify as trusted sources. Firewalls used by the TTEV security operation center have filters to eliminate false sources.

A ready-response team to counter and mitigate attacks. The security team is dedicated to observing cyber events and countering them. The cyber team is divided into its teams and has a protocol to be executed in case of a cyber event. With the protocol threats can be identified and eliminated before it is propagated, an ongoing attack can be countered and mitigated and in case an attack is successful the team has raided out procedures to recover the information system to its working condition.

Cyber security experts for consolation and cyber-security advice. Cyber security experts can help your firm when you wish to consult an issue concerning security. The team offers advice on issues.

The cyber security team develops customized rules and policies for your firm. This will ensure optimal security by governing people’s activities that make the system vulnerable to cyber-attacks.

The infrastructure of the security operation center Software

Firewall – the TTEV Security operation center uses firewalls to ensure that known threats are discarded before they enter the network from the internet. The threats database is customized and regularly updated with new threats to secure the system.

Intrusion detection and intrusion prevention software – the software is placed behind firewalls. Intrusion detectors identify anomalies in the events of a network. They communicate with the security team in case of abnormal activities. Intrusion prevention software discards and eliminated abnormal activities being done on the network.

Security information and event management – TTEV uses powerful SIEM that collect and analysis all systems events and logs from assets, information system, and the network.

Vulnerability scanners – TTEV has put in place vulnerability scanners. This ensures that all vulnerabilities in the system are identified. This helps in preventing the exploitation of the vulnerability or putting up measures to counter the attack when the vulnerability is exploited.

Hardware

  • Behavioral monitors – TTEV has behavioral monitors that observe the activities of given people. This gives the security team information on the activities and therefore makes incites on how to handle future similar activities.
  • Firewalls – TTEV security operation center will place firewalls at the access points. This will prevent threats from the internet including malware.
  • Asset discovery – this identifies all the assets in a firm. With all assets identified risk analysis and identify the vulnerability.

References

  1. Khalili, M. (2015). Monitoring and improving managed security services inside a security operation center (Doctoral dissertation, Concordia University).
  2. Katowitz, M. (2018). Third-Party Managed Security Service Provider [Guest Blog]| IS Partners. Ott, J. L. (2001). Managed Security Services. Inf. Secure. J. A Glob. Perspect., 10(4), 1-3.
  3. Jansen, C. (2017). Stabilizing the industrial system: Managed security services’ contribution to cyber-peace. IFAC-PapersOnLine, 50(1), 5155-5160.

Cyber Security Data Analysis Essay

Cyber Security Data Analysis Essay

Artificial intelligence for security

Before examining the change in cybersecurity thanks to artificial intelligence systems, it is good to know some data. We are used to connecting artificial intelligence to computer programs such as voice assistants present in computers and mobile devices such as Cortana or Siri, as well as industry 4.0 linked to technologies that support humans in carrying out operations. complex. In reality, the evolution of the sector turns to the protection of computers and data. Malware and viruses can in fact be blocked by artificial bits of intelligence declined in various forms. Defense is one of the main objectives of the experts’ new proposals, but clearly, there is a risk that hackers could use the same systems for their attacks. Don’t be afraid because hackers and their attempts act as a stimulus and example for an increase in the efficiency of new IT security products.

Internet criminals have access to the dark web, which is a series of websites on which malware and viruses can be purchased. In particular, these are AlphaBay and Hansa. These two portals have recently been closed due to bankruptcy, but there are other pages ready to offer the same service, and above all this news does not stop hackers intent on damaging other people’s networks or illegally taking possession of sensitive data. To cope with the danger it is necessary to constantly update your antivirus system, but this does not guarantee 100% against the risks of attack and intrusion into your computer system. In any case, a security patch is installed on your device.

However, among the dangerous programs, there is also ransomware, which seems to be widespread. Much feared for the future are Denial of Service attacks. This justifies the frenetic work of antivirus manufacturers, which in the last year have faced 36% of cases of phishing campaigns, attacks on IT infrastructures 33%, 15% of offensive actions related to the Internet of Things, 14% of ransomware and 1 % attacks came through botnets. These are the main threats, but while the reports on the cyber situation are published, cybercriminals are ready to break into the computers of others with new techniques. This is why the last frontier of cybersecurity consists of artificial intelligence.

Cybersecurity

In the field of cyber security, machine learning, deep learning, and artificial intelligence are certainly not new terms, on the contrary, they have become commonplace. For many years, the engines of heuristic analysis and recognition of the patterns of action of the systems have been working with these technologies to increase protection and provide an innovative defense capable of adapting to the many threats that animate the world of the web and the IT world in general. In this context, there is an example of an effective system active in protection. This is a next-generation help called Watson for Security and made by IBM. The tool allows human analysts to have a platform to work on while keeping various threats away.

