-
Essay / Analysis of cybersecurity issues from a societal perspective
Table of contentsIntroductionCybersecurity issues from a societal perspectiveE-governance and cybersecurityE-business and cybersecurityE-health and cybersecuritySmart cities and cybersecurityConclusionsIntroductionCybersecurity can be defined as security measures applied to computers to provide a level of protection against external cyberattacks. The issue of protection can be defined using the acronym CIA for Confidentiality, Integrity, and Availability (Sharma, R. 2012). Confidentiality refers to the property that data should only be visible to authorized parties. Integrity refers to the principle of authentic user authorization. Availability refers to the principle that data and computing resources will only be available to authorized users. The basic design of the Internet was built around shared access and trust, with security measures secondary. There are a myriad of widely used protocols that provide less security to their users and instead rely on trust. This model was appropriate during the development of the Internet and the information transferred had little value to those responsible for the processes. In the current scenario, the Internet is used to transfer information between people, their banks, brokers, businesses and government entities. This type of information can be of great value to stakeholders and in contrast to criminals, as evidenced by the current level of cyberattacks, identity thefts and phishing attacks. In today's era where the Internet of Things (IoT) is proliferating and over 20 billion connected devices can be a potential target for attackers. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”? Get the original essay The field of cybersecurity not only includes the security of computer systems within the enterprise, but also includes digital networks more large networks that rely on cyberspace and critical infrastructures. Cybersecurity plays an essential role in the continued development of information technologies as well as Internet services. Strengthening cybersecurity and protecting critical information infrastructure are essential to the security and economic well-being of the country. The application of cloud computing, e-governance programs, online shopping and e-services has made cybersecurity an imperative area to foster security concerns and ensure a safe environment for the Internet infrastructure. Cybersecurity issues from a societal perspective E-governance and cybersecurityDocuments published by the authorities of a country the government gives a personal identity to an individual. Driver's licenses, social security numbers, tax identification numbers, and various other eligibility documents are regularly used by people to demonstrate their identity and authorization for various opportunities. Since these documents form the basis for all subsequent documents, their integrity is of great importance to stakeholders. Therefore, these crucial documents are targets for criminals and other cyberattacks. Maintaining a proper cybersecurity system requires a combination of managerial and technical task execution. Management must determine the appropriate level of risk tolerance and define security measures accordingly. Technical specialists using the document onSecurity requirements must develop mandatory technical guarantees to ensure appropriate levels of cyber protection. After security features are developed and deployed, a testing and auditing function is crucial to determine both the correctness of the solution and continued compliance with stated requirements. New solutions tailored to e-government, such as knowledge-based authentication, offer insight into specific e-government issues related to cyberattacks. Security breaches are high-profile events. Several recent incidents, including Card Systems, LexisNexis, Bank of America, DSW and others, have exposed millions of records to potential identity thieves. and CybersecurityThe e-commerce process involves obtaining customer orders, processing orders, development of new products and marketing. Depending on the level of e-commerce integration, the level of information technology involvement differs. The actual level of IT involvement is not the crucial issue, but the level of specific integration and feature specialization is the crucial factor. Specialization and specific integration are resource-intensive issues that require significant dedication from the organization to achieve. Security functionality is one of the many elements that require special attention when it comes to unique ecommerce features. Information technology-based solutions deal with stored electronic information. Information stored in systems has significant value and requires appropriate levels of protection to ensure its security. The development of specific security controls to meet these requirements is a major concern for e-commerce and therefore justifies the importance of cybersecurity for businesses operating in the e-commerce domain. Common gray areas such as authentication methodologies have garnered attention from organizations. Using national-level resources to address some of the more technical issues associated with security provides important information applicable to individual implementations associated with e-government and the e-businesses involved. Two-factor authentication measures involving authentication of personal online accounts linked to authentication of personal devices are also an effective measure to promote cybersecurity and ensure secure authentication.E-health and cybersecurityMedical health services in online are supported by electronic processes and communications. Additionally, healthcare professionals share patient data with each other and monitor their health remotely via their smartphones. Patients can also obtain electronic prescriptions. E-health enables public dissemination of medical information and manages health crises through the use of information systems to measure, monitor and make decisions. Many research efforts have focused on using wireless medical networks to enable and improve quality of care and remote medical monitoring. These networks, also called wireless body area networks (WBAN), are characterized by the mobility of their nodes, the ease of deployment of a network and its self-organization, which makes it possible to monitor the elderly, people at risk and patients with chronic diseases. . These networks therefore open up new technological challenges in terms of security and confidentiality.,.