Home > Computer > Cyber Security- Introduction

Cyber Security- Introduction

Internet .

INTRODUCTION

Internet
Internet

>”Internet never deletes,Internet never forgets”<

=>CYBER SECURITY SCENERIO


The digital web has become complex and more interconnected. There are more digital gadgets than the world population. The devices have reduced in size and have become more intrusive in personal lives.

Internet of Things (IoT) is around the corner and virtual lifestyle has taken over. With the evolution and technological advancement of the internet, our privacy and confidentiality in the cyber space have greatly diminished, our digital devices are vulnerable to MALWARE such as viruses, worms, Trojans, spyware, etc. from Hackers, nations, state sponsored actors, non-state actors and terrorists who seek to commit acts of sabotage and espionage. The cyberspace has been greatly dominated by organizations and individuals who seek to commit personal, financial, political and economic cyber crime.

Internet
Internet

As a cyber-aware citizen who is by default the part of the digital revolution, handling and generating information either personal or official; there is need to safeguard our information against states, organizations and individuals who seek to spy, sabotage and conduct acts of espionage against the nation as well as against you. To deny our adversaries who can be hackers or nation states, it is important to ensure that all of us handling information whether personal or official are well aware of the risks that exist in the cyberspace and facilitate measures to be put in place to ward off these cyber-crimes.


AiM

To spread awareness in handling digital assets like computers, laptops, iPods, tablets, IoT devices , etc. and guiding a safe journey while venturing into the unsafe cyber domain.

OBJECTIVES

The objectives of the upcoming chapters are to:

*Ensure that everyone is aware of the risks and threats that exist in the cyberspace.

*Inform everyone on various cyber crimes that can or may be committed against them.

*Inform all on measures to be put in place to ensure cyber secure environment.

*Provide guidance on steps to be taken upon detection of such security breaches.

*Provide definition of terms commonly used pertaining to cyberspace, cyber crime and cyber warfare.

*Provide guidelines for de-addiction in cyberspace.


IMPORTANT LINKS FOR YOU<<

Internet
Technology
Computers
Science
Web-Masters
Scientists

Summary
Article Name=>
Cyber Security-Introduction
Description=>
I am 100% Secure is 100% Myth
Author=>
Publisher Name=>
Gkaim.com
Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

Leave a Reply

%d bloggers like this: