logo

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures

5 Pages1404 Words493 Views
   

Added on  2023-05-27

About This Document

This article explains the concepts of security, cybersecurity, threats, breaches, and protection measures. It defines terms such as vulnerability, encryption, cybercrime, viruses, worms, malware, cipher, coding, and encoding. The article also provides references for further reading.

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures

   Added on 2023-05-27

ShareRelated Documents
SECURITY
0
Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures_1
SECURITY
1
Security: security is defined as an approach which is used to protect data or
information from hackers. It is state of being free from the cyber-threats and protects
personal data. It refers to the measures which are taken to protect a place, data, devices
and many more (Wei et al., 2014).
Cybersecurity: term cybersecurity is defined as a set of techniques used to
secure computer networks, hardware, from hackers or unauthentic servers. This
process provides a platform to protect personal data or information from hackers and
cyber-attacks and many consumers use this step to improve the performance of their
computer devices (Von Solms, & Van Niekerk, 2013).
Threat: it is defined as a statement of an intention to inflict damage, injury and
in the field of information technology it refers as a security issue due to which
consumers can lose their personal data (Crawford, 2017).
Breach: the term breach refers as a security incident in which the protected,
secured and confidential data or information are copied, transferred and used by an
unauthentic person. Generally, it is used by hackers to encrypt the personal information
of consumer and copy into other computer devices (Black, 2013).
Abuse: it is the improper utilization of an entity, often to unfairly and it can come
into different kinds of forms, for example, injury, physical maltreatment, violation, and
crimes. To use something for wrong determination in a mode which is very harmful is
called as abuse (Lowry, Posey, Bennett & Roberts, 2015).
Vulnerability: it is a part of cyber security which refers to a flaw in a device or
system that can leave it open to attack or crime (Cianfrani, Broennimann, Loy, & Guisan,
2018). It is also defined as a kind of weakness in computer networks and devices which
leaves data security exposed to a threat and issue.
Encryption: It is a kind of technique that encodes the message or information in
an effective manger which can access by the only authentic person. Generally, this type
of process is used in communication to improve the security of consumer data or
information which is transferred from one location to another. In which there are two
types of keys uses for example, private key and public key. In encryption technique
Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment PDF
|9
|2867
|2114

Introduction to Cyber Security
|14
|3209
|388

Cyber Security Assignment 2022
|12
|2845
|22

Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396

Social Engineering and Cybersecurity
|7
|3161
|211

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329