International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 148 | Views: 295

Informative Article | Information Security | India | Volume 6 Issue 5, May 2017 | Popularity: 6.3 / 10


     

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Abstract: IT has disrupted businesses over the past decade like no other technology has ever. As IT increasingly touches our lives in many different ways like internet banking, online shopping, smart homes and self-driven cars, our dependency on IT is reaching a point of no return. Information Security (InfoSec) /Security in the Digital Economy is practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information (Wikipedia). It is the series of measures deployed by organizations to ensure that their customer data and business critical information are accessed and consumed by authorized people only. InfoSec also ensures that the above mentioned information is not altered or erased inadvertently. It can be leveraged by business to securely expand and be global. So, it is imperative that information security be at the forefront of all organizations to ensure there is secure delivery of services to customers, and the privacy of citizens is protected. It is equally important that the assets of an organization are protected against cyberattacks.


Keywords: Security, threats, hacking


Edition: Volume 6 Issue 5, May 2017


Pages: 2678 - 2678



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Riya V S, Dr. Aarthy C, "Cyber Security - A Business Accelerator??", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2678-2678, https://www.ijsr.net/getabstract.php?paperid=ART20174068, DOI: https://www.doi.org/10.21275/ART20174068



Similar Articles

Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024

Pages: 183 - 184

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy

Share this Article

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022

Pages: 1404 - 1405

Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)

Santosh Kumar Kande, Alex Harris

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami, Nisarg Shah

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article



Top