20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA
There is a reason why corporations (and hackers) are trying to gather as much of your data as possible. The clicks you make, the videos you watch, the resume you give in a job interview, the photos you post, all these little pieces of seemly random information add-on to create a picture of you as a consumer. The fact is, that data has become more precious than gold, and you not being aware of that fact will not protect you at all.
Cyber Security and Information Security deal with the ever-increasing problem of how to maintain your information secure. While both terms deal with the security of information, they differ on how broad their responsibility reach is.
Cyber Security deals with data that is stored in electronic form.
Wikipedia defines Cyber Security as: " The protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Cybersecurity includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data, and code injection. Also, due to malpractice by operators, whether intentional or accidental, ITsecurity is susceptible to being tricked into deviating from secure procedures through various methods."
Information Security on the other hand also deals with security not stored in electronic format. Think of information locked on cabinets, desk drawers or even thrown in the garbage containers. It might be manuals, maps, job resumes, health records and microfiche cards.
Wikipedia defines Cyber Security as: "The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g., electronic, physical).Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls, followed by an assessment of the effectiveness of the risk management plan.
Cyber Security and Information Security both deal in protecting data that in the wrong hands could cause havoc in our lives. Identity theft causes billions of dollars to consumers and banks, Ransomware has wiped out terabytes of critical data to those unwilling to yield to hackers demands. Both Cyber Security and Information Security are one of our most important lines of defense against these ever-increasing attacks.
These are the top 20 voices of Cyber Security and Information Security for the month of March 2018 as gathered by @klout.
Congratulations and thanks to all the great minds sharing their knowledge of Cyber Security and Information Security.
As a technology advocate, he strongly promotes and participates in areas such as Artificial Intelligence, Augmented / Virtual Reality, and Cyber Security.
All articles are initially published in beBEE.com using the superb beBEE Producer tool.
According to the United States Department of Labor ...
As the world of technology progresses, · Artificia ...
No tienes grupos que se ajusten a tu búsqueda