0% found this document useful (0 votes)
23 views4 pages

Cyber Security Discussion

The document discusses the importance of cybersecurity in protecting an organization's and customer's assets from various threats in cyberspace, emphasizing the need for tools, regulations, and risk management techniques. It highlights the ethical implications of cybersecurity issues, such as cyberbullying and botnets, and stresses that total security is unattainable, requiring accurate threat modeling and clear security goals. The document also advocates for a comprehensive security architecture to effectively address vulnerabilities and ensure the integrity and confidentiality of information.

Uploaded by

Sydney Mitto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

Cyber Security Discussion

The document discusses the importance of cybersecurity in protecting an organization's and customer's assets from various threats in cyberspace, emphasizing the need for tools, regulations, and risk management techniques. It highlights the ethical implications of cybersecurity issues, such as cyberbullying and botnets, and stresses that total security is unattainable, requiring accurate threat modeling and clear security goals. The document also advocates for a comprehensive security architecture to effectively address vulnerabilities and ensure the integrity and confidentiality of information.

Uploaded by

Sydney Mitto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

Cyber Security Discussion

Course Title

Student’s name

Institution

Professor’s name

Date
2

Cyber Security Discussion

In order to preserve an organization's and customer's assets in the cyberspace, a variety of

tools, regulations, security concepts, protections, regulations, risk management techniques,

activities, training, and technology are needed. The assets of an organization or user comprise its

staff, infrastructure, software, services, communications networks, and all of the information that

is transported and/or stored in the cyber world. In order to protect an organization's and a

customer's assets from relevant security threats in the cyber world, cybersecurity aims to assure

their accomplishment and preservation. The following accessibility, integrity, and secrecy are the

general security goals (von Solms & van Niekerk, 2013).

The goal of security is to shield assets from the numerous dangers that arise from

particular built-in weaknesses. The selection and execution of security protocols, also known as

countermeasures, that serve to lower the risk provided by vulnerabilities, are often the focus of

security procedures. The fundamental ICT infrastructure is the asset that has to be secured in the

instance of ICT security. On the other side, information security broadens this description of the

resources to be secured to cover every facet of the data itself (von Solms & van Niekerk, 2013).

As a result, it covers the safeguarding of the fundamental ICT assets as well as data that is not

directly stored or transmitted through ICT.

Even intangible assets may be impacted by these weaknesses. Cybersecurity, for instance,

adds a significant ethical component since issues like cyberbullying transcend legal boundaries

and raise moral questions that society as a whole must address. This ethical aspect also applies to

issues like botnets. It is feasible for a botnet to just "take" clock cycles from a computer when it

would normally be idle. Being a component of a botnet does not necessarily indicate that one's

data resources' secrecy, authenticity, availability, or other qualities have been negatively
3

impacted. However, the proprietor of the computer in issue may be an unwitting partner if this

kind of botnet is employed to conduct a crime.

It's critical to understand that there is no such thing as total security in terms of science.

Instead, accurate threat modeling, a description of the system, and the parameters we want to

ensure must all be included in any relevant comments regarding a system's security. Advanced

encryption experts are aware of this, but other fields may not always fully appreciate it. As a

result, we see cryptography as a model for the future growth of a more comprehensive security

science. We anticipate security architecture will be used more widely as a unifying strategy since

openly defining our security goals enables us to confirm that an implementation serves the

intended purpose. Furthermore, having specific objectives enables us to evaluate possibilities and

choose the ideal answer. Despite the fact that it would seem clear, this model is not always

observed, historically, which has resulted in less-than-ideal and occasionally unsafe buildings

(Landwehr et al., 2012). The tale of encryption algorithm, a type of encryption that guarantees

both secrecy and integrity, serves as a suitable illustration. The challenge with security is to

protect against a persistent network adversary who may tamper with communications while they

are being sent in addition to spying.


4

References
Landwehr, C., Boneh, D., Mitchell, J. C., Bellovin, S. M., Landau, S., & Lesk, M. E. (2012).

Privacy and cybersecurity: The next 100 years. Proceedings of the IEEE, 100(Special

Centennial Issue), 1659–1673. https://doi.org/10.1109/jproc.2012.2189794

von Solms, R., & van Niekerk, J. (2013). From information security to cyber security.

Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy