TO: Prof. Jason Ellis
FROM: Mohammad Amin
DATE: Due Date
SUBJECT: Expanded Definition of Cyber Security
Introduction
I going to discuss abut cyber security. I’m defining cybersecurity term. I’m going to give definition and quotation to explain this term. In the following document I’m going to discuss definition and provide quotes. And finally, I’ll explain all of this in working definition in my own words.
Definitions
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this: some people have argued that the threat to cybersecurity has been somewhat inflated.
This definition means to prevent unauthorized persons from accessing electronic data and to protect all data from attacks by unauthorized persons.
Cybersecurity changes over time and these changes are different with a more complete understanding of cybersecurity self-efficacy and engagement trends.
This definition means, The type of cyber-attack changes over time so the type of cyber security also has to change. To protect against cyber-attacks, cyber security has to be modified and improved day by day. In order to increase their cybersecurity level in their own place.
Similar: The two definitions are to take appropriate action to prevent the theft of any information or the use of any information without permission. And cyber security needs to be updated over time. And ensure cyber security.
The first definition protects against criminal or unauthorized use of electronic information, and the second deals with changes in deals and the self-efficacy of cybersecurity over time.
Context
With the advent of electronic voting, some cybersecurity experts worry elections can too easily be rigged. Here Electoral System Electronics Cyber security experts fear that the polls could be rigged easily. I have found this context quote on this Book call Cybersecurity.
“The existing cyber-side and physical-side security defense systems are relatively isolated. For cyber-attacks, the main approaches to situation awareness and defense are executed at the cyber side, whereas the physical side has not been actively involved in these efforts. In many circumstances, state information of the physical side of the system can assist in the identification and traceback of cyber-attacks. The measures at the physical side can help prevent or reduce the risk caused by cyber-attacks.” This quote means Cyber protection It cannot be physically provided. It has to be defended online to protect against online attacks. Situation awareness is implemented on the defensive side which can help in overall cyber security information cyber-attack detection and identification. Physical state information can help in the detection and identification of cyber-attacks. Physical measures help prevent or reduce the risks posed by cyber-attacks. I have found this quote from “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,”
Similar: In both cases there is a complete lack of cyber security where there is a lot of risk involved
Electronic voting has been mentioned in the first conflict where experts fear that if cyber security is not increased here, then the results of electronic voting may change. There is talk of rigging here
In the second conflict, it was stated that cyber security’s defense system should be physically and informally aware of cyber-attacks so that they do not undergo cyber-attacks in any process. Helps to reduce the risk caused.
Working definition
Cyber security is the act of preventing someone from stealing a document or misrepresenting information online without someone’s permission. Taking any information from the file without permission is called cyber-attack. And cybersecurity is about preventing anyone from taking information without permission.
Reference:
https://www-oxfordreference-com.citytech.ezproxy.cuny.edu/view/10.1093/acref/9780199571123.001.0001/m_en_gb0994436?rskey=5p9BbD&result=5
L. C. Amo, R. Liao, E. Frank, H. R. Rao and S. Upadhyaya, “Cybersecurity Interventions for Teens: Two Time-Based Approaches,” in IEEE Transactions on Education, vol. 62, no. 2, pp. 134-140, May 2019, doi: 10.1109/TE.2018.2877182.
Higgins, Melissa, and Michael Regan. Cybersecurity, ABDO Publishing Company, 2015. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/citytech-ebooks/detail.action?docID=5262186.
Created from citytech-ebooks on 2021-03-09 12:24:53.
Cite: M. Ni, M. Li, J. Li, Y. Wu and Q. Wang, “Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-Physical Power Systems against Cyber-Attacks,” in Journal of Modern Power Systems and Clean Energy, doi: 10.35833/MPCE.2018.000830.