Sunteți pe pagina 1din 3

C

omputer security, also known of a mouse a half a world away that


as cyber security or IT unleashes carefully weaponized computer
security, is the protection programs that disrupt or destroy critical
of information systems from theft industries like utilities, transportation,
or damage to the hardware, the software, and communications, and energy. Such attacks
to the information on them, as well as could also disable military networks that
from disruption or misdirection of the services control the movement of troops, the path of jet
they provide. [1]
fighters, the command and control of
warships.[149]
It includes controlling physical access to the
hardware, as well as protecting against harm This has led to new terms such
that may come via network access, data as cyberwarfare and cyberterrorism. More and
and code injection,[2] and due to malpractice more critical infrastructure is being controlled
by operators, whether intentional, accidental, via computer programs that, while increasing
or due to them being tricked into deviating efficiency, exposes new vulnerabilities. The
from secure procedures. [3]
test will be to see if governments and
corporations that control critical systems such
The field is of growing importance due to the as energy, communications and other
increasing reliance on computer systems and information will be able to prevent attacks
the Internet in most societies,[4] wireless before they occur. As Jay Cross, the chief
networks such as Bluetooth and Wi-Fi - and scientist of the Internet Time Group,
the growth of "smart" devices, remarked, "Connectedness begets
including smartphones, televisions and tiny vulnerability.
devices as part of the Internet of Things.

Cybersecurity is becoming increasingly


important as more information and
technology is being made available on
cyberspace. There is growing concern
among governments that cyberspace
will become the next theatre of warfare.
As Mark Clayton from the Christian
Science Monitor described in an article
titled "The New Cyber Arms Race":
Cybersecurity is a fast-growing[150] field
of IT concerned with reducing organizations'
In the future, wars will not just be fought by
risk of hack or data breach. According to
soldiers with guns or with planes that drop
research from the Enterprise Strategy Group,
bombs. They will also be fought with the click
46% of organizations say that they have a in Jefferson Parish, both of which were hit
"problematic shortage" of cybersecurity skills by Hurricane Katrina in 2005). The
in 2016, up from 28% in 2015.[151] Commercial, backup media should be moved between
government and non-governmental the geographic sites in a secure manner,
organizations all employ cybersecurity in order to prevent them from being
professionals. The fastest increases in stolen.
demand for cybersecurity workers are in
industries managing increasing volumes of
consumer data such as finance, health care,
and retail.[152] However, the use of the term
"cybersecurity" is more prevalent in
government job descriptions.

Backups are also important for


reasons other than security. Natural
disasters, such as earthquakes,
hurricanes, or tornadoes, may strike the
building where the computer is located. Most measures show that the problem
of cybercrime continues to worsen.
The building can be on fire, or an
However, Eric Jardine argues that the
explosion may occur. There needs to be a frequency, cost and severity of
recent backup at an alternate secure cybercrime cannot be well understood
location, in case of such kind of disaster. as counts expressed in absolute terms.
Instead, these numbers need to be
Further, it is recommended that the
normalized around the growing size of
alternate location be placed where the cyberspace, in the same way that
same disaster would not affect both crime statistics in the physical world
locations. Examples of alternate disaster are expressed as a proportion of a
recovery sites being compromised by the population (i.e., 1.5 murders per
100,000 people). Jardine argues that,
same disaster that affected the primary
since cyberspace has been rapidly
site include having had a primary site increasing in size each year, absolute
in World Trade Center I and the recovery numbers (i.e., a count saying there are
site in 7 World Trade Center, both of 100,000 cyberattacks in 2015) present
a worse picture of the security of
which were destroyed in the 9/11 attack,
cyberspace than numbers normalized
and having one's primary site and around the actual size of the Internet
recovery site in the same coastal region, ecosystem (i.e., a rate of cybercrime).
which leads to both being vulnerable to His proposed intuition is that if
cyberspace continues to grow, you
hurricane damage (for example, primary
should actually expect cybercrime
site in New Orleans and recovery site
counts to continue to increase of the size of the ecosystem crime
because there are more users and might actually be becoming less of a
activity online, but that as a proportion problem

S-ar putea să vă placă și