What is computer security? Cyber Security can be defined as “measures taken to protect a computer or information system (such as on the Internet) from unauthorized access or attack”. (Dance 283). In other words, an attempt by individuals to protect their personal information and other digital assets from cyber attacks. Why is cybersecurity important? Cyber security was created because of the sensitive information that is often stored on computers connected to the Internet. Many tasks that were once done manually are now done using computers. With our increasing dependence on computers and the enormous amount of sensitive information stored on networks, the functioning of cybersecurity programs are necessary to effectively block dangerous or predatory cyber attacks and any acts of identity theft. The purpose of this document is to inform and help on how to prevent individuals from becoming targets of cybercrime. To date, many members of society have become very dependent on the use of technology. We rely on the Internet to bank, buy things, and stay connected. Businesses rely on their networks to interact with customers, process transactions and reach new markets. Transportation, financial, energy, and communications systems, as well as our government and military, rely heavily on computer networks to function. That's how you get your electricity, your Social Security check, and your veterans benefits. The use of computers and related networks has developed problems regarding computer security. Cybersecurity is an important issue to consider if people want protection from malicious people and software coming from the Internet. Cyber crimes are mostly individuals seeing… middle of paper… everything digital can be hacked if allowed to, so why take the risk? Every day is a new fight against cyber crimes and as technology continues to develop new and improved versions of things and invent new gadgets, the war will continue. By replacing the many tasks that were once performed manually with tablets, laptops, iPads, etc. and the enormous amount of sensitive information stored on networks, the operation of cybersecurity programs is necessary to effectively block dangerous or predatory cyber attacks and any acts of identity theft, but it is up to you to make the decision about what you are willing to trust and who you trust with the information you are posting. Works Cited Bullock, Jane A. “Cybersecurity.” Introduction to national security principles of all-hazard response. Fourth ed. Boston: Elsevier/Butterworth Heinemann, 2009. 283-319. Press.
tags