Cyber-Security: The Concept Of Cyber Security

Superior Essays
Cyber Security: The Concept
Protecting ICT systems alongside their content is popularly known as cyber security. Without a doubt, the concept is both broad and fuzzy. Although useful, the term lacks a precise definition since it refers to either one or three of the following components, as elucidated by Fischer (2015):
1. A collection of activities and measures aimed at protection from attacks, disruptions, or threats to computers and their networks, related hardware and software, as well as information contained or communicated, such as software and data, in addition to aspects of cyberspace;
2. The quality or state of protection from the multiplicity of the above or related threats; and
3. The wider field of endeavor targeted at implementing or improving activities or quality of protection.
Based on the above definitions, it is clear that cyber security as a concept is contentious and difficult to define owing to its extensive components. The three aspects
…show more content…
Privacy denotes the capacity of a person to control or restrict access to his/her individual information by other people (Singer & Friedman, 2014). Consequently, positive cyber security should protect the privacy of participants on electronic platforms. However, shared information is likely to include some data that is considered private by given observers. Cyber security can serve as a way to protect individuals from unanticipated surveillance and information gathering from protected systems. However, in instances where the aim of the discussed concept is to advance protection against cyber-attacks, activities of such nature are likely to influence cyber security. Besides, surveillance through monitoring information flow within a system is an important attribute of cyber security (Singer & Friedman,

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As the danger of cyber security increases, the desire for protection increases as well. In order to fulfill this desire, laws must be established. The creation of laws are outlined to individuals on what can or cannot be done legally. With strict laws on situations, this warns individuals on what they are able to do and if they do not follow these laws what repercussions they will then face. Likewise, technology can then help to increase the access of laws to individuals in their awareness of laws.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    It is supremely useful to identify sources of the vulnerabilities. Ramarkrishnan and Sekar (2002) argue that vulnerabilities stem from interactions among several system components such as operating system, file system, sever processor, and content. There is ample evidence that IT systems are facing serious security challenges. The nature of the threat has evolved, and with it, the sources, the perpetrators, the intent, and the consequence (Yeh and Chang, 2007). From the fear of forced access to physical entities…

    • 4254 Words
    • 18 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays