A Strategical Transition from Information Security to Cyber-Security

Authors(1) :-Rashmi B H

Cybersecurity is gaining more popularity in the field of Computer science and network security due to change in the technologies and development. Basically Cybersecurity deals with the protection of computer systems from threat, various malwares, theft or damage to hardware or software data. Cybersecurity is also termed as Computer security or IT security. Cybersecurity is gaining wider acceptance because of increasing reliability on Computer systems, Internet, Wi-Fi and most importantly due to the substantial growth of Smart devices. Moreover there is a great overlap among Information security and Cybersecurity. The paper more urges on Cybersecurity whose security boundaries goes beyond Information security. Cybersecurity not only protects resources but also focuses on securing the personal assets of the humans. Information security describes the role played by humans in protecting the computer system from unauthorized access or use, whereas Cybersecurity particularly targets on humans, because humans are referred to as potential targets on Cyber-attack, i.e.; knowingly or unknowingly people would be involved in Cyber-attack. Therefore this additional feature of Cybersecurity has a profound implications on society, since the protection of certain vulnerabilities and humans, especially children is a major social responsibility.

Authors and Affiliations

Rashmi B H
Assistant Professor, Department of Computer Science & Engineering, Global Academy of Technology Bangalore, Karnataka, India

Cybersecurity, Information security, Cyber-attack, Computer security, Threat, Vulnerability

  1. Nir Kshetri,"Cybercrime and Cyber-security Issues Associated with China: Some Economic and Institutional Considerations", Electronic Commerce Research 13 (1): 41-69.
  2. Myriam Dunn Cavelty," Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities", Springer Science +Business Media Dordrecht 2014.
  3. Noam Ben-Asher, Cleotilde Gonzalez," Effects of cyber security knowledge on attack detection", 0747-5632/_ 2015 Elsevier Ltd. All rights reserved.
  4. PGarci-a-Teodoroa,,J.Di-az-Verdejoa, G. Macia--Ferna-ndeza,E.Va-zquezb, Anomaly-based network intrusion detection: Techniques, systems and challenges", 2008 Elsevier Ltd.

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 700-704
Manuscript Number : CSEIT1835185
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Rashmi B H, "A Strategical Transition from Information Security to Cyber-Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.700-704, May-June-2018. |          | BibTeX | RIS | CSV

Article Preview