SlideShare a Scribd company logo
1 of 6
CYBER SECURITY
First, we start with Cyber definition, i.e.of, relating to, or involving computers
or computer networks (such as the Internet)the cyber marketplace.
Cyber” is derived from the Greek roots word “Kubernetes, refers to a pilot or
steersman a gift of governance that applies to leadership. Many presume that Cyber is
a portmanteau derived from other words but its evolution of usage, and a glimpse.
Cyber is more often part of compound words than portmanteaux.Understanding
Ciber’s root origin and evolution aid us to gain clarity and appreciation for the term
and its intentions as well as to move away from the image of the stereotypical black
hat hacker in a dark hoodie, illuminated by the glow of a laptop or the Edward
Snowdon archetype.
Cyber is firmly rooted in our vernacular, but some prefer the short and efficient “e-“
prefix as in e-mail and e-commerce. Cyber can be attached to almost anything to
make it sound futuristic or technical, but its origins are a word so ancient it’s in Greek
translations of the Old Testament of the Bible.
The word “cyber” everywhereincluding in each hashtag, events names, and even in
normal hand sanitizer used widely In COVID 19 pandemic as Cyber clean. However,
even with the market booming and the buzzword exploding, still not understanding
its meaning. It is just a part of IT training to learn as a part of annual security
training or willingly spreading the good word which equates to anything futuristic.
HISTORY
Its history begins from a famous book, Cybernetics, authored bywell-known
mathematicianMr.Norbert Wiener in the 1040s borrowing the ancient Greek word
Cyber. He was engaged in the fields of computer science, engineering, and biology.
He observed its interconnection, specifically the relationship between computers and
the human nervous system. Wiener pioneered its new hybrid field of anthro-cyber.
He wrotethat at the time a pretty futuristic idea — that one day there would be a
computer system that ran on feedback having a self-governing system that remained
for a long time under the purview of information theorists like Wiener, and early
computer programmers.Science fiction author Pat Cadigan, whose
novel Mindplayers is a cyberpunk classic, recalled that her first encounter with
“cyber” was of a decidedly Wienerish variety.
The term “cyber” has become in the millennial and Gen Z lexicon with
willingacceptability.Its developer is heard as an open-sourcecontainer system
designed by Godesignedogle, that automates application deployment andthe idea of
government or governing having fewof political theories about the science of
governance.
Many experts in the fieldwork promote this intersection of humanity and cyber as
they educate the public on how humans can control technology when empowered to
do so.
COMMON DERIVATIVE OF CYBER
Twoof the earliest derivations commonly usedfrom cyber are cyberspace and
cyberpunk. The following common words that derivedfrom cyber, their definitions,
origins, and use:-
Cyberspace –:
According to its Oxford English Dictionary (OED) cyberspace is ‘the space
of virtual reality, the notional environment within which electronic communication
(esp. via the Internet) occurs.’
The term “cyberspace” first appeared in the visual arts in the late 1960s, when Danish
artist Susanne Ussing (1940-1998) and her partner architect Carsten Hoff (b. 1934)
constituted themselves as Atelier Cyberspace. Using this name the two made a series
of installations and images entitled “sensory spaces” that were based on the principle
of open systems adaptable to various influences, such as human movement and the
behavior of new materials. Atelier Cyberspace worked at a time when the Internet did
not exist and computers were more or less off-limits to artists nd creative engagement.
In a 2015-interview with Scandinavian art magazine Kunstkritikk, Carsten Hoff
recollects, that although Atelier Cyberspace did try to implement computers, they had
no interest in the virtual space as such:
The term "cyberspace" refers to anything associated with the internet, first appeared
in fiction in the 1980s in the work of cyberpunk science fiction author William
Gibson, first in his 1982 short story "Burning Chrome" and later in his 1984 novel
Neuromancer. Afterward, the word became prominently identified with online
computer networks. The portion of Neuromancer cited in this respect is Cyberspace.
A consensual hallucination experienced daily by billions of legitimate operators, in
every nation, by children being taught mathematical concepts... A graphic
representation of data abstracted from the banks of every computer in the human
system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind,
clusters For common man ‘cyberspace’ was simply about managing spaces. It was
not esoteric or not digital, but merea tool. The space was concrete, physical.
Although the above cyber- formations cropped up,
including cyberworld, cyberland, Cyberia (punningly after Siberia), and cybersphere
(which is actually attested to earlier a cyberspace), cyberspace remains by far the
most popular cyber- term used to refer more broadly to the world of electronic
communications, although its popularity peaked in the late 1990s
Cyberpunk – As a subgenre of science fiction, cyberpunk first came out of New
Wave sci-fi novels of the late 60s and early 70s.
