Category:Computer security software stubs
![]() | This category is maintained by WikiProject Stub sorting. Please propose new stub templates and categories here before creation. |
![]() | This category is for stub articles relating to security software. You can help by expanding them. To add an article to this category, use {{security-software-stub}} instead of {{stub}} . |
Cyberspace has become the handle of choice to refer to the virtual world created by network computer systems that affects large parts of our lives, securing it is challenging. Computer security consists of information security and system security. Information security is concerned with the protection of data and any information derived from its interpretation. System security aims to ensure that computer systems operate as designed.[1]
Businesses rely entirely on the infrastructure of computer networks and underlying information systems. Organization reliance on information technology and the widespread use of the internet and computers necessitate the ongoing access to vital data. Such data are exposed to external cybercrimes threats and the risk of information leakage.[2]
All government entities, particularly those with modest resources, are facing dramatically increased cybersecurity challenges due to the shift to e-information and inexorable trend toward collecting data almost for the sake of collecting it. These challenges include ever-growing risks to individuals' personal information, as well as to the vast amounts of other types of confidential information governments collect and retain
Prior to the widespread application of information technology by state and local governments, public records were difficult to access because they were only available locally and individuals requesting access were generally required to do so in person or by mail. The shift to e-government (the adoption of information technology, the use of the Internet to communicate with the public and provide government services, and so on) has drastically changed the landscape, as government records are now maintained in electronic databases and access is no longer limited to individuals who visit the custodial agency in person.[3]
Currently, cybersecurity plays an essential role in computing and information technology due to its direct effect on organizations' critical assets and information. Cybersecurity is applied using integrity, availability, and confidentiality to protect organizational assets and information from various malicious attacks and vulnerabilities. The COVID-19 pandemic has generated different cybersecurity issues and challenges for businesses as employees have become accustomed to working from home. Firms are speeding up their digital transformation, making cybersecurity the current main concern. For software and hardware systems protection, organizations tend to spend an excessive amount of money procuring intrusion detection systems, antivirus software, antispyware software, and encryption mechanisms.[4]
———————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————
References
[1] Christen, M., Gordijn, B., & Loi, M. (Eds.). (2020). The Ethics of Cybersecurity (Vol. 21). Springer International Publishing. https://doi.org/10.1007/978-3-030-29053-5
[2] Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information, 13(9), Article 9. https://doi.org/10.3390/info13090413
[3] Cattanach RE, Greenberg JM. Chapter 9: Critical Update Needed! Addressing Cybersecurity Challenges of Public Records in the Digital Age. Urban Lawyer. 2022;51(3):427-456. Accessed December 8, 2022. https://search-ebscohost-com.ezproxy.uky.edu/login.aspx?direct=true&db=a9h&AN=159850939&site=ehost-live&scope=site
[4] Hijji, M., & Alam, G. (2022). Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees. Sensors (14248220), 22(22), 8663. https://doi-org.ezproxy.uky.edu/10.3390/s22228663
Pages in category "Computer security software stubs"
The following 79 pages are in this category, out of 79 total. This list may not reflect recent changes.