Cybersecurity Snapshot: Google, Twitter, and Other Online Databases

Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.

[1]  Inderpal S. Bhandari,et al.  Orthogonal Defect Classification - A Concept for In-Process Measurements , 1992, IEEE Trans. Software Eng..

[2]  Anne E. James,et al.  Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks , 2015, Comput. Electr. Eng..

[3]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.

[4]  David Cooper,et al.  President's information technology advisory committee (PITAC): subcommittee on transforming the government , 2000, DG.O.

[5]  John Viega,et al.  19 Deadly Sins of Software Security , 2005 .

[6]  David Clark,et al.  Computers at risk: safe computing in the information age , 1991 .

[7]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Sanjay Silakari,et al.  A Survey of Cyber Attack Detection Systems , 2009 .

[9]  Stefan Wagner,et al.  Defect classification and defect types revisited , 2008, DEFECTS '08.

[10]  Pascal Meunier,et al.  Classes of Vulnerabilities and Attacks , 2008 .

[11]  Kishor S. Trivedi,et al.  A Classification of Software Faults , 2011 .

[12]  John G. Voeller Wiley handbook of science and technology for homeland security , 2008 .

[13]  Jeffrey L. Hieb,et al.  Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.

[14]  Alexander L. Wijesinha,et al.  Splitting HTTP requests on two servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[15]  Kishor S. Trivedi,et al.  Software Faults, Software Aging and Software Rejuvenation( New Development of Software Reliability Engineering) , 2005 .

[16]  Bharat S. Rawal,et al.  Nth Order Binary Encoding with Split-Protocol , 2018, Int. J. Rough Sets Data Anal..

[17]  Kishor S. Trivedi,et al.  An empirical investigation of fault types in space mission system software , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[18]  Alpana Dubey Towards adopting ODC in automation application development projects , 2012, ISEC.

[19]  Chao Yang,et al.  Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Guofei Gu,et al.  Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.

[21]  Levente Buttyán,et al.  Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).

[22]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[23]  Mark Butcher,et al.  Improving software testing via ODC: Three case studies , 2002, IBM Syst. J..

[24]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[25]  Amit M. Paradkar,et al.  A software flaw taxonomy: aiming tools at security , 2005, SOEN.

[26]  Data processing-open systems interconnection - basic reference model , 1981, CCRV.

[27]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[28]  Wenliang Du,et al.  Categorization of Software Errors that led to Security Breaches , 1998 .

[29]  Omar H. Alhazmi,et al.  Quantitative vulnerability assessment of systems software , 2005, Annual Reliability and Maintainability Symposium, 2005. Proceedings..

[30]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[31]  Alae Loukili,et al.  Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage , 2016 .

[32]  Andy Ozment,et al.  Improving vulnerability discovery models , 2007, QoP '07.

[33]  John Liederbach,et al.  Digital Crime and Digital Terrorism , 2005 .

[34]  Kishor S. Trivedi,et al.  Fighting bugs: remove, retry, replicate, and rejuvenate , 2007, Computer.

[35]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[36]  Ram Chillarege,et al.  Test and development process retrospective - a case study using ODC triggers , 2002, Proceedings International Conference on Dependable Systems and Networks.

[37]  Michael Grüninger,et al.  Introduction , 2002, CACM.