Jan 🐝 Barbosa

hace 3 años · 2 min. de lectura · visibility 0 ·

chat Contactar con el autor

thumb_up Relevante message Comentar

20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA

20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA#infosec
#cybersecurityThere is a reason why corporations (and hackers) are trying to gather as much of your data as possible. The clicks you make, the videos you watch, the resume you give in a job interview, the photos you post, all these little pieces of seemly random information add-on to create a picture of you as a consumer. The fact is, that data has become more precious than gold, and you not being aware of that fact will not protect you at all.

Cyber Security and Information Security deal with the ever-increasing problem of how to maintain your information secure. While both terms deal with the security of information, they differ on how broad their responsibility reach is. 

Cyber Security deals with data that is stored in electronic form.

Wikipedia defines Cyber Security as: " The protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.

Cybersecurity includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data, and code injection. Also, due to malpractice by operators, whether intentional or accidental, ITsecurity is susceptible to being tricked into deviating from secure procedures through various methods."

Information Security on the other hand also deals with security not stored in electronic format. Think of information locked on cabinets, desk drawers or even thrown in the garbage containers. It might be manuals, maps, job resumes, health records and microfiche cards.

Wikipedia defines Cyber Security as: "The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g., electronic, physical).Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls, followed by an assessment of the effectiveness of the risk management plan.

Cyber Security and Information Security both deal in protecting data that in the wrong hands could cause havoc in our lives. Identity theft causes billions of dollars to consumers and banks, Ransomware has wiped out terabytes of critical data to those unwilling to yield to hackers demands. Both Cyber Security and  Information Security are one of our most important lines of defense against these ever-increasing attacks. 

These are the top 20 voices of  Cyber Security and Information Security for the month of March 2018 as gathered by @klout.

CYBER SECURITY:

d5cce782.png




























INFORMATION SECURITY:

e8d3dff1.png




















Congratulations and thanks to all the great minds sharing their knowledge of Cyber Security and Information Security.


Jan Barbosa Is a global brand ambassador for beBEE.com, also an Onalytica 2016 Top One Hundred Augmented Reality Influencer and Interested in Social Media, Influencer Marketing & Personal Branding. 

As a technology advocate, he strongly promotes and participates in areas such as Artificial Intelligence, Augmented / Virtual Reality, and Cyber Security.

All articles are initially published in beBEE.com using the superb beBEE Producer tool.

Feel free to Follow Jan Barbosa on Twitter, LinkedIn or beBEE.com


thumb_up Relevante message Comentar
Comentarios

CityVP Manjit

hace 3 años #2

#5
This is something I want to come back to and explore, especially now as I spend an outrageous amount of time with media and club development for the campus toastmasters club I am associated with - that includes some 200+ tweets this month to put some meat on the bone for just one Twitter account at @sbotoastmasters - so will be glad when I can digest your links when I have uninterrupted time and space to think about this particular sector of technology.

Jan 🐝 Barbosa

hace 3 años #1

Thanks for the RT CityVP \ud83d\udc1d Manjit !!! :)

Más artículos de Jan 🐝 Barbosa

Ver blog
hace 2 años · 1 min. de lectura

A Cybersecurity Drought Is Coming

According to the United States Department of Labor ...

hace 3 años · 1 min. de lectura
hace 3 años · 1 min. de lectura

20 TOP TWITTER VOICES OF BIG DATA FOR APRIL 2018 BY JAN BARBOSA

As the world of technology progresses into every a ...