Cybersecurity – The first use of cybersecurity as a word dates to 1989 (the same year
cyberporn came into usage) but only cybersecurity prevailed as an expression.
Cybercrime – There are many forms of cybercrime from financial fraud to
cyberstalking, cyberdefamation, theft, forgery, and any criminal mischief involving
the internet.
Cyberdefense– Also known as cybersecurity, it’s the detection, prevention, and
response to cybercrime. It more often relates to military and government systems.
Cyberops– Short for cyber operations, cyberops is an interdisciplinary area of study
that covers cyberspace and operations and ranges from technical to non-technical.
Cyberdelic– Made from cyber and psychedelic, cyberdelic can refer to art, raves, or
immersive experiences meshing the internet with psychedelic drugs.
Cyborg – This technique is the marriage of cybernetic and organism, it refers to
something composed of both organic and biomechatronic parts.
It was the most lasting word creation of the 1960s,which combining e cyb-
of cybernetics with the org- or organism, referred to a man-machine being with the
capability of self-adapting to new environments. Even though the
term cyborg originated in a scientific publication, the concept quickly became the
arena of science fiction; the appearance of cyborg-inspired cybermen on the
television show Dr. Who by 1966 and in Martin Caidin’s 1972 novel Cyborg served
as the inspiration of the television shows The Six Million Dollar Man and The Bionic
Woman
Cybrarian – A cyber librarian, or cybrarian for short, is a researcher or librarian that
relies mostly on the internet for their information.
Cybernauts– A cybernaut is someone who immerses in an online experience using
sensory and virtual reality (VR) devices.
Cyber Monday, - while neither a portmanteau nor a compound word, is one of the
most well-known phrases associated with the word cyber. It follows Black Friday (the
day after Thanksgiving) and is an online shopping day that has now expanded to
Cyber Week.
Is cybersecurity one or two words?
Some prefer cybersecurity as one word and some as two. Some even like to hyphenate
it as cyber-security. Both the Merriam-Webster dictionary and the Associated Press
reject the hyphenated and two-word version. The US Department of Commerce’s
National Institute of Standards and Technology (NIST) uses it as one word.
Suzanne Kemmer, professor of linguistics at Rice University, describes cybersecurity
should be one word because cyber isn’t a “free-standing word” but rather a bound
morpheme, a combination of words to form a new word. Kemmer also states, “bio,
neo, photo are all parallel examples” adding that it’s bioinformatics. Kemmerbelieved
that in spite of industryspecialists’efforts and “make their own convention” the
“general pattern will win out in the language at large.” With the above opinion plus
the dictionary and AP style convention, it appears one-word usage will eventually
become the standard. At Alpine Security, we prefer cybersecurity and use it across the
board.
From information security to cybersecurity
Far a while used synonymously, information security and cybersecurity are the same.
NIST defines cybersecurity as “the ability to protect or defend the use of cyberspace
from cyberattacks.” To differentiate, NIST defines information security as “the
protection of information and information systems from unauthorized access… to
provide confidentiality, integrity, and availability.”
Still, the industry does not agree about the two terms are defined and relate. The
followings are a breakdown of types of security that relate to information systems and
electronic data.
Data security – Keeping data safe is the function of data security through all data is
information. For instance, a number is a data. If that number represents a date of birth,
it’s information.
Information security – Protecting information is the function of information
security. Information can be names, addresses, etc. Not all information is data. Not all
information is digital.
Cybersecurity – The function of cybersecurity is to protect information, but now
cybersecurity means to protect all things accessible in cyberspace.
Similarly in any field, terminology evolves. Given the parameters of data versus
information versus cybersecurity, business owners need all of it. Cybersecurity
doesn’t relate to the data and information in file cabinets but does encompass
everything digital within a business. As transactions and record-keeping evolve to
bedigital, cybersecurity is compulsory, no matter how you describe it.
Despite the rise of e- formations, e- has not made much of a dent in forming words
that relate to the more negative aspects of the Internet. Terms like cyberwar,
cyberattack, cyberterrorism, cyber blackmail, and cybercrimeare more prominent than
ever. This may be due to the clearer distinction offered by the term cyberwar versus a
formation like e-war, which does not offer the same clarity.
Cybercrime which was in news like the 2014 hacking of Sony (subsequently
connected to North Korea), the recent theft of bycybercrooks $1 billion from 30
different banks worldwide, and cases of bullying and harassment over digital devices
and social networks have only heightened the attention paid to these terms.
Cybercrime and cybersecurity will now remain at the forefront. We may see some
other variants and their implications on humankind.
.
:

