INFORMATION SECURITY AND CYBER SECURITY

نویسندگان

چکیده

In the era of digital transformation, dependence on information technology services and products has increased significantly. Accordingly, challenges in security cyber have increased. Social distancing, while playing an important role containing spread COVID-19, increases risk infected workstations, unauthorized access, data leakage, malicious code execution, all types risks that come with working a vulnerable environment. Computer security, or - protection computer systems control points networks from its interference, use damage to hardware, software electronic data, as well destruction violation they provide users. This area is becoming more for systems, Internet wireless such Bluetooth Wi-Fi. Because complexity, terms politics technology, also one main modern life. Cyber most fields today's world. branch connected demanding professions specialties as: analyst, engineer, architect, administrator, specialist, consultant, etc. Types Malware (Malware); virus; mobile media means; Trojan (Trojan Horse); rootkit; Backdoor (Backdoor); Worm (Computer worm); Keylogger (Keylogger). 2003, virus Slammer penetrated management system electric distribution network slowed down operation, which caused speed slow down. As result, even small incident like tree falling power line can set off serious chain reaction. particular, US state Ohio, voltage began change, equipment, was installed prevent cascade effect, failed isolate high time. 8 states, 2 Canadian provinces (a total 50 million people) were left without electricity dependent it. example shows what result little carelessness, ignoring issues, space. Today, at never before.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From information security to cyber security

The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...

متن کامل

Integrating Shared Cyber Security Information into Information Security Risk Management

In the last couples of years, the complexity and interconnectedness of Information Systems (IS), and security related incidents increased significantly. In order to guarantee confidentiality, integrity, and availability of these IS an appropriate information security risk management (ISRM) must be in place. Reliable ISRM represents a challenge for organizations, since they take security related...

متن کامل

Cyber-crime Science = Crime Science + Information Security

Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the eff...

متن کامل

Cyber Security and Information Systems Information Analysis Center

The Efficacy and Challenges of SCADA and Smart Grid Integration The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it a number of opportunities for improving efficiencies, but along with those benefits come challenges in the effort to assure safety, security, and reliability for utilities and consumers alike. One of the co...

متن کامل

Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed?

This paper reviews some very negative views, made over the last few years, about Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa. The paper addresses the expressed negative views that Africa can become the vehicle or platform from where cyber-attacks could be launched against the rest of the world. The paper evaluates the reasons for such negative views and th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: GEORGIAN SCIENTISTS

سال: 2023

ISSN: ['2667-9760']

DOI: https://doi.org/10.52340/gs.2023.05.01.28