Cyber Space Security Assessment Case Study

Cyber Space Security Assessment Case Study

Hanaa. M. Said (University Ain Shams, Cairo, Egypt), Rania El Gohary (University Ain Shams, Cairo, Egypt), Mohamed Hamdy (University Ain Shams, Cairo, Egypt) and Abdelbadeeh M. Salem (University Ain Shams, Cairo, Egypt)
DOI: 10.4018/978-1-5225-5634-3.ch052

Abstract

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the e- government services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.
Chapter Preview
Top

Introduction

It is possible materially setting what is known as cyberspace or what is called also the cyberspace as being the electronic digital field extended through the different metallic, lighting and airy communication its channels in the net of the internet network. The extreme speed information with its technological expression, this space is related with its different concepts, that is because the non-availability of geography for the natural place in the appearance of the geography for the information sailing in the different directions, at the same time that makes this phenomena of the cyberspace of the major features for the information age, it embodies practically the village society through its supposed space of open horizons which puts the human being in a digital world in its foundations and features .The new values talking about the arising of the supposed world as time and place space. They became like the new land as most of the capitals, the modern cultural and scientific movement prompted to it, also the means of amenities beside the crimes (Xiong et al, 2009).

The real cyberspace that is available on the internet. It is difficult, to conduct on them the assessment of quality which can be accepted for the extent of securing it. It can be expressed for this real cyberspace as if the series of the minor cyberspaces. Our objective is analysis, study securing one of the minor cyber space's which is the cyberspace for the authority of cleaning and beautifying Cairo, in the Arab Republic of Egypt (www.ccba.gov.eg) to Analysis the extent of the sufficiency for the suggested reasoning to measure the extent of securing data for the cyberspace. It is one of the important cyberspaces in the frame of the mechanism for the e-government services, and its effect on both the citizens, the investors and on the government, this cyberspace is related with several electronic sites (Varun et al, 2008). The objective is to provide a framework for the system of managing the electronic service that is required to be secured, and which uses the classical means, and utilizing the tools of research for the data to enforce, these services, to provide them through a big set of readings, data, information and facts, discussing them by study, analysis and adapting them to the service of the chapter's objectives to get new services from the government, as it is clear from the Figure 1.

Figure 1.

Site map of the Cairo Cleaning and Beautification Authority

(www.ccba.gov.eg).

Risks can be caused by the electronic attacks, the role is enhance its scope enlarges in a world in which the internet network become fragile. The development of the programs and computers can be accessed easily, increasing the activity of information hikers who became having a profound experience in the field of the information technology. The field of the danger of those not for being making movements danger and harmful compared with what they say for the existence of ignorance for their ability, meaning the non-predicting with their movements and its results (Verlag et al, 2012). the electronic attacks became as one of the effective ways without large costs, after that the world has become in front of a power equipped with the technology of the computer . They can by pressing the button of penetration and committing harmful technology, deeds against the others through the supposed world of cyberspace (Olivier et al, 2008).

Complete Chapter List

Search this Book:
Reset