Topic > Analysis of computer security problems from a social point of view

Index IntroductionCyber ​​security problems from a social perspectiveE-governance and cybersecurityE-Businesses and CybersecurityE-Health and CybersecuritySmart Cities and CybersecurityConclusionsIntroductionCyber ​​security can be defined as security measures applied to computers to provide a desired level of protection from external cyber attacks. The issue of protection can be defined using the acronym CIA for Confidentiality, Integrity, and Availability (Sharma, R. 2012). Confidentiality refers to the property that data is viewable only by authorized parties. Integrity refers to the principle of authentic user authorization. Availability refers to the principle that data and computing resources will be available only to authorized users. The basic design of the Internet was built around shared access and trust, with secondary security measures. There are a myriad of widely used protocols that offer less security to their users and instead rely on trust. This model was suitable when the Internet was first developed and the information transferred was of little value to process owners. In the current scenario, the Internet is used to transfer information between people, their banks, intermediaries, businesses and government bodies. This type of information can have significant value for interested parties and, conversely, for criminals, as evidenced by the current level of cyber attacks, identity theft and phishing attacks. In the current era where the Internet of Things (IoT) is proliferating and more than 20 billion connected devices can pose a potential target for attackers. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original EssayThe domain of cybersecurity does not only consist of the security of IT systems within the enterprise, but also includes broader digital networks that rely on cyberspace and critical infrastructure. Cyber ​​security plays a vital role in the ongoing development of information technology and Internet services. Improving cybersecurity and protecting critical information infrastructure are essential to the nation's security and economic well-being. The application of cloud computing, e-governance programs, e-shopping, and e-services has made cybersecurity an imperative area to promote security issues and ensure a safe environment for Internet infrastructure. Cyber ​​Security Issues in Social Perspective E-governance and Cyber ​​SecurityDocuments issued by the authorities of a country The government provides a personal identity to an individual. Driver's licenses, Social Security numbers, taxpayer identification numbers, and various other authorization documents are regularly used by people to prove their identity and authorization for various opportunities. Since these documents form the basis for all subsequent documents, their integrity is of great importance to interested parties. Therefore, these crucial documents are targets for criminals and further cyber attacks. Maintaining an adequate cybersecurity system requires a combination of managerial and technical activities. Management must determine the appropriate level of risk tolerance and set security measures accordingly. Technical specialists using the security requirements document should develop mandatory technical safeguards to ensure adequate levels of cyber protection. After itdevelopment and implementation of security functionality, a testing and audit function is critical to determining both the correctness of the solution and continued compliance with stated requirements. New solutions suitable for e-government, such as knowledge-based authentication, offer insights into e-government-specific issues related to cyber attacks. Security failures are high-profile events. Several recent incidents, including Card Systems, LexisNexis, Bank of America, DSW and others, have exposed millions of documents to potential identity thieves.and Cybersecurity The e-business process consists of obtaining customer orders, order processing, new product development and marketing. Depending on the level of e-business integration, the level of information technology involvement varies. The actual level of IT involvement is not the critical issue, rather the level of specific integration and specialization of functionality is the crucial factor. Specialization and specific integration are resource-intensive issues that require considerable effort from the organization to achieve. Security functionality is one of the many elements that need specific attention when it comes to the unique functionality of e-business. Information technology-based solutions refer to stored electronic information. Information stored in systems has significant value and requires adequate levels of protection to ensure its safety. The development of specific security controls to meet these requirements is of significant concern for e-commerce and therefore confirms the importance of cybersecurity for companies operating in e-business. Common gray areas such as authentication methodologies have received attention from organizations. Using nationwide resources to address some of the more technical issues associated with security provides significant insights applicable to the individual implementations associated with e-government and e-business involved. Two-factor authentication measures involving online personal account authentication linked to personal device authentication are also an effective measure to promote cybersecurity and ensure secure authentication. E-Health and Cybersecurity E-health medical services are supported by electronic processes and communications. In addition, healthcare providers share patient data with each other and remotely monitor their health via smartphones, and patients can also receive electronic prescriptions. E-health enables the public dissemination of medical information and manages health crises through the use of information systems to measure, monitor and make decisions. Many research efforts have focused on the use of wireless medical networks to enable and improve the quality of care and remote medical monitoring. These networks, also called Wireless Body Area Network (WBAN), are characterized by the mobility of their nodes, the easy implementation of the network and its self-organization, which allows monitoring the elderly, people at risk and patients with chronic diseases. Therefore, these networks open up new technological challenges in terms of security and privacy. Therefore, cybersecurity plays a vital role in promoting a robust e-health network and providing robust e-health monitoring systems. Smart Cities and Cyber ​​Security A smart city offers myriad solutions to various problems faced by urban development and city management. However, intelligent dispensing,.