- Published: September 11, 2022
- Updated: September 11, 2022
- University / College: Loughborough University
- Language: English
- Downloads: 4
Cyber security is the activity of protecting information and information systems (networks, computers, data bases, data centres and applications) with appropriate procedural and technological securitymeasures. Firewalls, antivirus software, and other technological solutions for safeguarding personal data andcomputer networks are essential but not sufficient to ensure security. As our nation rapidly building its CyberInfrastructure, it is equally important that we educate our population to work properly with this infrastructure.
Cyber-Ethics, Cyber-Safety, and Cyber-Security issues need to be integrated in the educational processbeginning at an early age. Security counter measures help ensure the confidentiality, availability, and integrityof information systems by preventing or mitigating asset losses from Cyber security attacks. Recently cybersecurity has emerged as an established discipline for computer systems andinfrastructures with a focus onprotection of valuable information stored on those systems fromadversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. An Intrusion Detection System (IDS) is a program that analyses whathappens or has happened during an execution and tries to find indications that the computer has been misused.
A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led toconsideration of a variety of possible approaches for improving cyber security in the future. These approacheswere labelled “ Heterogeneity” ,” Motivating Secure Behaviour” and “ Cyber Wellness” . Cyber Security plays an important role in the development of information technology as well asInternet services.
Our attention is usually drawn on “ Cyber Security” when we hear about “ Cyber Crimes”. Our first thought on “ National Cyber Security” therefore starts on how good is our infrastructure for handling” Cyber Crimes”. This paper focus on cyber security emerging trends while adopting new technologies such asmobile computing, cloud computing, e-commerce, and social networking. The paper also describes thechallenges due to lack of coordination between Security agencies and the Critical IT Infrastructure