Hardware and Software Cyber Security Tools

Hardware and Software Cyber Security Tools

Tamalika Das, Nabonita Nath, Kshounish Acharyya, Shirsa Chakraborty, Parag Chatterjee
Copyright: © 2023 |Pages: 23
DOI: 10.4018/978-1-6684-7110-4.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The issue of cybercrime is becoming crucial in society. This is partly a result of the widespread adoption of technology in both essential government infrastructure and our daily lives. Due to an overreliance on technology, hackers and other people with bad intentions now have more ways to exploit systems and access databases containing sensitive data, including records relating to people's personal, financial, educational, and medical records. The importance of cybersecurity can be understood through research. Cyber security follows real-time information on the latest IT data. So far, various methods have been proposed by researchers around the world to prevent cyber-attacks or reduce the damage caused by them.
Chapter Preview
Top

Introduction

The Internet has contributed significantly to international communication for more than two decades and is now a part of almost everyone's daily life. The availability, use, and performance of the Internet have substantially improved thanks to innovations and low cost in this sector; as a result, there are currently about 3 billion Internet users globally by Tan et al. (2021).

Currently, the majority of international economic, commercial, cultural, social, and governmental interactions and activities—including those of individuals, non-governmental organisations, governments, and governmental institutions—are conducted in cyberspace by Aghajani and Ghadimi (2018).

This place plays a crucial role in both the material and spiritual capital of nations and in the material success and spiritual growth of their population by Amir and Givargis (2020). Therefore, the question that arises is how to defend against cyber attacks.

Because they were typically constructed before current cybersecurity requirements, essential infrastructure like power plants, nuclear facilities, the electric grid, and dams are particularly susceptible to assaults. Our civilization is a prime target for cybercrime because of these expanding opportunities as well as hackers' greater motivation and access to resources.

Particularly, information warfare and cyberterrorism show the enormous effect of harmful attacks in action. Despite the fact that these attacks might not happen as frequently as other cybercrimes like cyberstalking, cyberbullying, identity theft, or data breaches, they have the capacity to bring down entire country's infrastructures and cripple vital resources. These attacks are frequently state-sponsored and are regarded as Advanced Persistent Threats (APT).

The only effective strategy to lowering future cybercrimes is to solve the underlying issue. While some cybercriminals may be driven by monetary gain, others may be motivated by social or political issues. One single policy might not be able to fully address all of these issues, therefore by concentrating on these many sorts of offenders, we can offer policymakers more appropriate answers.

For the cyber security and privacy of a corporation or an individual, a cybersecurity software is a must. The technique used to defend against cyberattacks on the network, system, or applications is known as cybersecurity. It serves as protection against identity theft, cyberattacks, and illegal data access. The various components of cybersecurity include application security, information security, network security, disaster recovery, operational security, etc. It must be kept up to date to protect against numerous cyberthreats, including social engineering, malware, phishing, and ransomware.

The term “hardware security” also describes protecting physical systems from harm. Attacks that aim to destroy equipment, for instance, concentrate on computing and networked non-computing equipment, such as that used in machine-to-machine or internet of things (IoT) contexts. Large numbers of hardware devices that need to be secured using either hardware- or software-based security are connected and communicate in these environments. Severe new security concerns have been identified and researched recently. These include IP (Intellectual Property) theft and reverse-engineering attacks on ICs (Integrated Circuits) by Torrance et al. (2009), hardware Trojan attacks by Tehranipoor et al. (2010) in an untrusted design house or foundry, side-channel attacks (Zhou et al., 2005) where secret information of a chip can be extracted through measurement of side-channels (such as power, delay, and electromagnetic emission), Modchip attacks (PCBs). These attacks show the necessity of hardware security. The vast scope also suggests that college students would need experimental equipment and tools that could support a variety of practice applications and were flexible enough for prospective improvements in the future at a lower cost. These tools would facilitate learning and application practice for students about hardware security topics.

Complete Chapter List

Search this Book:
Reset