What Is Cyber Security?
Cyber security refers to a body of processes and technologies that are widely meant to computers, networks, data, and programs from damage, attack, and unauthorised access. For cyber security strategies to succeed, organizations should employ coordinated strategies throughout a system.
How Cyber Security Has Changed?
Over the years, Cybersecurity has changed in the sense that they have become more industrialised and organised. In the past, adversaries were not very organised, as they could compromise an entire system to look for invaluable data and get out. However, contemporary adversaries are extremely purposeful, as most of them target particular information or dat. Furthermore, relatively more destructive capabilities are emerging within the Cybersecurity industry (Rhodes and Polley, 2013).
What Crimes Target Computers?
Some of the crimes that target computers include spamming, phishing scams, malware and viruses, and denial-of-service (Rhodes and Polley, 2013).
What Impacts Has Cybersecurity Left?
Indeed, cyber security is one of the most cumbersome issues for businesses, organizations, and customers in the contemporary digital age. Therefore, most private and public organizations currently regard cyber security as an issue of compliance (Rhodes and Polley, 2013). Government agencies feel that they have to establish and achieve specific security requirements and organizations and companies have the responsibility to ensure that they have adequate cyber security measures to protect their customers’ day to day interests. Furthermore, cyber security has increased the cost of doing business, across the globe, especially because most business going online and they need advanced security systems to protect their data and information from third parties (Rhodes and Polley, 2013).
Explain Malware, Viruses, Spyware
Malware: Malware are different forms of intrusive software, including computer worms, spyware, viruses, Trojan horses, and adware. They are installed into computers to undertake unwanted tasks that often benefit third parties (Rhodes and Polley, 2013).
Viruses: A software that often replicates itself and spreads within a system and may end up damaging computers by using up the memory, deleting files, and reformatting the hard drive (Rhodes and Polley, 2013).
Spyware: A software that collects information and relays it to interested third parties (Rhodes and Polley, 2013).
References
Rhodes, J. and Polley, V. (2013). The ABA cybersecurity handbook: A resource for attorneys, law firms and business professionals. New York: ABA Book Publishing