Cyber Security Ethics are needed to overcome cyber security challenges- Huwaei Zimbabwe

Online

Cyber Security plays a very important role in the field of ICT. Ensuring cyber security compliance has become one of the biggest challenges in the present day. Whenever we think about cyber security the first thing that comes to our mind is cybercrimes which are increasing immensely day by day. Various Governments and companies are taking many measures to prevent these cybercrimes. Besides various measures, cyber security is still a very big concern to many.

With the ever-increasing technology, cyber security requirements also evolve and thus cyber insecurity also evolves, to face these challenges, individuals, and companies need to adopt cyber security ethics.

CYBER SECURITY
Privacy and security of the data will always be top security measures that any organization takes care of. We are presently living in a world where all the information is maintained in a digital or a cyber form. Social networking sites provide a space where users feel safe as they interact with friends and family. In the case of home users, cyber-criminals would continue to target social media sites to steal personal data. Not only social networking but also during bank transactions a person must take all the required security measures.

Some of the involved technologies:

 Cloud computing and its services
These days all small, medium and large companies are slowly adopting cloud services. In other words, the world is slowly moving towards the clouds. This latest trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection. Additionally, as the number of applications available in the cloud grows, policy controls for web applications and cloud services will also need to evolve to prevent the loss of valuable information. Though cloud services are developing their own models still a lot of issues are being brought up about their security. The cloud may provide immense opportunities but it should always be noted that as the cloud evolves so as its security concerns increase.

 Mobile Networks
Today we can connect to anyone in any part of the world. But for these mobile networks security is a very big concern. These days firewalls and other security measures are becoming porous as people are using devices such as tablets, phones, PC’s etc all of which again require extra security apart from those present in the applications used. We must always think about the security issues of these mobile networks. Further mobile networks are highly prone to these cyber crimes a lot of care must be taken in case of their security issues.

 Artificial intelligence
Artificial intelligence (AI), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. Such machines may be called AIs.
AI technology is widely used throughout industry, government, and science. Some high-profile applications include advanced web search engine recommendation systems

CYBER SECURITY ETHICS
Cyber Security ethics are nothing but the code of conduct to avoid bleaching cybersecurity requirements. Individuals, vendors, and operators need to adhere to the cyber security ethics in their daily interaction with the network to avoid any breach of cyber security, below are some of the ethics that need to be adopted by everyone.

 There should be restricted Access, and all access to the network should be strictly Authorized, Individuals and companies should ensure this is strictly controlled and all individuals are well informed about this, do not access other systems or devices to collect, process, or modify the data and information without permission.
 Account management to the network, all accounts to the network should be Authorized, unauthorized Accounts should be traced and cancelled, and do not Use other people’s accounts or no permission accounts to log in to other devices.
 Networks should be regularly scanned for any malicious codes or software wares and any Malicious code or Vulnerability should be handled on time in products or services.
 Personal data has to be processed lawfully, fairly, and in a transparent manner concerning the data subject
 Personal data shouldn’t be kept for no longer than is necessary for the purposes for which the personal data are processed
 Reasonable steps must be taken to ensure that inaccurate personal data, having regard to the purposes for which they are processed, are erased or rectified without undue delay
 Use appropriate technical or organizational measures to ensure appropriate security of personal data, including protection against accidental or unlawful destruction, loss, alteration, unauthorized access, or disclosure
 Personal data should be relevant,and limited to what is necessary concerning the purposes for which they are processed
 Data controllers should be responsible for and be able to demonstrate compliance with the principles

With All these Ethics in place, we can achieve a secure and safe cyber security environment where individuals and companies feel safe about their Devices and personnel Data.

Huawei Zimbabwe

You Might Also Like

Comments