Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Technology and Trend Point of View Cyber Security


Affiliations
1 Nandha Engineering College, Erode-52, India
     

   Subscribe/Renew Journal


In today’s business environment, disruptive technologies such as cloud computing, social computing, and next-generation mobile computing are fundamentally changing how organizations utilize information technology for sharing information and conducting commerce online. This wave of technology innovation, often driven by consumer trends which are being rapidly adopted across the enterprise, has created unparalleled levels of access and connectivity across people, information, systems and assets worldwide and has transformed today’s network-delivered society. In the Cyber Security arena, the increasing sophistication, frequency and scale of cyber-crime as a rapid result of this open and network-oriented society, coupled with the recent explosion in the use of "edge" devices and cloud-based applications, and increasing regulatory and compliance requirements, has created an urgent need for organizations to rapidly advance their security counter-measures and re-think traditional approaches. On a more global level, due to the compelling and pressing nature of the issues involved, many countries have elevated Cyber Security to a top-tier priority within their national security strategies.
To keep pace and stay ahead of escalating risk levels while at the same time efficiently managing costs, business leaders need to rethink their Cyber Security postures in the context of a broader risk management strategy and adopt a new strategic framework that addresses these numerous disruptive trends across the IT landscape. By having a logical framework for understanding Cyber Security, and the major domains it represents, enterprises can implement their Cyber strategies and develop specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the "borderless" enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.
For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 193

PDF Views: 3




  • Technology and Trend Point of View Cyber Security

Abstract Views: 193  |  PDF Views: 3

Authors

R. Kumudha
Nandha Engineering College, Erode-52, India
A. R. Abirami
Nandha Engineering College, Erode-52, India

Abstract


In today’s business environment, disruptive technologies such as cloud computing, social computing, and next-generation mobile computing are fundamentally changing how organizations utilize information technology for sharing information and conducting commerce online. This wave of technology innovation, often driven by consumer trends which are being rapidly adopted across the enterprise, has created unparalleled levels of access and connectivity across people, information, systems and assets worldwide and has transformed today’s network-delivered society. In the Cyber Security arena, the increasing sophistication, frequency and scale of cyber-crime as a rapid result of this open and network-oriented society, coupled with the recent explosion in the use of "edge" devices and cloud-based applications, and increasing regulatory and compliance requirements, has created an urgent need for organizations to rapidly advance their security counter-measures and re-think traditional approaches. On a more global level, due to the compelling and pressing nature of the issues involved, many countries have elevated Cyber Security to a top-tier priority within their national security strategies.
To keep pace and stay ahead of escalating risk levels while at the same time efficiently managing costs, business leaders need to rethink their Cyber Security postures in the context of a broader risk management strategy and adopt a new strategic framework that addresses these numerous disruptive trends across the IT landscape. By having a logical framework for understanding Cyber Security, and the major domains it represents, enterprises can implement their Cyber strategies and develop specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the "borderless" enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.
For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.