Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
Verified
Added on 2023/05/27
|5
|1404
|493
AI Summary
This article explains the concepts of security, cybersecurity, threats, breaches, and protection measures. It defines terms such as vulnerability, encryption, cybercrime, viruses, worms, malware, cipher, coding, and encoding. The article also provides references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SECURITY 0 Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SECURITY 1 Security:security is defined as an approach which is used to protect data or information from hackers. It is state of being free from the cyber-threats and protects personal data. It refers to the measures which are taken to protect a place, data, devices and many more (Wei et al., 2014). Cybersecurity:term cybersecurity is defined as a set of techniques used to secure computer networks, hardware, from hackers or unauthentic servers. This process provides a platform to protect personal data or information from hackers and cyber-attacks and many consumers use this step to improve the performance of their computer devices(Von Solms, & Van Niekerk, 2013). Threat:it is defined as a statement of an intention to inflict damage, injury and in the field of information technology it refers as a security issue due to which consumers can lose their personal data (Crawford, 2017). Breach:the term breach refers as a security incident in which the protected, secured and confidential data or information are copied, transferred and used by an unauthentic person.Generally, it is used by hackers to encrypt the personal information of consumer and copy into other computer devices (Black, 2013). Abuse:it is the improper utilization of an entity, often to unfairly and it can come into different kinds of forms, for example, injury, physical maltreatment, violation, and crimes.To use something for wrong determination in a mode which is very harmful is called as abuse (Lowry, Posey, Bennett & Roberts, 2015). Vulnerability:it is a part of cyber security which refers to a flaw in a device or system that can leave it open to attack or crime (Cianfrani, Broennimann, Loy, & Guisan, 2018).It is also defined as a kind of weakness in computer networks and devices which leaves data security exposed to a threat and issue. Encryption:It is a kind of technique that encodes the message or information in an effective manger which can access by the only authentic person. Generally, this type of process is used in communication to improve the security of consumer data or information which is transferred from one location to another. In which there are two types of keys uses for example, private key and public key. In encryption technique
SECURITY 2 private key is used that secure human personal data files from hackers and public key is used by hackers to decrypt user’s data (Li, Yu, Zheng, Ren & Lou, 2013). Cybercrime:term cybercrime refer as a crime in which the computing device is the object of the crime which uses malware to hack the personal data or information of consumers.There are different types of cyber crimes occur in a computer system, for example, DDOS attack, ransomware, wanna cry, phishing and spamming (Lusthaus, 2013). Viruses:it is a small infection which replicates only inside the living cells of another organism and it has potential to effects and reduces the performance of computer devices (Yang & Yang, 2014). Worms:it is defined as a malware computer code that replicates itself in order to spread from one computer to another and mainly it is used by attackers to hack the personal information of consumers (Mishra & Ansari, 2012). Malware:it is a kind of software which is designed to damage the computer networks, servers and other peripheral devices of the consumer (Shabtai, Kanonov, Elovici, Glezer & Weiss, 2012). Cipher:it is a computer program which is used to perform encryption and decryption processes (Klinc, Hazay, Jagmohan, Krawczyk & Rabin, 2012). Coding:it is a primary method that provides a way to interconnect human and machine by using computer programming (Gao, Tsang & Chia, 2013). Encoding:it is defined as a process which is used to convert an information or data into a coded form. Mainly, it is used in a communication system to improve the efficiency of the transmitted signal or information (Kapur, Craik, Tulving, Wilson, Houle, & Brown, 2016).
SECURITY 3 References Black, J. (2013). Developments in data security breach liability.The Business Lawyer,69(1), 199-207. Cianfrani, C., Broennimann, O., Loy, A., & Guisan, A. (2018). More than range exposure: Global otter vulnerability to climate change.Biological Conservation,221(2), 103- 113. Crawford, J. T. (2017). Are conservatives more sensitive to threat than liberals? It depends on how we define threat and conservatism.Social cognition,35(4), 354- 373. Gao, S., Tsang, I. W. H., & Chia, L. T. (2013). Laplacian sparse coding, hypergraph laplacian sparse coding, and applications.IEEE Transactions on Pattern Analysis and Machine Intelligence,35(1), 92-104. Kapur, S., Craik, F. I., Tulving, E., Wilson, A. A., Houle, S., & Brown, G. M. (2016). 12 Neuroanatomical Correlates of Encoding in Episodic Memory.Memory, Attention, and Aging: Selected Works of Fergus IM Craik, 12(2, 251. Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H., & Rabin, T. (2012). On compression of data encrypted with block ciphers.IEEE transactions on information theory,58(11), 6989-7001. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Lowry, P. B., Posey, C., Bennett, R. B. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust.Information Systems Journal,25(3), 193-273. Lusthaus, J. (2013). How organised is organised cybercrime?.Global Crime,14(1), 52-60. Mishra, B. K., & Ansari, G. M. (2012). Differential Epidemic Model of Virus and Worms in Computer Network.IJ Network security,14(3), 149-155. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2012). “Andromaly”: a behavioral malware detection framework for android devices.Journal of Intelligent Information Systems,38(1), 161-190.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SECURITY 4 Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.computers & security,38(2), 97-102. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Yang, L. X., & Yang, X. (2014). The spread of computer viruses over a reduced scale-free network.Physica A: Statistical Mechanicsand Its Applications,396, 173-184.