logo

Social and Cultural Impact of the Use of ICT Associated With Cyber Security | Report

   

Added on  2022-09-08

15 Pages4018 Words9 Views
Running head: CYBER SECURITY
Social and Cultural Impact of the Use of ICT associated with Cyber Security
Name of the Student
Name of the University
Author’s Note:

1
CYBER SECURITY
Abstract
The aim of this report is to understand the relevance of ICT over cyber security for the case
study of Cambridge Analytica. Various threats and risks related to computer security are well
eradicated without much complexity and the confidential data and systems are protected
effectively. These threats are possible dangers, which could majorly hamper the normal
functionality of the system and are majorly increasing when the entire cyber world is
becoming digitalized. A part of the data could be highly sensitive information, irrespective of
the fact that these could intellectual properties, personalized information, financial data and
any other type of data for which unauthorized exposure or accessibility could comprise of
negative consequences. A proper convergence of telephone networks and audio visual
networks with the computerized networks is possible via a single cabling and linking system
with ICT. It can easily cover up any product, which would store, manipulate, retrieve or
transmit information electronically in a digitalized format. This report has identified the
social and cultural impacts of the effect of ICT on cyber security for Cambridge Analytica
case study.

2
CYBER SECURITY
Table of Contents
1. Introduction............................................................................................................................3
2. Discussion..............................................................................................................................3
2.1 Identification of the Main Aspects or Features of Cyber Security...................................3
2.2 Analysis of the Social Impacts relevant to the Effect of ICT on Cyber Security............5
2.3 Analysis of the Cultural Impacts relevant to the Effect of ICT on Cyber Security.........8
3. Conclusion............................................................................................................................10
References................................................................................................................................12

3
CYBER SECURITY
1. Introduction
Cyber security can be referred to as the body of processes, practices and technologies
that are being designed for protection of data, programs, devices and networks from any type
of unauthorized accessibility, damage and attack (Elmaghraby & Losavio, 2014). It is
referred to as the security of information technology. It is vital since different organizations
of medical, military, financial, government and corporate for collecting, processing and even
storing unprecedented amount of data over computerized systems and any other device.
Cyber security is responsible for describing the discipline that is dedicated to wards
protection that the respective information as well as systems are being utilized for processing
and storing of the data (Buczak & Guven, 2015). The following report outlines a brief
discussion on the cultural and social impacts of the overall utilization of information and
communication technology on cyber security with relevant details for the popular case study
of Cambridge Analytica.
2. Discussion
2.1 Identification of the Main Aspects or Features of Cyber Security
Cyber security is the proper protection of different computerized systems from
damage or theft to the hardware, electronic data and software from any type of disruption and
misdirection of the services, provided by them (Cherdantseva et al., 2016). An increased
dependency on computer systems, wireless network standards and internet helps to develop
the system in an effective manner. It is the procedure to prevent and detect any type of
unauthorized utilization of computer systems that can easily communicate on the computer
networks. There are few controls, which are being put in place for providing confidentiality,
integrity and availability of the elements of the systems (Wells et al., 2014).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Cyber Security: Analyst, Policy, and Recommendations for Skyward Co
|10
|1963
|53

ICT Professional Practice and Ethics: Cambridge Analytica Case Study
|16
|3824
|384

ICT Professional Practice and Ethics: Cambridge Analytica Case Study
|16
|3864
|61

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Identifying and Combating Emerging Threats in Information Systems
|9
|1758
|300