Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

CHAPTER 13CYBERSECURITY: A PRACTICAL STRATEGY AGAINST CYBER THREATS, RISKS WITH REAL WORLD USAGES

Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra

1 Department of Information Technology, C.V. Raman College of Engineering, Bhubaneswar, Odisha, India

Emails: anjanamishra2184@gmail.com, ghosh.soumitra2@gmail.com, brojokishoremishra@gmail.com

Abstract

Cybersecurity consists of all the methods to protect the reliability, veracity, usability, consistency and safety of the data, programs and entire computer networks from illegal access which can be exploited. This chapter mainly discusses the importance and application of cybersecurity in the present era. It defines cyberwar, which refers to knowledge-related conflict at the military level, the ISA which state a number of the key challenges facing the industry, particularly in collecting and distributing information. This chapter also highlights some strategies to maintain the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts like mobile security issues, secure email, online banking, cyber health check, cyber incident response management, cybersecurity risk management, cybersecurity schemes and services.

Keywords: Cybersecurity, threats, risk, cyberwar, ISA, cyberspace, mobile security, cybersecurity healthcare

13.1 Introduction

The attention towards cybersecurity is very important as well as at an all-time high. Numerous countries and enterprises realize that digital dangers stand ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book