A Study on the Parameters that Affect Cyber Security

Cyber Security plays an important role in the field of computer science information technology. Securing the information from have become one of the biggest challenges in the present day. This study will use primary data collection tools (questionnaire) to collect information from respondents. This paper mainly focuses on challenges faced by cyber security. It also focuses on latest about the cyber security techniques and the trends changing the face of cyber security. cyber security is becoming very important topic to work on and covering various different type of cyber-attacks.


Introduction
Today any human being can send and receive any form of data may be an audio or video just by the internet. for the batter transmission of data, we have to ensure cyber security, which prevent the leakage of the information. In today's technical environment technologies are changing day by day. So because of these new technologies we are unable to safeguard our private information in a very effective way and so these days cybercrime are increasing at higher speed.
Today we are doing more than 50 percent of total transactions online, so this field of internet need more security for batter and secure transaction. Hence cyber security has become the most important issue. The scope of cyber security is not just limited to securing the information in IT industry but also to various other fields like cyber space etc.

Research problem
The growing list of cyber-crime includes crimes that have been made possible by computers. here we will be discussing about the basic mistakes that make our system vulnerable to be hacked in.

Research Objective
 Our objective to achieve system security from malicious code, intrusion and spam.  To study factors which have an impact on Cyber security.

Hypothesis
H0: There is no difference between gender when considering he tried hacking. H1: There is difference between gender when considering he tried hacking.
H0: There is no difference between age groups when considering does they ever suffer by hacking.
H1: There is difference between age groups when considering does they ever suffer by hacking.
H0: There is no significant impact of using open internet connection on hacking of the social media account.
H1: There is significant impact of using open internet connection on hacking of the social media account.
Review of literature (G. Nikhita Reddy, G. J. Ugander Reddy, 2014), The study discusses about the challenges in cyber security and how to prevent fraud, intrusion, spam, malicious code in effective manner. As new technologies like cloud, web based online transaction are growing we need cyber security.
(Vitaly ford and Ambareen Siraj, 2014), this study talks about machine learning algorithms that we use in cyber security. Study have discussed about Logistic Regression (LR), Classification and Regression Trees (CART) for phishing detecting and network intrusion detection.
(Uzma Afzal, Tariq Mahmood, 2013), this study discuss about how big data analytics helps us to predict any malicious activity. analytics can assist network managers particularly in monitoring and surveillance of real time malicious code and suspicious pattern.
(Subil Abraham, Suku Nair,2015), this study discusses about different type of model and matrix that we use to detect and prevent cyber attracts. this paper also discusses about attract graph, markov model, CSVV matrix domain.
(Thomas oseku-afful, 2016) this study discuss about the effect of digital transformation and how digitalization increasingly effecting our data security.

Research Methodology
Research design: The purpose of the study is to gain knowledge about the basic activity that compromise the system security and support data breach.
Research approach: Respondents are the user that were ready to co-operate. To collect data, we gone through the survey method. students of sri balaji university and data is collected through survey method. Data analysis method: The data analysis of the research will be mostly represented in qualitative manner. Since p value is greater than 0.05 (in case of knowing current prices) we do not reject null hypothesis and conclude that there is no difference between gender when considering he tried hacking. Since p value is lesser than 0.05 (in case of knowing current prices) we reject null hypothesis and conclude that There is difference between age groups when considering does they ever suffer by hacking. Since p value is greater than 0.05 (in case of knowing current prices) we do not reject null hypothesis and conclude that there is no significant impact of using open internet connection on hacking of the social media account.

Findings and Suggestions
In this study we tested three hypothesis to find out the impact of different aspect on cyber security. We have seen the impact the use of open internet connection to cyber attract on social media account and conclude that no significant impact of using open internet connection on hacking of the social media account.
We have also seen that does gender have any impact on whether they tried hacking and concluded that there is no difference between gender when considering he tried hacking. we also seen that is there any particular age group suffer by hacking or not and concluded that There is difference between age groups when considering does they ever suffer by hacking.
Cyber-crimes are increasing daily to prevent can use artificial intelligence and machine learning algorithms to prevent cyber attracts. also to reduce hacking we have to be care full about the operating system that we using in system.

Limitations and Conclusion
Computer security is a vast topic that is becoming more important because the world is becoming highly interconnected thought internet.
Cyber-crime continues to diverge down different paths with each New Year that passes. The latest and disruptive technologies, along with the new cyber tools, machine learning, big data analytics and threats that come to light each day, are challenging organizations with not only how they secure their infrastructure. There is no perfect solution for cybercrime. We cannot prevent all types of cyber threat because of advancement in technology but upgrade system to prevent most of them.

Further Research Directions
In this research paper we have discussed about the very basic mistake that we do without knowing the output on our information security.