More Related Content

What's hot

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 
Role of Social Media during the Mumbai Attacks
Role of Social Media during the Mumbai AttacksRole of Social Media during the Mumbai Attacks
Role of Social Media during the Mumbai AttacksCorinne Weisgerber
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
A bully in troll’s clothing
A bully in troll’s clothingA bully in troll’s clothing
A bully in troll’s clothingcoleaevans
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaperJuanRios179
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Brent Guglielmino
 

What's hot (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Hacking
HackingHacking
Hacking
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Hackers
HackersHackers
Hackers
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Internet in news
Internet in newsInternet in news
Internet in news
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Cyber war
Cyber warCyber war
Cyber war
 
Role of Social Media during the Mumbai Attacks
Role of Social Media during the Mumbai AttacksRole of Social Media during the Mumbai Attacks
Role of Social Media during the Mumbai Attacks
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Cyber and influence
Cyber and influenceCyber and influence
Cyber and influence
 
A bully in troll’s clothing
A bully in troll’s clothingA bully in troll’s clothing
A bully in troll’s clothing
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaper
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
Better Cyber Security Through Effective Cyber Deterrence_The Role of Active C...
 

Similar to Cyber security

Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveSharbani Bhattacharya
 
Tech2002lecweekseven0809
Tech2002lecweekseven0809Tech2002lecweekseven0809
Tech2002lecweekseven0809The_Joker
 
HISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxHISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxNeelJhala
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfonline Marketing
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumCERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumBob Rudis
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentationwremes
 
A review of some recent cyber theory
A review of some recent cyber theoryA review of some recent cyber theory
A review of some recent cyber theoryKeith Devereux
 
Cyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityCyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityBill Ross
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxOlusegun Mosugu
 
From Meatspace to Social Virtual Reality
From Meatspace to Social Virtual RealityFrom Meatspace to Social Virtual Reality
From Meatspace to Social Virtual RealityAxel Quack
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ictAbdul Wahab Raza
 
Invotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
The internet of things
The internet of thingsThe internet of things
The internet of thingsRicardo Murer
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 

Similar to Cyber security (20)

Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation Perspective
 
CYBER
CYBERCYBER
CYBER
 
Tech2002lecweekseven0809
Tech2002lecweekseven0809Tech2002lecweekseven0809
Tech2002lecweekseven0809
 
HISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxHISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptx
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Bullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdfBullet Proof Cyber Space Security .pdf
Bullet Proof Cyber Space Security .pdf
 
Timeline of Media Memes
Timeline of Media MemesTimeline of Media Memes
Timeline of Media Memes
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity SymposiumCERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity Symposium
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
A review of some recent cyber theory
A review of some recent cyber theoryA review of some recent cyber theory
A review of some recent cyber theory
 
Cyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityCyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_Security
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
From Meatspace to Social Virtual Reality
From Meatspace to Social Virtual RealityFrom Meatspace to Social Virtual Reality
From Meatspace to Social Virtual Reality
 
The history of hackers lab 2 of ict
The history of hackers  lab 2 of ictThe history of hackers  lab 2 of ict
The history of hackers lab 2 of ict
 
Invotra's History of Cyber Security
Invotra's History of Cyber SecurityInvotra's History of Cyber Security
Invotra's History of Cyber Security
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 

