Information Technology Cyber Security vs. Computer Security
Information Technology Cyber Security vs. Computer Security
Information Technology
Name: Emanuelle Senior
Grade 11 Swaby
What is Cyber Security?
Cyber security is the act of protecting against digital attacks on systems, networks, and
programs. These cyberattacks are typically intended to gain access to, change, or delete
sensitive information; steal money from users; or disrupt normal business activities. Cyber
security is mainly done to prevent computer systems from unauthorized access, damage,
inaccessibility, ransomware, and spyware. It encompasses the protection of servers, online
account, and computer networks.
Put up a firewall.
Firewalls are effectively gatekeepers between your computer and the internet. They
act as a barrier to prevent the spread of cyber threats such as viruses and malware.
Update programs and systems regularly. Updates contain vital security upgrades that
help protect against known bugs and vulnerabilities.
Difference
Computer security deals with protecting your physical computers, laptops, and other devices.
It also involves proper updating and patching of these systems. Cyber security encompasses
protecting the data stored on these devices.
Similarities
Both computer security and cyber security are essential for handling access, confidentiality,
authentication, and integrity of data.
Importance of Cyber Security
A steady rise in cybercrime exposes flaws in the devices and services we have come to rely
on. Cyber security is important because it safeguards all types of data against theft and
damage. Sensitive data, personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property, data, government and business
information systems are all included.
The exposure of sensitive data can be financially costly to your company and can harm its
reputation.
Importance of Computer Security
Computer security is important because it protects people and their property. This includes
both their physical safety and their possessions. Good security measures will make it difficult
for hackers to target a person online. Once hackers gained access to your data or devices, they
can steal your money and open credit card and bank accounts in your name or even doxx you.
References