Abstract
The term cybercrime is associated with illegal activity involving systems and software. Cybercrime encompasses anything from digital espionage to dishonesty assaults that result in monetary losses for e-commerce businesses (Ekanayake et al., 2020). Cybersecurity is a challenge to almost all modern technology. Numerous strategies have been implemented to protect a customer organizations culture. Cybersecurity refers to a range of approaches for preventing illegal exposure to systems software and information. The paper focuses on the various definitions of cybersecurity and the dimensions and principles to protect against the data on the hardware and software from unauthorized access, harm, or misuse. The three dimensions of cybersecurity and the information security triad ensure overall security and ensure that it operates at its total capacity. The organization is viewed as a computing environment in which people, activities, data, technology, and networks are combined to generate business value.
Introduction
With the recent advances in technology, every person has access to the internet, and it has changed the way we all talk, play, work, shop, listen, make friends, name it, and there is an app for that. Due to this, the cyber system has become more vulnerable to hacking. The most common cyber-attacks that occur target business organizations, the military, the government, and other financial organizations such as the banking industry with high economic power. To utilize a portable computer with assurance, a person or business should first confirm that it will not be hacked in just about any manner. Therefore all connections are safe (Bourgeois, 2014). Many cybersecurity issues affect technology. Consequently, this article reveals the dimensions and principles of cybersecurity and how they are essential in maintaining overall security. They ensure that the business operates to its full potential without any threat.
What is Cybersecurity?
Cybersecurity is the practice of protecting any internet-connected systems, networks, software and different types of data from cyber-attacks (Ekanayake et al., 2020 p, 2).
According to Rashid, Chivers, Danezis &Martin (2018), Cybersecurity refers to the protection of information systems hardware, software, and associated infrastructure the data on them and the services they provide from unauthorized access, harm or misuse. (P, 3). A component of cybersecurity is the protection aimed at ensuring user privacy, accuracy, and accessibility.
It can also be classified as the art of protecting networks, devices, and data from unauthorized access or criminal...
For case in point, the National Security Telecommunications and Information Systems Committee uses the cybersecurity cube, commonly known as the McCumber cube. As with the models, the value lies in adapting to the information environment irrespective of the specific technologies involved. The three cybersecurity fundamentals are represented in the very first level of the cybersecurity cube. The secondary level describes the key forms of data. Finally, the cubes third dimension indicates the level of knowledge necessary to ensure security.The principles of security
The purpose of cybersecurity is to secure cyberspace, which is the first dimension. The underlying concepts are located in the first dimension (Golovanteko, 2018). Defining the nature of information is a tedious task. Different mechanisms are employed to maintain or ensure the entire transmission column and examine all security-related characteristics that get enforced. Various relevant security-related safeguards are reviewed from the cube to verify that the content in the transmission state has the required sense of individual guarantee. Whether low, medium or high, the reports value helps determine the degree to which the security requirements are enforced (McCumber, 2004 p, 137).
The States of data
The storage state is described as the condition in which data is stored in a dedicated server at repose. The database environments supporting programs analyze and send data into or out of the system (McCumber, 2004, p, 141). The second dimension of the cube requires protection from cyberspace professionals tasked to account for data safeguarding in transit, rest or storage, or process.
Cybersecurity safeguards
Modern technological platforms have their operational state. If no computers systems are involved, the processing is a regular human activity. The laptop is only executing the commands coded by a human. The dimension identifies the powers used to protect the cyber world (McCumber, 2004 p, 146). The three capabilities encompass the equipment and technologies available to safeguard information systems and the rules and practices that are in place to protect such systems. It enables the citizens of the cyber world to stay safe. These people are aware and knowledgeable about the dangers in the world and those that threatened the world (Golovanteko, 2018).
Principles of cybersecurity
Understanding various cyber threats and implementing defense tactics that help maintain the privacy, authenticity, and accessibility of any electronic information technology is what cybersecurity is all about.
Confidentiality
Another term for confidentiality is privacy. Its a word for preventing information from being accessed by unauthorized users or networks. Most organizations collect data that may or might not be sensitive. Data that is not sensitive is publicly available, but sensitive data is protected from unauthorized access (McCumber, 2004, p, 35). Data security necessitates the use of establishment of policies and procedures. The numerous cryptosystems in…
References
Bourgeois, D. (2014). Information systems for business and beyond. The Saylor Foundation.
Ekanayake, Nimesh & Karunarathna, Hashan & Miyuranga, Ravindu. (2020). What is Cybersecurity: The Reality of Modern Threats
Golovanteko, I. (2018). The Three Dimensions of the Cybersecurity Cube - Swan Software Solutions. Retrieved 11 June 2021, from https://swansoftwaresolutions.com/the-three-dimensions-of-the-cybersecurity-cube/
McCumber, J. (2004). Assessing and managing security risk in IT systems: A structured methodology. CRC Press.
What is Cybersecurity? | CISA. (2019). Retrieved 11 June 2021, from https://us-cert.cisa.gov/ncas/tips/ST04-001
The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored
Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware
The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.
Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now