Recently uploaded

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 

Recently uploaded (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 

Cyber security

  • 1. CYBER SECURITY First, we start with Cyber definition, i.e.of, relating to, or involving computers or computer networks (such as the Internet)the cyber marketplace. Cyber” is derived from the Greek roots word “Kubernetes, refers to a pilot or steersman a gift of governance that applies to leadership. Many presume that Cyber is a portmanteau derived from other words but its evolution of usage, and a glimpse. Cyber is more often part of compound words than portmanteaux.Understanding Ciber’s root origin and evolution aid us to gain clarity and appreciation for the term and its intentions as well as to move away from the image of the stereotypical black hat hacker in a dark hoodie, illuminated by the glow of a laptop or the Edward Snowdon archetype. Cyber is firmly rooted in our vernacular, but some prefer the short and efficient “e-“ prefix as in e-mail and e-commerce. Cyber can be attached to almost anything to make it sound futuristic or technical, but its origins are a word so ancient it’s in Greek translations of the Old Testament of the Bible. The word “cyber” everywhereincluding in each hashtag, events names, and even in normal hand sanitizer used widely In COVID 19 pandemic as Cyber clean. However, even with the market booming and the buzzword exploding, still not understanding its meaning. It is just a part of IT training to learn as a part of annual security training or willingly spreading the good word which equates to anything futuristic. HISTORY Its history begins from a famous book, Cybernetics, authored bywell-known mathematicianMr.Norbert Wiener in the 1040s borrowing the ancient Greek word Cyber. He was engaged in the fields of computer science, engineering, and biology. He observed its interconnection, specifically the relationship between computers and the human nervous system. Wiener pioneered its new hybrid field of anthro-cyber. He wrotethat at the time a pretty futuristic idea — that one day there would be a computer system that ran on feedback having a self-governing system that remained for a long time under the purview of information theorists like Wiener, and early
  • 2. computer programmers.Science fiction author Pat Cadigan, whose novel Mindplayers is a cyberpunk classic, recalled that her first encounter with “cyber” was of a decidedly Wienerish variety. The term “cyber” has become in the millennial and Gen Z lexicon with willingacceptability.Its developer is heard as an open-sourcecontainer system designed by Godesignedogle, that automates application deployment andthe idea of government or governing having fewof political theories about the science of governance. Many experts in the fieldwork promote this intersection of humanity and cyber as they educate the public on how humans can control technology when empowered to do so. COMMON DERIVATIVE OF CYBER Twoof the earliest derivations commonly usedfrom cyber are cyberspace and cyberpunk. The following common words that derivedfrom cyber, their definitions, origins, and use:- Cyberspace –: According to its Oxford English Dictionary (OED) cyberspace is ‘the space of virtual reality, the notional environment within which electronic communication (esp. via the Internet) occurs.’ The term “cyberspace” first appeared in the visual arts in the late 1960s, when Danish artist Susanne Ussing (1940-1998) and her partner architect Carsten Hoff (b. 1934) constituted themselves as Atelier Cyberspace. Using this name the two made a series of installations and images entitled “sensory spaces” that were based on the principle of open systems adaptable to various influences, such as human movement and the behavior of new materials. Atelier Cyberspace worked at a time when the Internet did not exist and computers were more or less off-limits to artists nd creative engagement.
  • 3. In a 2015-interview with Scandinavian art magazine Kunstkritikk, Carsten Hoff recollects, that although Atelier Cyberspace did try to implement computers, they had no interest in the virtual space as such: The term "cyberspace" refers to anything associated with the internet, first appeared in fiction in the 1980s in the work of cyberpunk science fiction author William Gibson, first in his 1982 short story "Burning Chrome" and later in his 1984 novel Neuromancer. Afterward, the word became prominently identified with online computer networks. The portion of Neuromancer cited in this respect is Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts... A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters For common man ‘cyberspace’ was simply about managing spaces. It was not esoteric or not digital, but merea tool. The space was concrete, physical. Although the above cyber- formations cropped up, including cyberworld, cyberland, Cyberia (punningly after Siberia), and cybersphere (which is actually attested to earlier a cyberspace), cyberspace remains by far the most popular cyber- term used to refer more broadly to the world of electronic communications, although its popularity peaked in the late 1990s Cyberpunk – As a subgenre of science fiction, cyberpunk first came out of New Wave sci-fi novels of the late 60s and early 70s. Cybersecurity – The first use of cybersecurity as a word dates to 1989 (the same year cyberporn came into usage) but only cybersecurity prevailed as an expression. Cybercrime – There are many forms of cybercrime from financial fraud to cyberstalking, cyberdefamation, theft, forgery, and any criminal mischief involving the internet. Cyberdefense– Also known as cybersecurity, it’s the detection, prevention, and response to cybercrime. It more often relates to military and government systems.
