International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Informative Article | Information Security | India | Volume 6 Issue 5, May 2017

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C

IT has disrupted businesses over the past decade like no other technology has ever. As IT increasingly touches our lives in many different ways like internet banking, online shopping, smart homes and self-driven cars, our dependency on IT is reaching a point of no return. Information Security (InfoSec) /Security in the Digital Economy is practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information (Wikipedia). It is the series of measures deployed by organizations to ensure that their customer data and business critical information are accessed and consumed by authorized people only. InfoSec also ensures that the above mentioned information is not altered or erased inadvertently. It can be leveraged by business to securely expand and be global. So, it is imperative that information security be at the forefront of all organizations to ensure there is secure delivery of services to customers, and the privacy of citizens is protected. It is equally important that the assets of an organization are protected against cyberattacks.

Keywords: Security, threats, hacking

Edition: Volume 6 Issue 5, May 2017

Pages: 2678 - 2678


How to Cite this Article?

Riya V S, Dr. Aarthy C, "Cyber Security - A Business Accelerator??", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174068, Volume 6 Issue 5, May 2017, 2678 - 2678

33 PDF Views | 42 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Research Paper, Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin, Jamaludin Ibrahim

Share this article

Case Studies, Information Security, India, Volume 9 Issue 1, January 2020

Pages: 1383 - 1386

Data Security in Day to Day Life and Its Consequences: Case Study

Sandeep Saxena

Share this article

Research Paper, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization?s Data through Penetration Testing

Prerak Doshi

Share this article

Research Paper, Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid

Share this article

Research Paper, Information Security, India, Volume 8 Issue 1, January 2019

Pages: 2092 - 2096

An Secure Information Security Provenance Model for Controlling Spurious Drugs in Distributed Environment

Arun.R, Balaji.P, Vinod.D

Share this article



Similar Articles with Keyword 'threats'

Research Paper, Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin, Jamaludin Ibrahim

Share this article

Informative Article, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C

Share this article

Research Paper, Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara

Share this article

Informative Article, Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G

Share this article



Similar Articles with Keyword 'hacking'

Informative Article, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C

Share this article

Informative Article, Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G

Share this article
Top