Downloads: 148 | Views: 295
Informative Article | Information Security | India | Volume 6 Issue 5, May 2017 | Popularity: 6.3 / 10
Cyber Security - A Business Accelerator??
Riya V S, Dr. Aarthy C
Abstract: IT has disrupted businesses over the past decade like no other technology has ever. As IT increasingly touches our lives in many different ways like internet banking, online shopping, smart homes and self-driven cars, our dependency on IT is reaching a point of no return. Information Security (InfoSec) /Security in the Digital Economy is practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information (Wikipedia). It is the series of measures deployed by organizations to ensure that their customer data and business critical information are accessed and consumed by authorized people only. InfoSec also ensures that the above mentioned information is not altered or erased inadvertently. It can be leveraged by business to securely expand and be global. So, it is imperative that information security be at the forefront of all organizations to ensure there is secure delivery of services to customers, and the privacy of citizens is protected. It is equally important that the assets of an organization are protected against cyberattacks.
Keywords: Security, threats, hacking
Edition: Volume 6 Issue 5, May 2017
Pages: 2678 - 2678
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024
Pages: 183 - 184Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Downloads: 0
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi, Dr. Mohammed Naif Alatawi
Downloads: 0
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022
Pages: 1404 - 1405Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)
Santosh Kumar Kande, Alex Harris
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 11 Issue 2, February 2022
Pages: 148 - 151Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami, Nisarg Shah
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi