The core purpose of cyber security is to protect all the electronic devices that use (including computers, smart phones, PDAs, and laptops) and/or access (both in work and on the internet) from potential damage or theft. It includes activities to prevent and mitigate unauthorized access, data loss, use of systems and applications, security vulnerabilities, deliberate act of intrusions and attacks, and related events. There are different types of cyber security. They include physical security, information security, strategic security, information assurance, social media security, and environmental and occupational security.
Physical Security – This covers measures for preventing and managing any intentional or unintentional access to information systems and physical assets. These can take various forms, ranging from software and hardware break-ins, to vandalism and information system compromise. This is the most traditional form of cyber security and is the focus of a large part of London’s security work.
For most types of physical cyber security, there are two components: (a) a brief duration of notice to the public (for example, a website outage may be declared ‘outage’ for one hour) and (b) a more detailed description of the problem followed by mitigation. A brief duration of notice lets users know what is going on without bogging them down with an overly detailed news release, while a more detailed explanation lets them know what to expect as mitigation actions are carried out. In the case of campuswide information systems, such as those running campus printers or network connection points, this type of notification may also be used to inform employees.
The second element of cyber security is information assurance. This element takes the form of a more in-depth understanding of the potential threats and attacks, together with a strategy for mitigating these risks. The goal of this component is not to stop the attacks but to protect the systems from being compromised. This is achieved through a combination of (a) securing the systems against external attack and (b) creating a controlled environment in which the attacks cannot occur. This may require the creation of a firewall between the internal computer networks and the Internet, or it may mean using the existing network infrastructure as a barrier against external attack. In the case of campus-based networks, this may require the establishing of a campus network and relying on IT providers to provide a gateway to allow traffic between internal networks and the Internet.
With advanced practice (full-time) provided by campus overview, there is also the opportunity to collaborate on issues related to cyber security and Internet security. It is through this component that students gain access to the experts’ opinion on how best to implement their ideas into practice. This aspect of cyber security is the focus of a course at City University London (UCL). In this course, we follow the relationship between campus and community, as well as between campus and government and citizenry, to provide an informed assessment of cyber security in London.
One of the main areas of cyber security is risk management. Risks in cyber security may be very diverse and thus managing them effectively becomes difficult. To manage cyber security effectively, it requires a mixture of different disciplines. These disciplines are information science, cyber law, information security, engineering, and computer science. The United Kingdom’s National Health Service (NHS) is a great place to gain knowledge in this area, as it has many sectors involved in its health-related programs. On the other hand, the United Kingdom’s Cabinet Office and Department for Business, Innovation and Skills are another great place to gain knowledge in this area.
After considering the technical aspects, it is important to look at the social and human aspects that go into cyber-security. A lot of research has been carried out to understand what it takes to safeguard data in the cyber space. A lot of attention has also been given to ways in which the public can help improve their levels of cyber awareness. While no one can say what the exact content of the internet will be in the future, there are some experts who believe that the threat of terrorism can be limited if we take preventive measures and work to prevent attacks on cyber networks.
Effective measures such as email authentication, MAC addresses, firewall protection, antivirus support, and port protection can prevent attackers from gaining access to a network. Many experts believe that the best form of cyber security will be a mix of these techniques. These include content filtering, sandboxing, and penetration testing. However, it will be quite some time before we see comprehensive and complete solutions, but this is something that all network security services will be working on.