In reality, the product does not take care of monitoring systems and the network but can be activated by the user for specific predefined events. The program carries out an in-depth analysis of all available data providing the user with a complete report on the activities and on what happened within the analyzed system. In this case, you have all the information, but it is up to the person to draw conclusions and decide what actions to take. It’s not the only cybersecurity article to leverage artificial intelligence, but it’s different than other programs like Darktrace, which still use AI. In this case, the traffic from which the normal flows are learned is analyzed. Artificial intelligence comes into play to find anomalies within all the data collected and examined. It proves to be an excellent ally when software downloaded from the internet is automatically installed and these come into operation by performing suspicious operations. Very useful in the field of data protection of companies, subject to industrial espionage attacks.

Artificial intelligence, in the field of IT security, is not only concerned with identifying threats and investigating activities within the network but also works through prevention, avoiding unauthorized intrusions by protecting sensitive data contained in devices. The AI ​​acts by memorizing the behavior of users on the web, the way they type passwords and the information exchanged so as to have a picture of the situation and implement the necessary measures to ensure security. The software is capable of verifying whether whoever is visiting a website is a person or a robot and then examines the way in which the mouse buttons are clicked, the speed of movement, the duration of the clicks, and how much it allows to monitor the visitors of the web pages. In this way, information programs aimed at fraudulent use are avoided. Furthermore, thanks to this working method, visitors and users of sites and databases can be recognized not so much by the passwords entered but by their behavior. In fact, their movements are studied to create profiles and identify the person who is operating.

The definitions

Before proceeding with the analysis of the functionalities that artificial intelligence makes available to IT security, it is good to remember the most important definitions, so as to understand the different elements and their role. Intelligent software applied to cybersecurity makes it possible to understand the threat landscape, perceive and analyze the dangers, and decide the actions to be taken to protect and eradicate viruses and malware of various kinds. What are the buzzwords to know? Here they are:

  • artificial intelligence: the combined terms are applied to any technique capable of imitating human intelligence, that is, with rules of logic and implication and with internal decision-making processes. The expression was coined by John McCarthy in 1956 even though there was already an operational definition of the genre, written by Alan Turing in 1950 in an article that explained how a machine capable of passing the Turing Test to make man communicate with other people and other computers. A terminal unable to distinguish between human and computer passes the test. AI also works with machine learning and deep learning;
  • machine learning: it is a subset of artificial intelligence that includes complex statistical techniques aimed at improving performance with the use of experience to carry out one’s duties. The ML can be supervised or not, but in the first case a precise cataloging of the functions is necessary, while in the second case a behavior model must be set up so that the software can have a reference;
  • Deep learning: it is a subset of machine learning that includes algorithms useful for the software to train in carrying out the activities for which it was designed. For example, recognizing images, voices or identifying certain information by examining a large amount of data;
  • Internet of things: is a network of physical objects including a technology created to allow them to communicate, perceive, and interact with internal systems and with the external environment. The author of the terms is Kevin Ashton, who in 1999 used them to describe the physical world connected to the internet.

The intelligence of machines ‘artificial intelligence is used in many contexts, but in the context of the internet it is used in particular by giants, Google is the lead, interested in controlling the network and the processes that take place within it as much as possible. Obviously, this allows an improvement in the performance of the machines and an increase in the offer to users, but the security aspect should not be neglected because the growth of the web inevitably leads to illicit attempts to take possession of information. Data collection is essential to be able to control the virtual and real world and therefore to offer people products and services that are more tailored to the needs of potential customers, but this activity lends itself to various uses and for this reason, the web is increasingly attractive to malicious people.

The application of artificial intelligence is certainly about the collection and processing of images, words, and behaviors. For this reason, deep learning is needed, which allows us to arrive at predictive scenarios. With regard to IT security, the focus is on behavioral analysis, relating a specific state with information on possible threats. Taking into consideration the technologies related to artificial intelligence and its subsets, we can say that we have the advanced tools necessary to deal with Big Data coming from the various objects connected to the network. It should be emphasized that most of the data are normal, while the dangers lurk in a small amount of information, but for this reason, every single pass of data must be analyzed to detect cyber threats. If you used a metaphor you could say that tracking down a potential cyber hazard is like finding a needle in a haystack, however, with AI you are guaranteed to explore all data systematically. Further assurance comes from the use of DeepInstict algorithms and neural networks because they instinctively protect valuable information. In fact, artificial intelligence is able to act using a human and animal peculiarity: instinct. It can do this thanks to appropriate programming with decision-making algorithms.