Cyberspace Privacy and Security l Reaction Paper
By:Dante A. Dumalaga Jr.
We are living in the 21st century where information, news and even your own identity could be seen in a blink on an eye. People are running towards their mobile devices and sharing their current status, feelings and the life they are living without being aware of the harm it may cause to them that will ruin there life if not lessen. As Cyberspace has become central to the global information and communication infrastructure, the security of cyberspace has now become a more urgent priority for corporations and governments around the world. A lot of issues had been circling right now about it's security since this pandemic started people are too focus in the access in there mobile so as our government. Cyberspace has become inherently complex to manage and challenging to secure. Increased, persistent connectivity through a greater range of mobile devices and always on services, third-party business relationships, cloud computing infrastructures, information sharing agreements, and other seamless or automated business processes in cyberspace continue to pose shared risks to cyber security and privacy. Threats in cyberspace will continue to target the weakest links in any complex web of business relationships or government processes, meaning stakeholders in cyber security efforts have a shared role in protecting the infrastructure and the information that flows through it.
A lot of people now uses their skills in hacking to gets information in private institution and even some of them threatened people for some money through this, that why privacy protection and cyber security should be thought of as interconnected as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest. In some cases, cyber security measures underpin critical infrastructure that protects data, thereby safeguarding personal information. However, as with many security measures, certain cyber security efforts can also threaten privacy the relationship between cyber security and privacy is not a completely harmonious one. Cyber security activities can require up to the second monitoring of activities on a network in order to detect anomalies and threats, and in some cases, monitoring of this nature could involve capture and analysis of massive amounts of personal information.
Despite all of this it could be a great help for people to stay calm and uses this area as a tool to be aware of the information they share since information Security is not only about securing information from unauthorized access its basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be physical or electronic one. Information can be anything like your details or we can say your profile on social media, your data in mobile phone, your biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc. At the core of Information Security is Information Assurance, which means the act of maintaining CIA of information, ensuring that information is not compromised in any way when critical issues arise. These issues are not limited to natural disasters, computer/server malfunctions etc. And the field of information security has grown and evolved significantly in recent years. It offers many areas for specialization, including securing networks and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning.
Comments
Post a Comment