  • 4. Cyberops– Short for cyber operations, cyberops is an interdisciplinary area of study that covers cyberspace and operations and ranges from technical to non-technical. Cyberdelic– Made from cyber and psychedelic, cyberdelic can refer to art, raves, or immersive experiences meshing the internet with psychedelic drugs. Cyborg – This technique is the marriage of cybernetic and organism, it refers to something composed of both organic and biomechatronic parts. It was the most lasting word creation of the 1960s,which combining e cyb- of cybernetics with the org- or organism, referred to a man-machine being with the capability of self-adapting to new environments. Even though the term cyborg originated in a scientific publication, the concept quickly became the arena of science fiction; the appearance of cyborg-inspired cybermen on the television show Dr. Who by 1966 and in Martin Caidin’s 1972 novel Cyborg served as the inspiration of the television shows The Six Million Dollar Man and The Bionic Woman Cybrarian – A cyber librarian, or cybrarian for short, is a researcher or librarian that relies mostly on the internet for their information. Cybernauts– A cybernaut is someone who immerses in an online experience using sensory and virtual reality (VR) devices. Cyber Monday, - while neither a portmanteau nor a compound word, is one of the most well-known phrases associated with the word cyber. It follows Black Friday (the day after Thanksgiving) and is an online shopping day that has now expanded to Cyber Week. Is cybersecurity one or two words? Some prefer cybersecurity as one word and some as two. Some even like to hyphenate it as cyber-security. Both the Merriam-Webster dictionary and the Associated Press
  • 5. reject the hyphenated and two-word version. The US Department of Commerce’s National Institute of Standards and Technology (NIST) uses it as one word. Suzanne Kemmer, professor of linguistics at Rice University, describes cybersecurity should be one word because cyber isn’t a “free-standing word” but rather a bound morpheme, a combination of words to form a new word. Kemmer also states, “bio, neo, photo are all parallel examples” adding that it’s bioinformatics. Kemmerbelieved that in spite of industryspecialists’efforts and “make their own convention” the “general pattern will win out in the language at large.” With the above opinion plus the dictionary and AP style convention, it appears one-word usage will eventually become the standard. At Alpine Security, we prefer cybersecurity and use it across the board. From information security to cybersecurity Far a while used synonymously, information security and cybersecurity are the same. NIST defines cybersecurity as “the ability to protect or defend the use of cyberspace from cyberattacks.” To differentiate, NIST defines information security as “the protection of information and information systems from unauthorized access… to provide confidentiality, integrity, and availability.” Still, the industry does not agree about the two terms are defined and relate. The followings are a breakdown of types of security that relate to information systems and electronic data. Data security – Keeping data safe is the function of data security through all data is information. For instance, a number is a data. If that number represents a date of birth, it’s information. Information security – Protecting information is the function of information security. Information can be names, addresses, etc. Not all information is data. Not all information is digital. Cybersecurity – The function of cybersecurity is to protect information, but now cybersecurity means to protect all things accessible in cyberspace.
  • 6. Similarly in any field, terminology evolves. Given the parameters of data versus information versus cybersecurity, business owners need all of it. Cybersecurity doesn’t relate to the data and information in file cabinets but does encompass everything digital within a business. As transactions and record-keeping evolve to bedigital, cybersecurity is compulsory, no matter how you describe it. Despite the rise of e- formations, e- has not made much of a dent in forming words that relate to the more negative aspects of the Internet. Terms like cyberwar, cyberattack, cyberterrorism, cyber blackmail, and cybercrimeare more prominent than ever. This may be due to the clearer distinction offered by the term cyberwar versus a formation like e-war, which does not offer the same clarity. Cybercrime which was in news like the 2014 hacking of Sony (subsequently connected to North Korea), the recent theft of bycybercrooks $1 billion from 30 different banks worldwide, and cases of bullying and harassment over digital devices and social networks have only heightened the attention paid to these terms. Cybercrime and cybersecurity will now remain at the forefront. We may see some other variants and their implications on humankind. . :