Cyber Security plays avery important role in the field of ICT. Ensuring Cyber Security Compliance has become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many.
With the ever-increasing Technology, Cyber security Rrequirements also evolves and thus the Cyber insecurity also evolves, to face these Challenges, Individuals, Companies need to adopt the Cyber security Ethics
CYBER SECURITY
Privacy and security of the data will always be top security measures that any organization takes care. We are presently living in a world where all the information is maintained in a digital or a cyber form. Social networking sites provide a space where users feel safe as they interact with friends and family. In the case of home users, cyber-criminals would continue to target social media sites to steal personal data. Not only social networking but also during bank transactions a person must take all the required security measures.
Some of the Involving Technologies
- Cloud computing and its services
These days all small, medium and large companies are slowly adopting cloud services. In other words, the world is slowly moving towards the clouds. This latest trend presents a big challenge for cyber security, as traffic can go around traditional points of inspection. Additionally, as the number of applications available in the cloud grows, policy controls for web applications and cloud services will also need to evolve in order to prevent the loss of valuable information. Though cloud services are developing their own models still a lot of issues are being brought up about their security. Cloud may provide immense opportunities but it should always be noted that as the cloud evolves so as its security concerns increase.
- Mobile Networks
Today we are able to connect to anyone in any part of the world. But for these mobile network’s security is a very big concern. These days firewalls and other security measures are becoming porous as people are using devices such as tablets, phones, PC’s etc all of which again require extra securities apart from those present in the applications used. We must always think about the security issues of these mobile networks. Further mobile networks are highly prone to these cyber crimes a lot of care must be taken in case of their security issues.
- Artificial intelligence
Artificial intelligence (AI), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and uses learning and intelligence to take actions that maximize their chances of achieving defined goals. Such machines may be called AIs.
AI technology is widely used throughout industry, government, and science. Some high-profile applications include advanced web search engines recommendation systems
CYBER SECURITY ETHICS
Cyber Security ethics are nothing but the code of conduct to avoid bleaching cybersecurity requirements. Individuals, Vendors and Operator need to adhere to the Cyber security Ethics in their daily interaction with the Network to avoid any bleach of cyber security, below are some of the Ethics that need to be adopted by everyone.
- There should be restricted Access, all access to the network should be strictly Authorized, Individuals, Companies should ensure this strictly controlled and all individuals are well informed about this, do not access others systems, Devices to collect, process, or modify the data and information without permission.
- Account management to the network, all accounts to the network should be Authorized, unauthorized Accounts should be traced and cancelled, do not Use other people’s account or no permission account to log in to other’s devices.
- Networks should be regularly scanned for any malicious codes or software wares and any Malicious code or Vulnerability should be handled on time in products or services.
- Personal data has to be processed lawfully, fairly, and in a transparent manner in relation to the data subject
- Personal data shouldn’t be kept for no longer than is necessary for the purposes for which the personal data are processed
- Reasonable steps must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without undue delay
- Use appropriate technical or organizational measures to ensure appropriate security of personal data, including protection against accidental or unlawful destruction, loss, alternation, unauthorized access, or disclosure
- Personal data should relevant, and limited to what is necessary in relation to the purposes for which they are processed
- Data controllers should be responsible for and be able to demonstrate compliance with the principles
With All these Ethics in place we can achieve a secure and safe cyber security environment where individuals and company feel safe about their Devices and personnel Data.
Report is from Huawei Uganda CSPO Kevin.
Do you have a story in your community or an opinion to share with us: Email us at editorial@watchdoguganda.com