Cyber Security Discussion
Cyber Security Discussion
Course Title
Student’s name
Institution
Professor’s name
Date
2
activities, training, and technology are needed. The assets of an organization or user comprise its
staff, infrastructure, software, services, communications networks, and all of the information that
is transported and/or stored in the cyber world. In order to protect an organization's and a
customer's assets from relevant security threats in the cyber world, cybersecurity aims to assure
their accomplishment and preservation. The following accessibility, integrity, and secrecy are the
The goal of security is to shield assets from the numerous dangers that arise from
particular built-in weaknesses. The selection and execution of security protocols, also known as
countermeasures, that serve to lower the risk provided by vulnerabilities, are often the focus of
security procedures. The fundamental ICT infrastructure is the asset that has to be secured in the
instance of ICT security. On the other side, information security broadens this description of the
resources to be secured to cover every facet of the data itself (von Solms & van Niekerk, 2013).
As a result, it covers the safeguarding of the fundamental ICT assets as well as data that is not
Even intangible assets may be impacted by these weaknesses. Cybersecurity, for instance,
adds a significant ethical component since issues like cyberbullying transcend legal boundaries
and raise moral questions that society as a whole must address. This ethical aspect also applies to
issues like botnets. It is feasible for a botnet to just "take" clock cycles from a computer when it
would normally be idle. Being a component of a botnet does not necessarily indicate that one's
data resources' secrecy, authenticity, availability, or other qualities have been negatively
3
impacted. However, the proprietor of the computer in issue may be an unwitting partner if this
It's critical to understand that there is no such thing as total security in terms of science.
Instead, accurate threat modeling, a description of the system, and the parameters we want to
ensure must all be included in any relevant comments regarding a system's security. Advanced
encryption experts are aware of this, but other fields may not always fully appreciate it. As a
result, we see cryptography as a model for the future growth of a more comprehensive security
science. We anticipate security architecture will be used more widely as a unifying strategy since
openly defining our security goals enables us to confirm that an implementation serves the
intended purpose. Furthermore, having specific objectives enables us to evaluate possibilities and
choose the ideal answer. Despite the fact that it would seem clear, this model is not always
observed, historically, which has resulted in less-than-ideal and occasionally unsafe buildings
(Landwehr et al., 2012). The tale of encryption algorithm, a type of encryption that guarantees
both secrecy and integrity, serves as a suitable illustration. The challenge with security is to
protect against a persistent network adversary who may tamper with communications while they
References
Landwehr, C., Boneh, D., Mitchell, J. C., Bellovin, S. M., Landau, S., & Lesk, M. E. (2012).
Privacy and cybersecurity: The next 100 years. Proceedings of the IEEE, 100(Special
von Solms, R., & van Niekerk, J. (2013). From information security to cyber security.