With the growth of mobile device, cloud and internet, we are witnessing a rise in cyber-crimes. Cyber-attacks result in breaches to data security and sabotage. Personal data, intellectual property, physiological harm are easy targets. for a data security breach. Attacks can result in commercial losses, disruption of operations and the possibility of extortion. Cyber-attacks may also expose an organization to regulatory action, and damages can occur from loss of trust among customers and suppliers. It is thus important to understand information security, system and cyber security so that we can take necessary steps required to protect from the ever-changing threat landscape. The purpose of this this paper is to first define and explain the …show more content…
Cyber Security a subset of Information Security. Cyber Security is the ability to use resources and policies to protect the use of cyberspace from cyber-attacks. Information Security on the other hand, is the protection of information that is either, printed or written, stored electronically from unauthorized access, use, or destruction in order to provide confidentiality, integrity, and availability (CIA). "The international standard, ISO/IEC 27002 (2005), defines in- formation security as the preservation of the confidentiality, integrity and availability of information (von Solms, R., & van Niekerk, J. 2013, as cited in ISO/IEC 27002, 2005, p. 1). Cybersecurity refers to the policies the protect the networks and the information from …show more content…
Most of these are caused by vulnerabilities in the system. Cyber threats also include threat that do not necessarily cause loss of information. Some of the examples listed are, 1) cyber bullying, which targets an individual. Cyber bullying causes harm to the user, resulting in embarrassment, invoke harassment and psychological harm. 2) Home automation, breach results in unauthorized access and cause harm. With the recent trend in internet of things (IoT) many homeowners and industries integrate, appliances and sensors to by managed by web and cloud. Some of these systems are not highly secure and increases the risk of being hacked. Again, the user information may not be the target, it could be other assets that are target of the crime. 3) Digital media breach results in loss of revenue, by criminal sharing information illegally. Examples include sharing of illegal music, movies and other licensed digital information resulting in loss of potential revenue. 4) Cyber terrorism crimes target a country's critical infrastructure via cyberspace. Examples include, attack on the national infrastructure such as electricity grid, electricity and water, delivery system, air traffic controls that depend on communications and network