This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
References
[1]
von Solms, R. and van Niekerk, J. (2013) From Information Security to Cyber Security. Computers & Security, 38, 97-102. https://profsandhu.com/cs6393_s19/Solms-Niekerk-2013.pdf
[2]
(2023) What Is Information Security: Policy, Principles & Threats. Imperva. https://www.imperva.com/learn/data-security/information-security-infosec/
[3]
Rudra, A. (2022) Information Security vs Cyber Security: How Are They Mutually Exclusive? https://powerdmarc.com/information-security-vs-cyber-security/
[4]
Fadziso, T., Thaduri, U.R., Dekkati, S. and Ballamudi, V.K.R. (2023) Evolution of the Cyber Security Threat: An Overview of the Scale of. https://www.researchgate.net/publication/374156044_Evolution_of_the_Cyber_Security_Threat_An_Overview_of_the_Scale_of_Cyber_Threat
[5]
Linkov, I. and Kott, A. (2018) Fundamental Concepts of Cyber Resilience: Introduction and Overview. https://www.researchgate.net/publication/325680212_Fundamental_Concepts_of_Cyber_Resilience_Introduction_and_Overview
[6]
Li, Y.C. and Liu, Q.H. (2021, September 3) A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments. Energy Reports, 7, 8176-8186. https://www.sciencedirect.com/science/article/pii/S2352484721007289 https://doi.org/10.1016/j.egyr.2021.08.126
[7]
Saeed, S., Suayyid, S.A., Al-Ghamdi, M.S., Al-Muhaisen, H. and Almuhaideb, A.M. (2023, August 19) A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23, Article No. 7273. https://www.mdpi.com/1424-8220/23/16/7273 https://doi.org/10.3390/s23167273
[8]
Goel, M. (2023, January 27) A Few Major Cybersecurity Attacks from 2013 to 2021. Medium.
[9]
McNicholas, E.R. and Angle, K.J. (2023) Cybersecurity Laws and Regulations Report 2024 USA. Global Legal Group. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa
[10]
Nieles, M., Dempsey, K. and Pillitteri, V.Y. (2017) An Introduction to Information Security. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf
[11]
Tyagi, A.K. and Sreenath, N. (2021, December 23) Cyber Physical Systems: Analyses, Challenges and Possible Solutions. Internet of Things and Cyber-Physical Systems, 1, 22-33. https://www.sciencedirect.com/science/article/pii/S2667345221000055 https://doi.org/10.1016/j.iotcps.2021.12.002
[12]
RSI Security (2021, December 6) What Is Real-Time Threat Analysis? https://blog.rsisecurity.com/what-is-real-time-threat-analysis/
[13]
Linkov, I., Fox-Lent, C., Read, L. and Allen, C.R. (2018) Tiered Approach to Resilience Assessment. Risk Analysis, 38. https://www.researchgate.net/publication/324760628_Tiered_Approach_to_Resilience_Assessment https://doi.org/10.1111/risa.12991
[14]
Munusamy, T. and Khodadi, T. (2023) Building Cyber Resilience: Key Factors for Enhancing Organizational Cyber Security. Journal of Informatics and Web Engineering, 2, 59-71. https://www.researchgate.net/publication/373895791_Building_Cyber_Resilience_Key_Factors_for_Enhancing_Organizational_Cyber_Security https://doi.org/10.33093/jiwe.2023.2.2.5