# Introduction ne of the major issues of today's ever updating technology dependent world is the safety of their private data. Whether it is data of the major organizations launching a new product or secret military operation details, the safety and protection of that data is the most important enigma. In present time, the ratio of cybercrimes is increasing by each day. In a recent list presented by FBI, it is very clear that cybercrimes now are not only limited to small data theft or simple hacks through malware, but their scope is expanding way behind that horizon. Some of the recent cases of FBI (Cyber Crime branch) areRansom-ware, more than 2000 ATM hits at once, Phishing attacks and more crimes of same nature. Even though research is being done in cyber security field and practices are also being updated but the problem of cyber-crimes is far from being solved. According to recent researches, the main limitation seems to be the approach used. The methods used are not evolving fast enough to combat the problem. While many approaches have been implemented, there are limitations that arise with their use. Major limitations are complexity for local user, if more than one different security infrastructures used. Some of other known limitations are decrease in resolved, more work needs to be done especially in field of research. Research needs to be done starting at institution level. For this purpose, usage is also needed to be monitored to study the user habits and patterns. Another issue that needs attention is validation of software used and methods and standards used to test or validate them. This is the issue that calls out for attention desperately. As with the ever growing trend of third-party applications and new launch of software every day, there is no telling which one is safe and which is not. So to check their validity and to declare them safe or non-safe, old methods are not enough. New methods should be built based on International Society of Automation (ISA) standards. The importance of organizational level security is also discussed. Through this work the importance of cyber security in the modern world has been conveyed. It has also been discussed as to which limitations need to be resolved for it to be effective. # II. # Related Work Even though research is being done in cyber security field and practices are also being updated but the problem of cyber-crimes is far from being solved. According to recent researches, the main limitation seems to be the approach used. The methods used are not evolving fast enough to combat the problem. While many approaches have been implemented, there are limitations that arise with their use. Major limitations are complexity for local user, if more than one different security infrastructures used. Some of other known limitations are decrease in efficiency, data collection, need for monitoring of usage, etc. In order for these limitations to be resolved, more work needs to be done especially in field of research. Research needs to be done starting at institution level. For this purpose, usage is also needed to be monitored to study the user habits and patterns. Another issue that needs attention is validation of software used and methods and standards used to test or validate them. This is the issue that calls out for attention desperately. As with the ever growing trend of third-party applications and new launch of software every day, there is no telling which one is safe and which is not. So to check their validity and to declare them safe or non-safe, old methods are not enough. # Conclusion From the above work, the importance of cyber security is emphasized. It is also concludedthat closely monitoring systems and users provide and insight on the attacks and user reaction to them. Also monitored systems are less vulnerable to threats, data theft, phishing, frauds and other cyber-crimes. Since the validation of software is necessary, so ISA standardized systems should be developed to validate them. Also one of the major roles should be played by Government. It should take hold of every bit of events that occur in cyber space including formulation of new algorithms and techniques to prevent unauthorized access to any intruder. In future, work would be done on monitoring techniques, their shortcomings and role play. Also, further research will include methods of secure authorizations. # a) Analysis While analyzing the data, the first keen thing observed was the possibility of System being noncomplex as well as vulnerability free very narrow. If a system is to be secure to the highest level, userfriendliness or ease of access especially to users with basic knowledge cannot be provided. Also the fault tolerance of currently existing systems is very low, even in the high-end