Cyberspace is significant in ensuring connectivity in the world in different ways such as economically, socially and culturally. The global connectivity of cyberspace has exposure it to various forms of harm, reducing the security and privacy in the cyberspace (Li et al., 2015). Cybercrime has increased incredibly involving computer and other digital devices where a computer can end up being a target for crime or utilized as a tool for crime. The connectivity in the cyberspace has made the sharing of information possible; this has also increased the storage of information in the cyberspace (Li et al., 2015). The securing of the cyberspace entails the control of the information, preventing the misuse of the information stored and easy investigation of cybercrimes. Securing the cyberspace entail the instigation of preventive mechanisms but there are always instances of breaches that may occur.
The cyber threat has increased substantially due to the existence of large, powerful groups of vigilante hackers that reside on the edge of the cyberspace (Shamsi, Zeadally, " Nasir, 2016). These groups launch attacks on organizations and even organization working to deface through harassment and economic gain (Shamsi, Zeadally, " Nasir, 2016). The threats presented by hackers and malware has made it necessary to evaluate the possibilities of securing the cyberspace.
Statement of Interest
The increase in the incidents in cybercrime in the contemporary society, while its menace is affecting individuals, organizations and governments, the key aim of this research is to investigate the nature of cybercrime, the hidden features and the discovery of the sophistication of the attacks, the motivation of the attacks and find the different ways of securing the cyberspace. The research will entail the development of preventive and control measure that can be used to secure the cyberspace.
Significance
This is research is aimed at advancing the efforts of securing the cyberspace while intensifying the fight against cybercrime. The research will inculcate innovative and inductive approaches to promote the development of cybersecurity consciousness in public. The outcome of the study will have special significance in creating solutions for various cyberspace security related problems. The efforts taken in this research are aimed at making the cyberspace safer for the users and data.
Research Question
The research will address the various aspects of securing the cyberspace hence the primary question that will require answering will be;
How can we secure the cyberspace and prevent the misuse of the internet?
The other complementary questions that would be of interest in the securing the cyberspace will be
What are the most significant challenges faced in the cyberspace today?
What are the motivations for the cybercriminals?
Schedule
Task
Period
1
2
3
4
5
6
7
8
9
Research Proposal
Notes on Sources
Report Outline
Report Writing
Research Statement
The research will entail an evaluation of standards set as priorities for cyberspace security. The standards will provide the basis for the determination of the threats and attacks. The methodology will involve quantitative analysis of the previous attacks that have occurred in the recent past. The methodology will also qualitatively evaluate forensic reports to determine the underlying flaws that can be corrected to improve the security of the cyberspace.
The research prospect that the case and incidents of cyberspace breaches and attacks have increased considerably. The quantitative data will illustrate an increase in the breaches illustrating a decrease in the security of the cyberspace.
Annotated Reference
Li, G., Niu, W., Guo, L., Batten, L., Liu, Y., " Cai, G. (2015). Securing Cyberspace. Concurrency and Computation: Practice and Experience,28(6), 1870-1871. doi:10.1002/cpe.3753
The cyberspace is a ubiquitous space that is related to the internet. The article describes the various problems related to the security and privacy in the cyberspace. Nonetheless, there are still incidents of cyber-attacks that require evaluation and resolution to attack the security of the cyberspace.
Shamsi, J. A., Zeadally, S., " Nasir, Z. (2016). Interventions in Cyberspace: Status and Trends. IT Professional,18(1), 18-25. doi:10.1109/mitp.2016.19
The article accepts that cyber-interventions such as explosions and attacks have adverse impacts to people hence there is the need to continue the understanding of the various dimensions and scopes of cyberspace attacks. The assessment of the attacks and the enhancement of the security elements that can be used to secure the cyber-system is vital. The securing of the cyberspace should be a collective responsibility to ensure the victory over the threats faced daily.