Information Security Awareness Among Postgraduate Students: A Study of Mangalore University

Information Security Awareness Among Postgraduate Students: A Study of Mangalore University

Dayanandappa Kori, Renuka Naik
DOI: 10.4018/978-1-6684-4755-0.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Information security prevents unauthorized access to using, disclosing, altering, inspecting, recording, or destroying information. Information security programs are designed to achieve three main goals: confidentiality, integrity, and availability of information. The study highlights awareness and perceptions of information security among postgraduate students. To make everyone aware of the opportunities and difficulties that exist in today's threat landscape, modify risk behaviour, and develop or strengthen a secure corporate culture, information security awareness training is required to be effective. This paper aims to assess information security awareness among Postgraduates of Mangalore University. A survey was conducted, and appropriate tools and technologies were used to collect and interpret the data. Based on the results, suggestions for information security among postgraduate students were made.
Chapter Preview
Top

Introduction

In today's world, the Internet is considered a necessary part of our daily lives, and the number of people who use it is increasing at an alarming rate. As information and communication technology has advanced and the proliferation of low-cost and simple-to-use devices, more data has been produced, and more information has been used. Information security is required to protect confidential information. Information Security (IS)-related events continue to occur even though security logs have been established. Because of this, it is critical to increasing students' understanding of ethical and unethical perceptions of information technology in today's society, particularly in the classroom. Information security refers to keeping information secret to prevent it from being used or read by someone with malicious intent and extorting information from sources without authorization. Traditionally, the difficulty that arises from the inability to transfer data to those who have received formal education has been viewed as the opposite. They safeguard the community's interests and the fundamental amenities that society requires and possesses in such areas. When a society expands, the exchange of information becomes increasingly necessary. Information security was initially intended to protect only written and oral communication, but it became necessary to keep the general public away from readily available information as time went on. As a result, information was kept confidential to protect the community from harm.

Key Terms in this Chapter

Cybercrime: Cybercrime is a crime involving a computer and a network. The computer may have been used to commission a crime, or it may be the target. Cybercrime can affect a person's security and financial health.

Internet Safety: Internet Safety or Online Safety or Cybersecurity and E-Security seek to be safe on the Internet. It maximizes a user's awareness of personal safety and security risks to private information and property related to Internet use and self- Protection against computer crime.

Virus: It is malware that replicates and propagates itself by inserting copies of itself into other executable code or documents.

Privacy Settings: Privacy settings are “the part of a social networking website, internet browser, piece of software, etc. that allows to control who sees information about you.” With the growing prevalence of social networking services, opportunities for privacy.

Phishing: The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.

Hacker: An unauthorized user attempting or gaining access to an information system.

Scammer: Someone who tries to cheat people, especially by tricking them into paying for non-existent goods or services.

Cyber Bullying: Cyber bullying or cyber harassment is a form of electronic bullying or harassment. Cyber bullying and cyber harassment are also known as online bullying. It has become more common, especially among teenagers, as the digital sphere expands and technology has advanced.

Hacking Websites: Unauthorized access to a website belonging to a personal or professional space.

Information Security: Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, alteration, or destruction. It is the practice of protecting information by mitigating information risks.

Advanced Worm and Trojan: This malware disguises itself as regular software, but once invoked, it causes damage to hard drives and backend systems and corrupts mapping systems.

Malicious Codes: It is a kind of security threat where every code present in software tends to bring harmful effects, breach system security, or damage the system.

Internet Security: It encompasses Internet, browser security, website security, and network security to other applications or operating systems. The aim is to set up rules and measures against attacks via the Internet.

Cyber Attack: A cyber attack is an attempt to gain unauthorized access to a computer, computer system, or computer network with the intent to cause harm. Cyber attacks aim to paralyze, disrupt, destroy or control computer systems or change, block, delete, manipulate or steal the data stored in these systems.

Ethics: Moral principles govern a person's behavior or the performance of an activity. The discipline deals with what is morally good and evil and morally right and wrong.

Complete Chapter List

Search this Book:
Reset