Cyber Security

Read Complete Research Material



Cyber Security

Cyber Security

Introduction

Cyber security is mutual task of the government, individuals and private sector; national governments are only capable of leading a shared effort of national cyber security. Government when establishes common objectives, defines the ways to get them, and simplify responsibilities and roles of the stakeholders.

Discussion

It is important in understanding the following terms in the discussion of cyber security; critical infrastructure (CI), non-critical infrastructure, cyber security, critical infrastructure protection (CIP), critical information infrastructure (CII), and critical information infrastructure protection (CIIP). Whereas the proper definitions differ in every country, critical infrastructure includes the essential systems, functions and services whose destruction or disruption will cause a devastating impact on the health and safety, national security, and economic activity of the public. Critical information infrastructure consists of network of communications which allows these elements to work and distribute their services. Destruction to critical information infrastructure can create equal devastating impact on critical infrastructure that reaches beyond the sector of ICT.

Critical infrastructure protection encompasses identifying, managing, and assessing threats to prevent or alleviate attacks on the CI and encouragement of resiliency. Critical information infrastructure protection explains series of activities carried out in order to safeguard the critical information infrastructure. It emphasizes on the deterrence and prevention of critical ICT associated threats and risks. Cyber security is a vast term that includes critical information infrastructure protection and even components that are not considered to be CII, like the networks of computer of medium and small enterprises, or home computers. The purpose of cyber security is to prevent all nasty cyber incidents which influence non-critical information infrastructure and critical information infrastructure in a similar way. Those incidents include distribution of malware and spam, pharming and phishing, denial of the service attacks and many other cyber crimes.

Cyber security Roles and Responsibilities

The protection of the computer is necessary in every technology drives company that works on the computers. The problems related to the systems that are based on the computer and dealing with their various vulnerabilities is a vital role to maintain the operational industries. Nowadays, ICTs are an important element in every aspect of life, from social, political and economic. They guarantee economic stability, facilitate social communications inside countries and even among the nations, and they maintain national security.

Nevertheless as a largely interconnected, open and interdependent system, I.C.Ts are pretty much prone to exploitation hazards and vulnerabilities. In order to make sure that the nation keeps on enjoying the advantages of ICTs, these risks and vulnerabilities controlled, to some limit, by the efforts of cyber security of stakeholders who operate, own, use and develop these networks. Individual users, business, government and private sector companies come in the category of stakeholders. ICT is growing quickly whereas in the same time, their use is even expanding. In the present day, mobile and internet services are an indispensible part of our daily life. The ICT adoption benefits are although multiplied, the threats and risks connected with their usage have even increased. Spam, computer related frauds, phishing and other ...
Related Ads
  • Cyber Security
    www.researchomatic.com...

    Cyber Security Introduction In the history of ...

  • Government Cyber Security...
    www.researchomatic.com...

    Free research that covers how can government justify ...

  • Cyber Security
    www.researchomatic.com...

    Free research that covers introduction there are som ...

  • Cyber Security
    www.researchomatic.com...

    Cyber security measures taken to protect comp ...

  • Cyber Security
    www.researchomatic.com...

    Cyber Security Abstract With the emergence of ...