Information Technology Innovation

4/7/2025

Microsoft Office/ Cybersecurity

Cybersecurity, which is also referred to by some as computer security relates to the protection of networks, unauthorized access, criminal use and devices and ensures availability of information, confidentiality and integrity.  The hardware in a computer system is often protected by cybersecurity if available and this type of system is used for the protection of similar equipment involving serial numbers, alarms, locks and doors.  The protection of information systems access can be achieved through different measures but are often very complex to achieve.  Security precautions for computer information often address 4 common threats that are considered major which include; government secrets on computers, fraud, financial or medical data and vandalism.  The basic protection of a computer system against vandalism, theft, illegal behaviors and invasion of privacy is by recording and tracking electronically the users of that system.  The process is often done by using an individual password for the system that is assigned to a specific individual.  The system can begin to track and record all information pertaining to the passwords used and any data or files that were accessed on the system of the computer.  A security measure that is often used to keep us with data is the process of storing data on a different medium or device that is separate from the original computer system.  Creating data that is encrypted is a great security measure that can only be deciphered by certain individuals that have the encryption key is often referred to as data encryption and often used by organizations.  Since the late 1960’s computer security has evolved regarding information technology.  Personal computers since the 1980’s have proliferated because hackers were able to gain access to individuals private information from the privacy of their homes illegally.  The advancement and growth of the internet from the 20th century became more aware and concerned about computer security and decided to develop more advanced security techniques that now eliminate these threats.  The measures taken involved concurrent developments that help stop computer crime and prevent ongoing threats for private systems.  In conclusion, there are still threats of cybercrime today, but there are also different systems and software available that can be used to protect the privacy of individuals personal and business information.  I personally have adopted a cybersecurity system on all my technological devices to feel safe and secure and I would recommend any individual or organization to do the same.

References

Borky, J. M., & Bradley, T. H. (2018). Protecting Information with Cybersecurity. Effective Model-Based Systems Engineering, 345–404.