1,655
13
Essay, 2 pages (300 words)

Cyber has been misused. a wide range

Cyber security is the activity of protecting information and information systems (networks, computers, data bases, data centres and applications) with appropriate procedural and technological securitymeasures. Firewalls, antivirus software, and other technological solutions for safeguarding personal data andcomputer networks are essential but not sufficient to ensure security. As our nation rapidly building its CyberInfrastructure, it is equally important that we educate our population to work properly with this infrastructure.

Cyber-Ethics, Cyber-Safety, and Cyber-Security issues need to be integrated in the educational processbeginning at an early age. Security counter measures help ensure the confidentiality, availability, and integrityof information systems by preventing or mitigating asset losses from Cyber security attacks. Recently cybersecurity has emerged as an established discipline for computer systems andinfrastructures with a focus onprotection of valuable information stored on those systems fromadversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. An Intrusion Detection System (IDS) is a program that analyses whathappens or has happened during an execution and tries to find indications that the computer has been misused.

A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led toconsideration of a variety of possible approaches for improving cyber security in the future. These approacheswere labelled “ Heterogeneity” ,” Motivating Secure Behaviour” and “ Cyber Wellness” . Cyber Security plays an important role in the development of information technology as well asInternet services.

Our attention is usually drawn on “ Cyber Security” when we hear about “ Cyber Crimes”. Our first thought on “ National Cyber Security” therefore starts on how good is our infrastructure for handling” Cyber Crimes”. This paper focus on cyber security emerging trends while adopting new technologies such asmobile computing, cloud computing, e-commerce, and social networking. The paper also describes thechallenges due to lack of coordination between Security agencies and the Critical IT Infrastructure

Thank's for Your Vote!
Cyber has been misused. a wide range. Page 1
Cyber has been misused. a wide range. Page 2
Cyber has been misused. a wide range. Page 3

This work, titled "Cyber has been misused. a wide range" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cyber has been misused. a wide range'. 11 September.

Reference

AssignBuster. (2022, September 11). Cyber has been misused. a wide range. Retrieved from https://assignbuster.com/cyber-has-been-misused-a-wide-range/

References

AssignBuster. 2022. "Cyber has been misused. a wide range." September 11, 2022. https://assignbuster.com/cyber-has-been-misused-a-wide-range/.

1. AssignBuster. "Cyber has been misused. a wide range." September 11, 2022. https://assignbuster.com/cyber-has-been-misused-a-wide-range/.


Bibliography


AssignBuster. "Cyber has been misused. a wide range." September 11, 2022. https://assignbuster.com/cyber-has-been-misused-a-wide-range/.

Work Cited

"Cyber has been misused. a wide range." AssignBuster, 11 Sept. 2022, assignbuster.com/cyber-has-been-misused-a-wide-range/.

Get in Touch

Please, let us know if you have any ideas on improving Cyber has been misused. a wide range, or our service. We will be happy to hear what you think: [email protected]