International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 148

Informative Article | Information Security | India | Volume 6 Issue 5, May 2017


Cyber Security - A Business Accelerator??

Riya V S | Dr. Aarthy C


Abstract: IT has disrupted businesses over the past decade like no other technology has ever. As IT increasingly touches our lives in many different ways like internet banking, online shopping, smart homes and self-driven cars, our dependency on IT is reaching a point of no return. Information Security (InfoSec) /Security in the Digital Economy is practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information (Wikipedia). It is the series of measures deployed by organizations to ensure that their customer data and business critical information are accessed and consumed by authorized people only. InfoSec also ensures that the above mentioned information is not altered or erased inadvertently. It can be leveraged by business to securely expand and be global. So, it is imperative that information security be at the forefront of all organizations to ensure there is secure delivery of services to customers, and the privacy of citizens is protected. It is equally important that the assets of an organization are protected against cyberattacks.


Keywords: Security, threats, hacking


Edition: Volume 6 Issue 5, May 2017,


Pages: 2678 - 2678


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Riya V S, Dr. Aarthy C, "Cyber Security - A Business Accelerator??", International Journal of Science and Research (IJSR), Volume 6 Issue 5, May 2017, pp. 2678-2678, https://www.ijsr.net/get_abstract.php?paper_id=ART20174068

Similar Articles with Keyword 'Security'

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi | Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami [4] | Nisarg Shah [5]

Share this Article
Top