computers. It could only be increased by closely monitoring the capabilities of existing systems in their ability to treat vulnerabilities. The systems with higher level of robustness have more reliability rate. Some other components related to cyber security are as follows: # b) Security The most important and most basic requirement of any system is security. In order for any system to qualify as reliable, at least basic level of security need to be provided. With passing time, the need better cyber security seems to be the basic one. # c) Efficiency d) Ease of use The user being able to operate even with basic skill is important. With increase in level of security comes the implementation of complex infrastructures, which makes it difficult to keep the system difficulty free for a basic skilled user. Open source development and other such methodologies are being used to achieve this. # e) Robustness f) Case study Analyses not only at organization level but at much larger level are being conducted. To make comparisons using these studies, surveys and volunteer research are being conducted. # g) Testability Testing plays extremely important role to check functionality of the systems. The security techniques before massive or global level implementation are tested several times on smaller networks. # h) System availability The system availability to perform the necessary immunization steps before connecting to networks are to be done. # i) Fault tolerance User participation in detecting vulnerabilities, phishing attacks and other such threats play an important role in increase of fault tolerance. # j) Monitoring By closely monitoring the habits of users and keeping a close watch at young user habits can reduce the number of vulnerabilities at immense level. # IV. T. Feglar Yes No No Yes No No Yes No No 62015![Global Journals Inc. (US) Global Journal of C omp uter S cience and T echnology Volume XV Issue IV Version I ( ) E efficiency, data collection, need for monitoring of usage, etc. In order for these limitations to be Year 2015 New methods should be built based on International Society of Automation (ISA) standards. III.](image-2.png "O © 2015") © 2015 Global Journals Inc. (US) 1 S.Kowtha et al, 2012 L. yang et al, 2010 © 2015 Global Journals Inc. (US) ## Acknowledgements We wish to acknowledge the guidelines and effort provided by designated professors. * Cyber security: a national effort to improve JohnMalgeri September 2009 IEEE Kennesaw State University * Will cyber-insurance improve network security? A market analysis RPal LGolubchik KPsounis ; PanHui INFOCOM, 2014 Proceedings IEEE 2014 * Cyber security operations center characterization model and analysis SKowtha HST LANolan HST RADaley HST Security HST 2012 IEEE * A security framework for protecting business, government and society from cyber-attacks PR JTrim Yang-ImLee 2010 IEEE * Protecting cyber critical infrastructure (CCI): integrating information security risk analysis and environmental vulnerability analysis TFeglar Comput Sci Consultant JKLevy 2004 IEEE * Cyber security analysis of state estimators in electric power systems ATeixeira SAmin HSandberg KHJohansson SSSastry Atlanta G.A December 2010 * Pengxie JasonHLi Xinmingou * Using Bayesian networks for cyber security analysis PengLiu ;Levy R 2010 IEEE * Continuous monitoring and cyber security for high performance computing AlexMalin ACM * Towards Secure Information Sharing models for community Cyber Security RSandhu RKrishnan GregoryBWhite October 2010 IEEE * Towards a cyber-security aware rural community ProfMarthie; Zama Dlamini; Siphongobeni 2011 IEEE * A Security Framework for Protecting Business, Government and Society from Cyber Attacks Dr R JPeter Trim Dr -ImYang Lee 2015 IEEE * From Information Security to Cyber Security Cultures Organizations to Societies RayneReid ;Lohan Van Niekerk 2014 IEEE * JanKallberg ;Bhavanithuraisingham Towards Cyber Operations, the New Role of Academic Cyber Security Research and Education 2012 * RobertKAbercrombie * Validating Cyber Security Requirements: A Case Study TFrederick Sheldon; Ali Mili 2014 IEEE * EllefsenIan The Development of a Cyber Security Policy in Developing Regions and the Impact on Stakeholders IEEE 2013 * AnisBen Aissa * RobertKAbercrombie * Quantifying Security Threats and Their Impact TFrederick MilliSheldon ; Ali 2013 IEEE * Trust but Verify Critical Infrastructure Cyber Security Solutions KDennis Holstein; Keith Stouffer 2010 IEEE * SajjanShiva ; SankardasRoy ;Dipankardasgupta Game Theory for Cyber Security IEEE 2010 * RebeccaLefebvre The Human Element in Cyber Security: A Study on Student Motivation to Act IEEE 2012 * A Pilot Study of Cyber Security and Privacy Related Behavior and Personality Traits JamesTziporahalevi Lewis;Nasirmemon 2013 IEEE