Importance Of Cyber Security
- IJLLR Journal
- May 5, 2023
- 2 min read
Riya Sharma, BA LLB, Manav Rachna University
ABSTRACT
Currently, the majority of international economic, commercial, cultural, social, and governmental interactions and activities—including those of individuals, non-governmental organizations, governments, and governmental institutions—are conducted online. Recently, cyber-attacks and the risk of wireless communication technologies have become issues for many private businesses and governmental institutions around the world. The modern society is heavily reliant on electronic technology, so safeguarding this data from cyber-attacks is a difficult problem. The goal of cyber-attacks is to financially hurt businesses. Cyber-attacks may also serve military or political objectives in other circumstances. PC infections, knowledge gaps, data distribution services (DDS), and other attack vectors are a few examples of these harms. In order to protect harm from cyber- attacks, numerous organizations employ a variety of measures. Currently, the majority of national Cyber security interactions and economic, commercial, cultural, and social activities rely on real-time information on the most recent IT data. Researchers from all over the world have up till now offered a variety of techniques to stop cyber-attacks or lessen the harm they inflict. Some of the methods are now being used, while others are still being studied. The purpose of this study is to examine and thoroughly review the standard advancements made in the area of cyber security as well as to look into the difficulties, advantages, and disadvantages of the suggested approaches. The several new descendant assaults are discussed in detail. The history of early- generation cyber-security techniques are explored together with standard security frameworks. In addition, current events and emerging trends. Cyber security innovations, security risks, and challenges are discussed. The thorough review study that has been offered to IT and cyber security researchers is anticipated to be helpful.
Keywords: Cyber security, Cyber Action, Cyberspace, Cyber security policy