Phuzion
Archives (Index) |
This page is archived by ClueBot III.
|
{{SAFESUBST:Void|
Hello, some months ago I suggested creating a new article to separate cybersecurity form computer security, this was rejected, abut as time passes and more and more events happen, we are more convinced that there is a need for having a separate article for cybersecurity, the justification and explanation of why it is different is in the suggested article, but is summary:
Cybersecurity refers to the protection of computer systems, networks, and data including the infrastructure, processes, physical systems, and people depending on those computer systems, from theft, damage, or unauthorized access. It involves the use of technology, processes, and practices to safeguard digital information from threats such as cybercrime, espionage, and hacktivism. According to NIST cybersecurity is "The ability to protect or defend the use of cyberspace from cyber attacks.".[1] Cybersecurity should be differentiated from other types of computer security and information security, covering not only the protection of information or computers, but also protecting the infrastructure, services and supply chains dependent on information technology and communication systems. This includes the concept of a Cyber-physical_system and other processes which are not technology but depend on technology. CISA defines cybersecurity as the "art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information."
Cybersecurity is also defined by NIST as "Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation."
Cybersecurity vs information security Cybersecurity is becoming increasingly important as technology continues to advance and more information and activities are used, processed, stored and carried-on in the cyberspace and with online services. It is essential for protecting sensitive data such as personal information, financial records, and intellectual property, not only for data or information management, but to support, automate and efficient work and activities of all kinds, applied to all productive, entertainment and personal sectors leading to an exponential growth in the number of connected devices, activities and services. For example, we find connected devices for the control and automation of home functions - called home automation or domotics - such as on and off lights, climate control and air conditioning, opening and closing doors, among others. In the same way in the business environment, we find devices that control alarms, elevators, fire monitoring and control, room automation, access control of staff and visitors, and many other applications for industrial control system. Connected cars, medical devices – including some inserted into the human body, such as pacemakers and insulin pumps – are increasingly coming to market, along with the connection of power, gas and other commodities.
Some reasons for separating cybbersecurity from computer security:
Broader Scope: Cybersecurity covers more than just protecting individual computer systems (computer security) or safeguarding information (information security). It includes defending entire networks, infrastructures, and cyber-physical systems (e.g., smart grids, IoT devices) from various digital threats.
New Challenges: Cybersecurity addresses modern threats like ransomware, cyberterrorism, and advanced persistent threats (APTs), which require specialized strategies beyond traditional computer or information security.
Interdisciplinary Nature: Cybersecurity involves law enforcement, global policies, public-private partnerships, and emerging technologies like AI and quantum computing, demanding a comprehensive framework distinct from other fields.
Therefore, cybersecurity is related to information security and computer security, but also considers the protection of related infrastructure, products and services. Then cybersecurity is the protection of information and telecommunication technologies (ICT), the data processed and the infrastructure, products and services depending on them.
According with Information Systems Audit and Control Association (ISACA) cybersecurity is "the protection of information assets by addressing threats to information processed, stored, and transported by internet worked information systems"[4] according to which there are several key components of cybersecurity, including:
Network security: This involves protecting the network infrastructure from unauthorized access, attacks, and other security threats. Endpoint security: This refers to securing individual devices such as laptops, smartphones, and tablets from malware, viruses, and other cyber threats. Application security: This involves securing applications and software programs from attacks and vulnerabilities. Data security: This involves protecting sensitive data from theft or unauthorized access through encryption, access controls, and other measures. Identity and access management: This involves ensuring that only authorized users have access to sensitive data and systems, and that their identities are properly authenticated. Cybersecurity professionals use a range of tools and techniques to protect systems and data from cyber threats. These include firewalls, intrusion detection and prevention systems, antivirus software, encryption, and vulnerability scanners.
I conclusion, both concepts can be improved having separate articles for Computer Security and cybersecurity, because cybersecurity includes the protection of elements and processes which are not technology but depend on technology, as society depends more and more on technology"
Would you consider this, please? I have the article already in wikipedia draft, but obviously it can be improved by more contributors
Orphaned non-free image File:Siemens NX Logo.png
editThanks for uploading File:Siemens NX Logo.png. The image description page currently specifies that the image is non-free and may only be used on Wikipedia under a claim of fair use. However, the image is currently not used in any articles on Wikipedia. If the image was previously in an article, please go to the article and see why it was removed. You may add it back if you think that that will be useful. However, please note that images for which a replacement could be created are not acceptable for use on Wikipedia (see our policy for non-free media).
Note that any non-free images not used in any articles will be deleted after seven days, as described in section F5 of the criteria for speedy deletion. Thank you. --B-bot (talk) 03:31, 11 November 2024 (UTC)
ArbCom 2024 Elections voter message
editHello! Voting in the 2024 Arbitration Committee elections is now open until 23:59 (UTC) on Monday, 2 December 2024. All eligible users are allowed to vote. Users with alternate accounts may only vote once.
The Arbitration Committee is the panel of editors responsible for conducting the Wikipedia arbitration process. It has the authority to impose binding solutions to disputes between editors, primarily for serious conduct disputes the community has been unable to resolve. This includes the authority to impose site bans, topic bans, editing restrictions, and other measures needed to maintain our editing environment. The arbitration policy describes the Committee's roles and responsibilities in greater detail.
If you wish to participate in the 2024 election, please review the candidates and submit your choices on the voting page. If you no longer wish to receive these messages, you may add {{NoACEMM}}
to your user talk page. MediaWiki message delivery (talk) 00:10, 19 November 2024 (UTC)