Open Access Open Access  Restricted Access Subscription or Fee Access

Vulnerability

Pashwa Dand, Dhaval Chudasama

Abstract


The term cyber safety is frequently used interchangeably with the term data security. This paper argues that, even though there's a vast overlap between cyber security and statistics security, these two concepts aren't totally analogous. Furthermore, the paper posits that cyber safety is going beyond the limits of conventional information security to consist of not only the safety of information resources, but also that of other assets, including the person him/herself. In information safety, reference to the human factor generally relates to the role(s) of humans in the security system. In cyber safety this factor has a further measurement, particularly, the humans as potential objectives of cyber assaults or even unknowingly taking part in a cyber-attack. This extra measurement has moral implications for society as an entire, since the protection of sure prone companies, as an instance youngster, might be visible as a societal obligation.


Full Text:

PDF

References


Rossouw von Solms, Johan van Niekerk. From information security to cyber security. Computers & Security. 2013;38:97-102.

Abi Tyas Tunggal. Upguard. What is a Vulnerability? [Online]. Available from https://www.upguard.com/blog/vulnerability

Becky Metivier. Tyler cyber security. Sage Advice - Cybersecurity Blog: 10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals [Online]. Available from https://www.tylercybersecurity.com/blog/10-tips-to-reduce-common-vulnerabilities-exploited-by-cybercriminals

BITS. Top 10 Cyber Crime Prevention Tips [Online]. Available from https://bitsbusinessit.com/top-10-cyber-crime-prevention-tips/

Wikipedia. Vulnerability (computing) [Online]. Available from https://en.m.wikipedia.org/wiki/Vulnerability_(computing)

Cyber Security. Category: Vulnerability Case Studies [Online]. Available from https://westoahu.hawaii.edu/cyber/category/vulnerability-research/vulnerability-case-studies/.

D M Chudasama, L K Sharma, et al. A Comparative Study of Information Systems Auditing in Indian Context. IPASJ INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY (IIJIT). 2019;7(4):020-028.

D M Chudasama, L. K. Sharma, et al. Refine Framework of Information Systems Audits in Indian Context. International Journal of Computer Sciences and Engineering. 2019;7(5):331-345.

Dhaval Chudasama, Darsh Patel, et al. Research on Cybercrime and its Policing. American Journal of Computer Science and Engineering Survey. 2020;8(3):14.

Chudasama DM, Kathan Patel, et at. Awareness of Data Privacy Breach in Society. International Journal of All Research Education and Scientific Methods (IJARESM). 2020; 8(10):303–307.

Soham Shah, M A Lokhandwala, et al. Decoding Farm Laws. International Journal of Scientific Research and Engineering Development. 2021;4(2):590-595.




DOI: https://doi.org/10.37591/ijowns.v7i1.707

Refbacks

  • There are currently no refbacks.