-
Essay / Cybersecurity Essay - 1484
What is Cybersecurity? Cybersecurity can be defined as “the measures taken to protect a computer or computer system (such as on the Internet) against unauthorized access or attack.” (Boulock 283). In other words, an attempt by individuals to protect their personal information and other digital assets from attacks in the cyber world. Why is cybersecurity important? Primarily, cybersecurity was created due to the sensitive information frequently stored on computers connected to the Internet. Many tasks that were once done by hand are now accomplished through the use of a computer. Due to our increasing dependence on computers and the massive amount of sensitive information stored on networks, the operation of cybersecurity programs is necessary to effectively block dangerous or predatory cyberattacks as well as any acts of theft of identify. How does cyberterrorism pose a real threat? Today, many members of society have become very dependent on the use of technology. We rely on the Internet to bank, buy things, and stay in touch. Businesses rely on their networks to interact with customers, process transactions, and reach new markets. Transportation, financial, energy, and communications systems, as well as our government and military, rely heavily on computer networks to function. This is how you get your electricity, your Social Security check, and your veterans benefits. The use of computers and associated networks has developed cybersecurity issues. Cybersecurity is an important issue to consider if people want to protect themselves against people and malware from the Internet. Cybercrime mainly concerns individuals who seek personal gain and most threats to computer networks come...... middle of paper ...... they are not careful and do not use cybercrime sites trusted and do not have security passwords for their networks or let alone secure ones. Cybersecurity defines the measures taken to protect a computer or computer system against unauthorized access or attack. Not to mention that every day is a new fight against cybercrime, and as technology continues to develop new and improved versions of things, the war will continue. As many tasks once done by hand are replaced by tablets, laptops, iPads, etc. and that the massive amount of sensitive information stored on networks, the operation of cybersecurity programs is necessary to effectively block dangerous or predatory cyberattacks and any acts of identity theft, but it is up to you to make this decision about what you are willing to trust and who you trust with the information you put out there.