Cyber Security: Physical And Digital Security Measures

3505 words - 15 pages

Cyber Security: Physical and Digital Security Measures

Abstract
Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources and programs necessary to work to effect greater success in the application thereof.
Keywords: cyber security, physical security, digital security, security measures, definition, tools, resources

Cyber Security: Physical and Digital Security ...view middle of the document...

By working to ensure that any digitized system is secure, or as secure as possible, an organization is able to not only work to increase its overall competitive advantage, but decrease the likelihood of hits to its reputation, sabotage, and a PR nightmare at the very least.
What is Cyber Security?
“Cyber space is a virtual unowned computer creation, which requires a high level of technical equipment and a good information infrastructure. This space without national boundaries simultaneously coexists with a real space in order to make collective communication faster and better” (Spalevic, 2014, p. 687). Cyber security is the term used to refer to the securing of information within cyber space. Cyber security works to ensure that “the private data, intellectual property and resources of conventional civilian and military infrastructure” may not be compromised or damaged by deliberate attacks against the system (Spalevic, 2014, p. 687). While it is important to note that no security system is ever 100% secure, the more steps that are taken to work to protect an asset, in this case, information or data, the more secure that asset will be. An individual who does not want their car stolen will lock their car, for as studies have shown, the easier something is to steal, the more likely it is to be stolen; thieves are looking for the quickest and easiest route to obtain the desired target and if a person makes the acquisition of that asset difficult, or at least more difficult than others would, it is the others who are liable to be the target as opposed to those who have taken measures in order to work to further secure themselves from such actions (Beyond Identity Theft, 2014; Small & Burgess, 2004).
This is still a rather nebulous definition, however, looking at only the basic components associated with the concept of cyber security. What cyber security is, however, is a combination of technical tools, physical security measures, digital security measures, an appropriate training program, and top level talent all working on conjunction to be able to stop attacks on personal data in an attempt to keep digitized information as secure as possible, i.e. out of the hands of those who have no legal need for the information or who have not been granted access to that information by the information owner. In order to better understand how such a concept is applied in today’s digitized world, it becomes necessary to first investigate the different components associated with the practices of cyber security. Understanding what those components are and how they operate, at least loosely, is the first step in working to ensure that the organization has the appropriate level of and necessary amount of cyber security present within its organization.
Components of Cyber Security
There are a variety of different components associated with cyber security. As mentioned previously, these include a mix of technical tools, physical and digital security...

Other Papers Like Cyber Security: Physical and Digital Security Measures

Cyber Security And Its Challenges To Society

3707 words - 15 pages ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks

Physical Security Plan Essay

1728 words - 7 pages Perimeter Protection As the Security Manager of Palm Beach Marina Cove (PBMC), I was informed that there will be an expansion to the existing condominium. PBMC II will be built next to PBMC on the east side of the property near the seawall. ABC construction will be the lead company to erect the PBMC II. A construction site has a high probability of internal and external threats. With the ongoing construction, we must put in

Physical Security Policy

749 words - 3 pages 1 Security of the building facilities 1 Physical entry controls Like we have in our company, everyone must have an ID Swipe card (smart Card), they must swipe the card coming into and going out of the building. These Smart card readers are at every door externally and internally. This is a big help in also identifying who is in the building and at what times. If there is any issue. This is for employees, for non

Digital And Physical Space

653 words - 3 pages Digital and Physical Spaces D. Johnson BUS: 620 Managerial Marketing Pamela Gordon April 03, 2012 Digital and Physical Spaces Having a digital and a physical presence for an organization is necessary in order to reach potential market segments. Theoretically, organizations must determine if the need for internet or new-economy based strategy is necessary. While some organizations may need to establish a physical

Networking and Security Issues

5170 words - 21 pages nuclear secrets. March 9, 1999. “CIA measures damage following leaked nuclear secrets.” http://cnn.com/US/9903/09/china.spy.02/ - Two parties agree and seal their transaction using digital signatures. The signature cannot be ruled invalid by state legislature or other law-making bodies because it uniquely identifies the individuals involved. October 18, 1999. WASHINGTON (IDG)—The U.S. House Judiciary Committee has approved a bill

Security Vulnerabilities and the

2176 words - 9 pages Employee’s Security Vulnerabilities and the Affects on Organization’s Information Technology University Maryland University College Employee’s Security Vulnerabilities and the Affects on Organization’s Information Technology Cyber security vulnerabilities and threats are real and constant. Information technology breakthroughs have given our adversaries cheaper and often effective cyber weapons to harm U.S. computer networks and

Hospital and Healthcare Security

1854 words - 8 pages protection capacity. Typical physical security measures will depend on the nature of the hospital, however many physical security measures are common across various hospitals. For example, closed circuit television is commonly deployed at most hospitals.” Electronic security system integration Most of the Hospitals and healthcare facilities have a hub or a central location that all the communications came through. This post will be monitoring the

Internal and External Security

1604 words - 7 pages Internal and External Security BIS/303 September 16, 2013 Internal and External Security Most hotels offer exceptional service and a quality stay, but the hotels have to look at the internal and external security issues that are a major concern. Internal security issues, such as spiteful users of the business using one of the information technology applications within the company. Beside the physical security, hotels have external

Client And Server Security

5360 words - 22 pages perimeter security by controlling whether incoming traffic is forwarded into the network, or blocked at the network perimeter. The type of access control is able to allow one node access to a segment of a network while forbidding access to another segment. These lists should be configured in the outermost firewall router between the physical network and the internet. Fail-safe equipment is that which in case of failure will not endanger properties or

Security Goals and Objectives

805 words - 4 pages available in security and related disciplines which allows the security professional the ability to gain the expertise in his or her, security related field. Some types of certifications include fraud certifications, disaster recovery, physical security and loss prevention (Goodchild n.d.). Security personnel with valid certifications gain the expertise to help the organization protect all assets. Education is the key to avoid potential legal issues

Challenges and Security Issues

1245 words - 5 pages should take into consideration the preventative measures. Their quality assurance processes need to be better reviewed (Laudon & Laudon,2012, p. 304). Case Study #2 How Secure is the Cloud Cloud computing is becoming more and more popular among larger companies due to the cost saving measures that it offers. The security and control problems that come into play in this case are that there are many risks. There is high distributing involved

Related Essays

Cyber Security Essay

1448 words - 6 pages information and data. To keep secured our information and to stop this from unapproved individual, we utilize digital security. Cyber security is known as a data system security. Which secure your system, data, and information from obscure individual and crook? The cyber crime is expanding quick, increasing very fast. This has alarmed associations to concentrate all the more on their assurance of information and association's close to home data

Cyber Security Essay

534 words - 3 pages Define Cyber Security. Computer security is also known as cyber security or IT security which refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. It is an information security as applied to computers and computer networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from

Logical And Physical Security Essay

1645 words - 7 pages CONVERGENCE OF LOGICAL AND PHYSICAL SECURITY SYSTEMS INTRODUCTION Up to now, majority of organizations have their physical and logical access systems operating as independent structures, with each being run by a totally separate department. The information technology security system, which controls access to information technology infrastructure including mail servers, the internet, database applications and web servers was managed by the

Cyber Security: Cyber Terrorism Essay

1810 words - 8 pages reduces their effectiveness towards fighting cyber terrorism. It is important to note that cyber terrorism is a more serious form of cyber attack. This is because it is in a position to create immense physical and psychological damage. This therefore indicates that the perpetrators of cyber terrorism are more sophisticated as compared to hacktivism agents. Separation of the authorities in order to create special security authorities to fight cyber