MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL

Edy Susanto, Lady Antira, Kevin Kevin, Edo Stanzah, Assyeh Annasrul Majid
{"title":"MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL","authors":"Edy Susanto, Lady Antira, Kevin Kevin, Edo Stanzah, Assyeh Annasrul Majid","doi":"10.46273/jobe.v11i1.365","DOIUrl":null,"url":null,"abstract":"In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
","PeriodicalId":15119,"journal":{"name":"Journal of Business and Entrepreneurship","volume":"294 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Business and Entrepreneurship","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46273/jobe.v11i1.365","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
数字时代的网络安全管理
在这个快速发展的数字时代,网络安全已成为最重要的关注方面之一。信息和通信技术的发展给我们的生活带来了许多好处,同时也带来了与数据安全相关的严重风险。网络可以以数据盗窃、破坏系统、操纵信息或身份盗窃的形式存在。首先,随着时间和技术的进步,网络攻击变得越来越复杂和不断发展。攻击者可以通过各种复杂的方法和工具来利用系统漏洞并获得无效的访问权限。其次,网络通常具有跨境性质,攻击者可以在海外活动,这使得识别和执法变得困难。此外,技术进步也将攻击扩展到新的领域,如物联网(IoT)、自动驾驶汽车系统和人工智能。设备和联网基础设施之间不断扩展的连接性增加了网络安全的复杂性。然而,重要的是要记住,网络安全不是一个无法克服的挑战。为了保护数据和计算机系统,可以采用各种安全策略和措施。通过结合技术手段、强有力的安全政策、培训用户意识以及相关各方的合作,安全网络可以得到显著改善。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信