A Strategical Transition from Information Security to Cyber-Security

Authors

  • Rashmi B H  Assistant Professor, Department of Computer Science & Engineering, Global Academy of Technology Bangalore, Karnataka, India

Keywords:

Cybersecurity, Information security, Cyber-attack, Computer security, Threat, Vulnerability

Abstract

Cybersecurity is gaining more popularity in the field of Computer science and network security due to change in the technologies and development. Basically Cybersecurity deals with the protection of computer systems from threat, various malwares, theft or damage to hardware or software data. Cybersecurity is also termed as Computer security or IT security. Cybersecurity is gaining wider acceptance because of increasing reliability on Computer systems, Internet, Wi-Fi and most importantly due to the substantial growth of Smart devices. Moreover there is a great overlap among Information security and Cybersecurity. The paper more urges on Cybersecurity whose security boundaries goes beyond Information security. Cybersecurity not only protects resources but also focuses on securing the personal assets of the humans. Information security describes the role played by humans in protecting the computer system from unauthorized access or use, whereas Cybersecurity particularly targets on humans, because humans are referred to as potential targets on Cyber-attack, i.e.; knowingly or unknowingly people would be involved in Cyber-attack. Therefore this additional feature of Cybersecurity has a profound implications on society, since the protection of certain vulnerabilities and humans, especially children is a major social responsibility.

References

  1. Nir Kshetri,"Cybercrime and Cyber-security Issues Associated with China: Some Economic and Institutional Considerations", Electronic Commerce Research 13 (1): 41-69.
  2. Myriam Dunn Cavelty," Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities", Springer Science +Business Media Dordrecht 2014.
  3. Noam Ben-Asher, Cleotilde Gonzalez," Effects of cyber security knowledge on attack detection", 0747-5632/_ 2015 Elsevier Ltd. All rights reserved.
  4. PGarci-a-Teodoroa,,J.Di-az-Verdejoa, G. Macia--Ferna-ndeza,E.Va-zquezb, Anomaly-based network intrusion detection: Techniques, systems and challenges", 2008 Elsevier Ltd.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Rashmi B H, " A Strategical Transition from Information Security to Cyber-Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.700-704, May-June-2018.