EXISTING SYSTEM:
Most approaches to security in the enterprise have focused on protecting the
network infrastructure with no or little attention to end users. As a result,
traditional security functions and associated devices, such as firewalls and
intrusion detection and prevention devices, deal mainly with network level
protection. Although still part of the overall security story, such an approach has
limitations in light of the new security challenges described in the previous section.
Data Analysis for Network Cyber-Security focuses on monitoring and analyzing
network traffic data, with the intention of preventing, or quickly identifying,
malicious activity. Risk values were introduced in an information security
management system (ISMS) and quantitative evaluation was conducted for
detailed risk assessment. The quantitative evaluation showed that the proposed
countermeasures could reduce risk to some extent. Investigation into the cost-
effectiveness of the proposed countermeasures is an important future work. It
provides users with attack information such as the type of attack, frequency, and
target host ID and source host ID. Ten et al. proposed a cyber-security framework
of the SCADA system as a critical infrastructure using real-time monitoring,
anomaly detection, and impact analysis with an attack tree-based methodology,
and mitigation strategies
DISADVANTAGE:
1. Firewalls can be difficult to configure correctly.
2. Incorrectly configured firewalls may block users from performing
actions on the Internet, until the firewall configured correctly.
3. Makes the system slower than before.
4. Need to keep updating the new software in order to keep security up to date.
5. Could be costly for average user.
6. The user is the only constant
PROPOSED SYSTEM:
User-centric cyber security helps enterprises reduce the risk
associated with fast-evolving end-user realities by reinforcing security
closer to end users. User-centric cyber security is not the same as user
security. User-centric cyber security is about answering peoples’ needs
in ways that preserve the integrity of the enterprise network and its
assets. User security can almost seem like a matter of protecting the
network from the user — securing it against vulnerabilities that user
needs introduce. User-centric security has the greater value for
enterprises. cyber-security systems are real-time and robust independent
systems with high performances requirements. They are used in many
application domains, including critical infrastructures, such as the
national power grid, transportation, medical, and defense. These
applications require the attainment of stability, performance, reliability,
efficiency, and robustness, which require tight integration of computing,
communication, and control technological systems. Critical
infrastructures have always been the target of criminals and are affected
by security threats because of their complexity and cyber-security
connectivity. These CPSs face security breaches when people, processes,
technology, or other components are being attacked or risk management
systems are missing, inadequate, or fail in any way. The attackers target
confidential data. Main scope of this project in reduce the unwanted data
for the dataset.
ADVANTAGES:
1) Protects system against viruses, worms, spyware and other
2) Protection against data from theft.
3) Protects the computer from being hacked.
4) Minimizes computer freezing and crashes.
5) Gives privacy to users
6) Securing the user-aware network edge
7) Securing mobile users’ communications ‘
8) Managing user-centric security