Role of Cyber Security in Today's Scenario

Role of Cyber Security in Today's Scenario

Manju Khari, Gulshan Shrivastava, Sana Gupta, Rashmi Gupta
DOI: 10.4018/978-1-5225-5634-3.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Countermeasures for computer security are discussed along with the Cyber security standards, services, products, consultancy services, governance and strategies. Risk management with the security architecture has also been discussed. Other section involves the regulation and certification controls; recovery and continuity plans and Cyber security skills.
Chapter Preview
Top

Introduction To Cyber Risks And Cyber Criminals

Cyber Risks

The opportunities and risks that devices, digital technologies and media bring us are glaring. Cyber risk is never a purely matter for the IT team, in spite of playing an important (Ericsson & G. N., 2010). An organisation’s risk management function require a deep understanding of the consistently evolving the practical tools and techniques to address them as well as risks.

Cyber Risk Services

Investments in the security are always high, still fortunate cyber-attacks are on the scale, both in sophistication & number (Liu et al, 2012). Whereas today’s “fast-paced technology” artistic powers and new technical initiatives, it opens new domains for the cyber criminals. They focus on personal data & financial assets, but to critical infrastructure and intellectual property also. Our Resilient, Secure & Vigilant method support you to get over the cyber risk so that your business will keep moving.

Complete Chapter List

Search this Book:
Reset