omputer security, also known of a mouse a half a world away that
as cyber security or IT unleashes carefully weaponized computer security, is the protection programs that disrupt or destroy critical of information systems from theft industries like utilities, transportation, or damage to the hardware, the software, and communications, and energy. Such attacks to the information on them, as well as could also disable military networks that from disruption or misdirection of the services control the movement of troops, the path of jet they provide. [1] fighters, the command and control of warships.[149] It includes controlling physical access to the hardware, as well as protecting against harm This has led to new terms such that may come via network access, data as cyberwarfare and cyberterrorism. More and and code injection,[2] and due to malpractice more critical infrastructure is being controlled by operators, whether intentional, accidental, via computer programs that, while increasing or due to them being tricked into deviating efficiency, exposes new vulnerabilities. The from secure procedures. [3] test will be to see if governments and corporations that control critical systems such The field is of growing importance due to the as energy, communications and other increasing reliance on computer systems and information will be able to prevent attacks the Internet in most societies,[4] wireless before they occur. As Jay Cross, the chief networks such as Bluetooth and Wi-Fi - and scientist of the Internet Time Group, the growth of "smart" devices, remarked, "Connectedness begets including smartphones, televisions and tiny vulnerability. devices as part of the Internet of Things.
Cybersecurity is becoming increasingly
important as more information and technology is being made available on cyberspace. There is growing concern among governments that cyberspace will become the next theatre of warfare. As Mark Clayton from the Christian Science Monitor described in an article titled "The New Cyber Arms Race": Cybersecurity is a fast-growing[150] field of IT concerned with reducing organizations' In the future, wars will not just be fought by risk of hack or data breach. According to soldiers with guns or with planes that drop research from the Enterprise Strategy Group, bombs. They will also be fought with the click 46% of organizations say that they have a in Jefferson Parish, both of which were hit "problematic shortage" of cybersecurity skills by Hurricane Katrina in 2005). The in 2016, up from 28% in 2015.[151] Commercial, backup media should be moved between government and non-governmental the geographic sites in a secure manner, organizations all employ cybersecurity in order to prevent them from being professionals. The fastest increases in stolen. demand for cybersecurity workers are in industries managing increasing volumes of consumer data such as finance, health care, and retail.[152] However, the use of the term "cybersecurity" is more prevalent in government job descriptions.
Backups are also important for
reasons other than security. Natural disasters, such as earthquakes, hurricanes, or tornadoes, may strike the building where the computer is located. Most measures show that the problem of cybercrime continues to worsen. The building can be on fire, or an However, Eric Jardine argues that the explosion may occur. There needs to be a frequency, cost and severity of recent backup at an alternate secure cybercrime cannot be well understood location, in case of such kind of disaster. as counts expressed in absolute terms. Instead, these numbers need to be Further, it is recommended that the normalized around the growing size of alternate location be placed where the cyberspace, in the same way that same disaster would not affect both crime statistics in the physical world locations. Examples of alternate disaster are expressed as a proportion of a recovery sites being compromised by the population (i.e., 1.5 murders per 100,000 people). Jardine argues that, same disaster that affected the primary since cyberspace has been rapidly site include having had a primary site increasing in size each year, absolute in World Trade Center I and the recovery numbers (i.e., a count saying there are site in 7 World Trade Center, both of 100,000 cyberattacks in 2015) present a worse picture of the security of which were destroyed in the 9/11 attack, cyberspace than numbers normalized and having one's primary site and around the actual size of the Internet recovery site in the same coastal region, ecosystem (i.e., a rate of cybercrime). which leads to both being vulnerable to His proposed intuition is that if cyberspace continues to grow, you hurricane damage (for example, primary should actually expect cybercrime site in New Orleans and recovery site counts to continue to increase of the size of the ecosystem crime because there are more users and might actually be becoming less of a activity online, but that as a proportion problem