The Different Dimensions of Cybersecurity Essay

Total Length: 1709 words ( 6 double-spaced pages)

Total Sources: 7

Page 1 of 6

AbstractThe term “cybercrime” is associated with illegal activity involving systems and software. Cybercrime encompasses anything from digital espionage to dishonesty assaults that result in monetary losses for e-commerce businesses (Ekanayake et al., 2020). Cybersecurity is a challenge to almost all modern technology. Numerous strategies have been implemented to protect a customer organization’s culture. Cybersecurity refers to a range of approaches for preventing illegal exposure to systems software and information. The paper focuses on the various definitions of cybersecurity and the dimensions and principles to protect against the data on the hardware and software from unauthorized access, harm, or misuse. The three dimensions of cybersecurity and the information security triad ensure overall security and ensure that it operates at its total capacity. The organization is viewed as a computing environment in which people, activities, data, technology, and networks are combined to generate business value.IntroductionWith the recent advances in technology, every person has access to the internet, and it has changed the way we all talk, play, work, shop, listen, make friends, name it, and there is an app for that. Due to this, the cyber system has become more vulnerable to hacking. The most common cyber-attacks that occur target business organizations, the military, the government, and other financial organizations such as the banking industry with high economic power. To utilize a portable computer with assurance, a person or business should first confirm that it will not be hacked in just about any manner. Therefore all connections are safe (Bourgeois, 2014). Many cybersecurity issues affect technology. Consequently, this article reveals the dimensions and principles of cybersecurity and how they are essential in maintaining overall security. They ensure that the business operates to its full potential without any threat.What is Cybersecurity?“Cybersecurity is the practice of protecting any internet-connected systems, networks, software and different types of data from cyber-attacks” (Ekanayake et al., 2020 p, 2).According to Rashid, Chivers, Danezis &Martin (2018), “Cybersecurity refers to the protection of information systems hardware, software, and associated infrastructure the data on them and the services they provide from unauthorized access, harm or misuse.” (P, 3). A component of cybersecurity is the protection aimed at ensuring user privacy, accuracy, and accessibility.It can also be classified as “the art of protecting networks, devices, and data from unauthorized access or criminal se and the practice of ensuring confidentiality, integrity, and availability of information” (“What is Cybersecurity? | CISA”, 2019)The dimensions of cybersecurityMost security practitioners have access to various models for analyzing and implementing safeguards. For case in point, the National Security Telecommunications and Information Systems Committee uses the cybersecurity cube, commonly known as the McCumber cube. As with the models, the value lies in adapting to the information environment irrespective of the specific technologies involved.

Stuck Writing Your "The Different Dimensions of Cybersecurity" Essay?

The three cybersecurity fundamentals are represented in the very first level of the cybersecurity cube. The secondary level describes the key forms of data. Finally, the cube’s third dimension indicates the level of knowledge necessary to ensure security.The principles of securityThe purpose of cybersecurity is to secure cyberspace, which is the first dimension. The underlying concepts are located in the first dimension (Golovanteko, 2018). Defining the nature of information is a tedious task. Different mechanisms are employed to maintain or ensure the entire transmission column and examine all security-related characteristics that get enforced. Various relevant security-related safeguards are reviewed from the cube to verify that the content in the transmission state has the required sense of individual guarantee. Whether low, medium or high, the report’s value helps determine the degree to which the security requirements are enforced (McCumber, 2004 p, 137).The States of dataThe storage state is described as the condition in which data is stored in a dedicated server at repose. The database environment’s supporting programs analyze and send data into or out of the system (McCumber, 2004, p, 141). The second dimension of the cube requires protection from cyberspace professionals tasked to account for data safeguarding in transit, rest or storage, or process.Cybersecurity safeguardsModern technological platforms have their operational state. If no computers systems are involved, the processing is a regular human activity. The laptop is only executing the commands coded by a human. The dimension identifies the powers used to protect the cyber world (McCumber, 2004 p, 146). The three capabilities encompass the equipment and technologies available to safeguard information systems and the rules and practices that are in place to protect such systems. It enables the citizens of the cyber world to stay safe. These people are aware and knowledgeable about the dangers in the world and those that threatened the world (Golovanteko, 2018).Principles of cybersecurityUnderstanding various cyber threats and implementing defense tactics that help maintain the privacy, authenticity, and accessibility of any electronic information technology is what cybersecurity is all about.ConfidentialityAnother term for confidentiality is privacy. It’s a word for preventing information from being accessed by unauthorized users or networks. Most organization’s collect data that may or might not be sensitive. Data that is not sensitive is publicly available, but sensitive data is protected from unauthorized access (McCumber, 2004, p, 35). Data security necessitates the use of establishment of policies and procedures. The numerous cryptosystems in….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"The Different Dimensions Of Cybersecurity" (2021, June 11) Retrieved May 17, 2024, from
https://www.aceyourpaper.com/essays/different-dimensions-cybersecurity-2176312

Latest MLA Format (8th edition)

Copy Reference
"The Different Dimensions Of Cybersecurity" 11 June 2021. Web.17 May. 2024. <
https://www.aceyourpaper.com/essays/different-dimensions-cybersecurity-2176312>

Latest Chicago Format (16th edition)

Copy Reference
"The Different Dimensions Of Cybersecurity", 11 June 2021, Accessed.17 May. 2024,
https://www.aceyourpaper.com/essays/different-dimensions-cybersecurity-2176312