Cyber Security Evolution and Conceptualization

Authors

  • Zouqiong H Assistant Professor, Department of Information System, Chengdu University of Technology, Sichuan, China

DOI:

https://doi.org/10.54741/ssjar.3.1.1

Keywords:

cyber safety, metaphors, internet engineering task force, intrusion detection system

Abstract

Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber security should be introduced to and ingrained from a young age. Security countermeasures aid in preserving the confidentiality, availability, and integrity of information systems by preventing or lessening asset losses brought on by cyber security threats. An intrusion detection system (IDS) application analyses what happens during an execution and searches for indications that the computer has been mistreated. Numerous metaphors, including those relating to biological processes, healthcare, markets, three-dimensional space, and the preservation of tangible goods, were taken into account. These in turn sparked the investigation of a wide range of prospective tactics for advancing cyber security in the future. The concepts of "Heterogeneity," "Motivating Secure Behaviour," and "Cyber Wellness" were employed to define these tactics. Cyber security plays an important role in the development of information technology and Internet services. Our attention tends to gravitate toward "Cyber Security" when we hear about "Cyber Crimes." Therefore, how well our system handles "Cyber Crimes" is the first factor we take into account when talking about "National Cyber Security". This newsletter focuses on expanding trends in cyber security in light of the widespread adoption of cutting-edge technologies including mobile computing, cloud computing, e-commerce, and social networking. In the research, it is also covered how challenges are exacerbated by a lack of coordination between security organizations and crucial IT infrastructures.

Downloads

Download data is not yet available.

References

Himanshu Arora, Tanuj Manglani, Geetanjli Bakshi, & Shikha Choudhary. (2022). Cyber security challenges and trends on recent technologies. in 6th International Conference on Computing Methodologies and Communication (ICCMC).

Christos Xenakis. (2008). Security in 2.5G mobile systems. IGI Global.

Loren Paul Rees, Jason K. Deane, Terry R. Rakes, & Wade H. Baker. (2011). Decision support for Cybersecurity risk planning. Decision Support Systems.

Verma, A. K., & A. K. Sharma. (2014). Cyber security issues and recommendations. International Journal of Advanced Research in Computer Science and Software Engineering, 4(4), 629–634.

Dr. Vivekananth.P. (2022). Cybersecurity risks in remote working environment and strategies to mitigate them. International Journal of Engineering and Management Research, 12(1), 108–111. Available at: https://doi.org/10.31033/ijemr.12.1.13.

Published

31-01-2023

How to Cite

Zouqiong H. (2023). Cyber Security Evolution and Conceptualization. Social Science Journal for Advanced Research, 3(1), 1–5. https://doi.org/10.54741/ssjar.3.1.1