What exactly is Cyberspace and Cybersecurity?

1 min read

There has been a lot of buzz around the web in recent years regarding information assurance and cybersecurity especially with an increasing trend in cyber attacks and intrusions.  UMUC just recently started several cybersecurity degree and certificate programs in the fall of 2010.  Over the next few weeks articles will be posted here related to cybersecurity, starting with answering the basic question of what the terms cyberspace and cybersecurity mean.

The term cyberspace was originally used by the science fiction author, William Gibson to describe his interpretation of a global network of computers.  Wired magazine described Gibson’s fictional networked artificial environment as anticipating the “globally internetworked technoculture in which we now find ourselves.”  Cyberspace is the non-physical domain of information flow and communication between computer systems and networks.  Any device connected to the Internet has direct access to cyberspace which can be used for everyday tasks such as sending and receiving e-mail and making purchases online as well as managing personal bank accounts and paying bills.  In the commercial world, cyberspace is a place where global video conferencing takes place, collaborative projects occur where many of the key members may be in different geographical locations and other online tools and information systems, which hold massive amounts of information, are accessed daily from different parts of the world.

The process of securing information or assets that are contained in cyberspace is known as cybersecurity.  This is especially important in the business world where information assets are kept on ever increasing complex information systems, which in turn require even more sophisticated defense methods.  According to Vacca’s Computer and Information Security Handbook, “Most people are unfamiliar with the way computers truly function and what goes on ‘behind the scenes.’”  It is up to the CEO of modern organizations to ensure they have the most efficient task force of security specialists lead by a well qualified Chief Information Officer (CIO).  This task force should be responsible in providing a better defense against the modern infestations of intellectual theft, phishing scams, deliberate destruction of data and other cyber crimes.  Some of the modern challenges a CIO faces include managing employee awareness of threats, developing an effective cybersecurity program in line with the organization’s mission, managing risks and ensuring resilience in the organizations information systems.  Cybersecurity is going to continue to grow as organizations invest in protecting their information infrastructure against the ever increasing threat of cyber crime.

Series Navigation<< Security of Information Systems Infrastructure of an International AirportSecurity Concerns with Outsourcing IT Services >>

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development.

Latest posts by Ian Carnaghan (see all)

8
Leave a Reply

avatar
8 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
4 Comment authors
udariWooten AnitatechiguyGabbyRyan Laswell Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
Max Lau
Guest
Max Lau

When I think about this stuff the first thing that comes to mind is identity theft. I guess information theft would be just as bad.

Taylor
Guest
Taylor

This article was really helpful. Now I actually understand what cyberspace is!

Ryan Laswell
Guest
Ryan Laswell

We’re going to need some “cyber police”!

Mitchell Mosley
Guest
Mitchell Mosley

There’s majors in cyber security??? That just goes to show how many jobs there are that people don’t really think about.

Gabby
Guest
Gabby

I’m going to have to hire a cyber security person now. (That doesn’t sound like the most fun job… LOL)

techiguy
Guest
techiguy

This article really help me in gaining knowledge about cyber security .nice article

Wooten Anita
Guest

This post is very important for me because from a long time i am searching this type
of product.As i am getting benefit from this product so hopping it also
gonna works for you.
Lets have a try.

nuru massage gel

udari
Guest
udari

Wonderful theme that everyone would surely like.view my blog gaming.angry birds.wishing you’re every success.