100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 3 out of 9 pages.
Cyber Security Data SharingCyber security is technology, process and practice made up to protect networks,computers, programs and data from attack, damage or unauthorized access.In 1970 was the first time when a hacker appeared as they attempt to make free phonecalls and became known as “phreaking”. The 1980s saw the birth of computer clubs. Thefirst virus was named as “Brain”. Which used to gain authorized access to a computersystem. In 1990s modern information industry started and more and more hackers cameup, with numbers of viruses. Which were attacking on government sites and hamperingthe privacy of the people. As the world entered in 21st century a lot of internet activitiesturn into major criminal acts. Taking out bank number and details through hacking inbank data base was mainstream in this decade and later attacking on social media started.And therefore with every day passing we need to improve our cyber security.Providing cyber security in modern and complex networks increasingly requires highlyspecialized skills. Organizations are collecting a growing volume of cyber securityinformation internally and externally in order to better protects themselves from cyberthreats and maintains a strong cyber security posture.The most difficult challenge incyber security is the ever-evolving nature of security risks themselves.Major areas of concernData protection and privacyOn the web, personal information can be as valuable as cash. The definition of privacy ischanging. Before we used to share our personal and important information just to trustedpeople but with the increase of social networking sites it has become very easy to get intoanybody’s personal life.Better softwareMuch cybercrime relies on the fact software is bug-ridden or contains flaws in its design.As most of the software are designed by one or two companies, it makes easier for thehackers to hack them and put viruses in them.Rogue statesOn the Internet, a rogue state is not defined by its weapons or politics but by its laws andregulations. Without a common base level of data protection and computer misuselegislation, there will always be territories that provide a safe haven for cyber criminalsand hackers.
Fig:1 How data is breachedSolutions1.Use Antivirus software’s.