The processes of globalization and information linking changed the global trends in the functioning of the social system. Cyber space, as we know it today, has evolved into a global, interconnected network of systems and information, that has transformed the behavior of governments, businesses, citizens and opened up new markets with endless opportunities to promote trade. But no one foresaw the right to proportional process by which one side of cyberspace provides limitless opportunities for citizens, businesses, governments and states, and, on the other side, an unlimited number of threats and risks to their safety. The term “cyber” has been used to describe almost anything that has to do with networks and computers, especially in the security field. Another emerging field of study is looking at conflicts in cyberspace, including state-on-state cyber warfare, cyber terrorism, cyber crime, cyber militias etc. Unfortunately, however, there is no consensus on what “cyberspace” is.
Securing cyber space, cyber attacks has become a challenge for the countries in the world. A wide range of sophisticated crimes are now being perpetrated through cyber space. This includes identity theft, the production and distribution of child pornography and child exploitation conspiracies, banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences. The priority tasks for national governments should be to find legal solutions and regulations for dealing with cyber threats, to predict and prevent attacks against cyberspace, cooperation with the private sector and security experts, training of state security personnel, finding a suitable response attacks and rapid recovery of the attacked systems and networks. Many states have recognized these asymmetric threats and through their national security strategies have given them top priority.
Definition of Cyber security
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
Critical infrastructure which means government, military, corporate, financial and medical organizations and others collect, process and store unprecedented amounts of data on computers and other devices. Information such as intellectual property, financial data, personal information and other types of data can be sensitive, and any unauthorized access or exposure could have negative consequences. Also, any transmission of sensitive information across networks requires protection on it, and system used to process or stores it.
Challenges of Cyber Security
Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include:
- Application Security
- Information Security
- Network security
- Database and infrastructure security
- Cloud security
- Disaster recovery/ Business continuity Planning
- Operational Security
- End-user education