The Business of Cybersecurity
eBook - ePub

The Business of Cybersecurity

Foundations and Ideologies

Ashwini Sathnur

Share book
  1. 84 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

The Business of Cybersecurity

Foundations and Ideologies

Ashwini Sathnur

Book details
Book preview
Table of contents
Citations

About This Book

Cyber security could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security.

This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is The Business of Cybersecurity an online PDF/ePUB?
Yes, you can access The Business of Cybersecurity by Ashwini Sathnur in PDF and/or ePUB format, as well as other popular books in Business & Information Management. We have over one million books available in our catalogue for you to explore.

Information

Year
2019
ISBN
9781948976190

CHAPTER 1

Introduction to Cybersecurity

Cybersecurity could be defined as “Beginning of the concept of trust and belief in cyber transactions.” The era of computing began in the twentieth century, with an enormous investment in computational research. Software programming languages were the foundational blocks of history of computing. Progressive research then led to more extensive networking, bringing about the formation of connectivity. Along with these technological developments emerged the issues of breach of data privacy and data hacking. These factors along with the explosive growth in Internet-driven commerce paved the way for the emergence of cybersecurity as study field of paramount significance.
Both research groups and individual researchers were working toward developing robust cybersecurity tools and technologies.
When internetworking arose, individuals could capture the data that were being transferred. The concept of hacking can be explained this way: When a physical, package mail is posted from Bangalore to Mysore, it could be easy for an intruder to access it and view its contents. Similarly, data transmitted from machine A to machine B over a technological medium—while on its journey—could be picked up by another machine/individual/groups of individuals. Due to this reason, cybersecurity has become vital for the safety and security of the data. Thus, cybersecurity is fundamentally about thwarting any bid from criminal entities such as hackers who try to illegally access and steal data that are stored in servers, or in cloud, and are transmitted electronically or via the Internet.
During the earlier phases of computer technology and research, the technology of cybersecurity first emerged in the form of a computer program that was built to thwart any intruders from breaching and gaining entry into the computer systems to access and steal data. The software languages that were existent were used to build and execute software programs that provided cybersecurity.
The first computer software language that explained much of the fundamentals of computing was BASIC. Thus, anti-hacking modules were written first in BASIC language.
Algorithm for cybersecurity in BASIC:-

CHAPTER 2

Theory of Cybersecurity

As described in the previous chapter, innovative ideologies of algorithms were developed and introduced in cybersecurity concepts. The theory of cybersecurity rests wholly on the ideologies of computing research. Programming languages are utilized for building cybersecurity modules.
Fundamentally, cybersecurity programs are written in programming languages such as BASIC, C, C++, and Java. Algorithm is first designed and written. In the next step, a functional design flowchart is drawn based on the algorithm written in the first step. In the third, and final, step, codes are written in the software language chosen to create cybersecurity modules and programs as shown in Figure 2.1.
Figure 2.1 Functional design flowchart
Modules of programming for cybersecurity are listed as follows:
A) BASIC
B) C
C) C++
D) Java
Data structure is a component of the software language program that defines the constituent data members and the methods that process these data members (Figure 2.2).
Figure 2.2 Data structure of the components

Data Members

These are constituents of the variety of data contained within a cybersecurity functionality.

Functional Methods

These are constituents of the variety of functions and methods used for operating the data members—basically they provide the requirements and functionalities of the cybersecurity module.

Program Contribution to Data Structure

BASIC, C, C++, Java are some of the program languages used for writing codes to be used for executing cybersecurity modules.
The theories of cybersecurity are founded on the concept of fraud. Data theft is common in networking. Hacking and compromise of security are frequently encountered.
Figure 2.3 Fraud detection
Figure 2.4 Methodology of the hacker

Database Design of the Cybersecurity Module

The database design involves creating the following components that are as essential and integral part of cybersecurity modules.
A) Database data constituents for storage of content to be protected by cybersecurity programs
B) Database data constituents that are structural elements in the cybersecurity module
C) Database data constituents that invoke member applications
The various methods of the functioning of database is defined.
First, the method to add data to the database is defined, which is DBMSAdd() function.
Second, the database function method “delete” is defined. This function removes data from the database—DBMSRemoveSelectedOrAll().
Third, the database function method to search for certain data is defined DBMSFindByColumn().
Then these three functions are defined in the software languages BASIC, C, C++, and Java.

CHAPTER 3

Emerging Technologies for the Theories of Cybersecurity

Rigorous research has been taking place in the field of information and communication technology (ICT) to develop and provide newer methodologies and procedures for use in cybersecurity modules. Thus, new cybersecurity modules have been emerging even more frequently than in the earlier times, given the exponential rise in the growth of data correspon...

Table of contents