debate on cyber security and cyber crime
Answers
Answered by
7
Cybercrime:
Cybercrime tend to harm the system resources while others are used to extract confidential information from the user.
Cyber crime can be defined as : "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm , or loss to the victim directly or indirectly , using modern telecommunication network such as internet and mobile phones.
Cyber security:
Cyber security is the protection of internet connected systems including hardware software and data from cyber attacks.
In computing context security comprises cyber security and physical security - both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality ,integrity and availability of data is a subset of cyber security.
Cybercrime tend to harm the system resources while others are used to extract confidential information from the user.
Cyber crime can be defined as : "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm , or loss to the victim directly or indirectly , using modern telecommunication network such as internet and mobile phones.
Cyber security:
Cyber security is the protection of internet connected systems including hardware software and data from cyber attacks.
In computing context security comprises cyber security and physical security - both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality ,integrity and availability of data is a subset of cyber security.
Attachments:
amrita14rai83:
bye
Answered by
3
Cyber security :
The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.
The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.
Similar questions