Reference Hub1
Role of Cyber Security in Today's Scenario

Role of Cyber Security in Today's Scenario

Manju Khari, Gulshan Shrivastava, Sana Gupta, Rashmi Gupta
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch001
Cite Chapter Cite Chapter

MLA

Khari, Manju, et al. "Role of Cyber Security in Today's Scenario." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 1-15. https://doi.org/10.4018/978-1-5225-5634-3.ch001

APA

Khari, M., Shrivastava, G., Gupta, S., & Gupta, R. (2018). Role of Cyber Security in Today's Scenario. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 1-15). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch001

Chicago

Khari, Manju, et al. "Role of Cyber Security in Today's Scenario." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1-15. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch001

Export Reference

Mendeley
Favorite

Abstract

Cyber Security is generally used as substitute with the terms Information Security and Computer Security. This work involves an introduction to the Cyber Security and history of Cyber Security is also discussed. This also includes Cyber Security that goes beyond the limits of the traditional information security to involve not only the security of information tools but also the other assets, involving the person's own confidential information. In computer security or information security, relation to the human is basically to relate their duty(s) in the security process. In Cyber security, the factor has an added dimension, referring humans as the targets for the cyber-attacks or even becoming the part of the cyber-attack unknowingly. This also involves the details about the cybercriminals and cyber risks going ahead with the classification of the Cybercrimes which is against individual, property, organisation and society. Impacts of security breaches are also discussed. Countermeasures for computer security are discussed along with the Cyber security standards, services, products, consultancy services, governance and strategies. Risk management with the security architecture has also been discussed. Other section involves the regulation and certification controls; recovery and continuity plans and Cyber security skills.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.