数字时代的网络安全管理

Edy Susanto, Lady Antira, Kevin Kevin, Edo Stanzah, Assyeh Annasrul Majid
{"title":"数字时代的网络安全管理","authors":"Edy Susanto, Lady Antira, Kevin Kevin, Edo Stanzah, Assyeh Annasrul Majid","doi":"10.46273/jobe.v11i1.365","DOIUrl":null,"url":null,"abstract":"In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
","PeriodicalId":15119,"journal":{"name":"Journal of Business and Entrepreneurship","volume":"294 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL\",\"authors\":\"Edy Susanto, Lady Antira, Kevin Kevin, Edo Stanzah, Assyeh Annasrul Majid\",\"doi\":\"10.46273/jobe.v11i1.365\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
\",\"PeriodicalId\":15119,\"journal\":{\"name\":\"Journal of Business and Entrepreneurship\",\"volume\":\"294 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Business and Entrepreneurship\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46273/jobe.v11i1.365\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Business and Entrepreneurship","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46273/jobe.v11i1.365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在这个快速发展的数字时代,网络安全已成为最重要的关注方面之一。信息和通信技术的发展给我们的生活带来了许多好处,同时也带来了与数据安全相关的严重风险。网络可以以数据盗窃、破坏系统、操纵信息或身份盗窃的形式存在。首先,随着时间和技术的进步,网络攻击变得越来越复杂和不断发展。攻击者可以通过各种复杂的方法和工具来利用系统漏洞并获得无效的访问权限。其次,网络通常具有跨境性质,攻击者可以在海外活动,这使得识别和执法变得困难。此外,技术进步也将攻击扩展到新的领域,如物联网(IoT)、自动驾驶汽车系统和人工智能。设备和联网基础设施之间不断扩展的连接性增加了网络安全的复杂性。然而,重要的是要记住,网络安全不是一个无法克服的挑战。为了保护数据和计算机系统,可以采用各种安全策略和措施。通过结合技术手段、强有力的安全政策、培训用户意识以及相关各方的合作,安全网络可以得到显著改善。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL
In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
THE EFFECT OF ENTREPRENEURSHIP EDUCATION ON STUDENTS' SCOPE START-UP ACTIVITIES EVALUATION OF HOUSEHOLD WASTE MANAGEMENT IN OTOMONA VILLAGE, MIMIKA BARU DISTRICT, TIMIKA CITY MARKETING STRATEGY TO INCREASE SALES OF YUASA BATTERY BRAND AT CV HARKAT FAWWAZ SEJAHTERA PERAN MODEL KEPEMIMPINAN TRANSFORMASIONAL DALAM KESIAPAN BERUBAH KARYAWAN TERHADAP EFEKTIVITAS KINERJA KARYAWAN IMPLEMENTASI WORK FROM HOME DAN DAMPAKNYA TERHADAP KINERJA KARYAWAN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1