From this information, the Year 11 Health Education students decided to implement an action plan to minimise the prevalence of Cyber bullying and increase awareness among the Year 9 students at Meridan.
Louise Cobb (2010) suggests that; Cyber bullying can lead to serious emotional consequences, including depression, low self-esteem, anxiety disorders and suicide.
This gives the US a unique advantage regarding its opportuni- ties to conduct cyber surveillance, but other countries are racing to develop their own security, surveil- lance and espionage capabilities....
(Gethackingsecurity, 2012) It took time for cyber crime to become prevalent because criminals did not have computer access, nor did they possess the expertise to use computers for criminal activities....
Security in cyberspace or computer laboratory nowadays is risen an issue that needs solutions among computer users who always like to interact with computers....
: Security and legal expert Erin Kenneally provides a strong background in liability law and then analyzes how major cybersecurity stakeholders may be impacted by liability in the future.
The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
In addition, as is always the case, there are cultural and even political aspects regarding the use of words. The Americans use the term ”cyber security” more or less for allthe concepts we have discussed. The Russians use “information security”. See for example Gadya and Austin (2010).
: News article reporting the debate between former cybersecurity czar Richard Clarke and industry representation as to the necessity of government intervention on cybersecurity.
The right set includes absolutely everything and everyone that can be accessed through cyberspace. It includes nature, animals and people. An example is if someone sends untreated septic into the city’s drinking water. Another example, which can be found in von Solms and van Niekerk (2013), is cyber bullying – bullying using computers, mobile phones, social networks, etc. One could argue that everything in this world, in theory, is vulnerable through ICT. However, the defining characteristic of cyber security is that what is to be protected should be protected because of the security challenges posed by the use of ICT.
According to the United States General Accounting office, cyber security is defined as the defense against attacks on the information technology infrastructure. United States General Accounting Office, (2004) also defined cyber security as the process of combining of network and computer security so as to protect an individual’s IT assets.
Cyber security involves protecting any form of personal information and or any form of digital asset stored in the computer or in any digital memory device.
Cyber security can also be defined as the protection of all devices that rely on the internet including the networks themselves to the information that is stored in those devices such as the computer databases and even their applications.
Statistics Canada define cyber threats as an offence which involves a computer as the object of crime or as the tool used to commit a material component of the crime
Persons who try unsolicited access to either the devices of control or the network by means of a data communications pathway bring about cyber threats. The unsolicited entry can originate from either the employees of that particular company or via the Internet from anonymous people in undisclosed places.
An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
The Defence White Paper is a key part of the Governmentâs commitment to a safe and secure Australia. The Australian people can have confidence that this Government will ensure that we can defend our nation and protect our interests today and into the future.
: Report from a conference at the Center for Strategic and International Studies analyzing whether market forces alone will provide for a secure Internet infrastructure or if government intervention is necessary.