Free HYLAND Magazine Issues

Edition 22

CLICK ON ANY OF THESE IMAGES FOR A FREE STREAMING SUBSCRIPTION OF HYLAND, a digital lifestyle magazine featuring residential decoration, design, architecture, art, travel, fashion, cuisine, good works and reflections.

Issue link: http://digital.hylandmagazine.com/i/407857

Contents of this Issue

Navigation

Page 159 of 246

HYLAND Perhaps as a consequence there are many definitions of cyberspace and cyber-security, and to add any further complex classification is most likely a waste of time at this stage. I find the following short descriptions (which are not intended as legal definitions) helpful: • Cyberspace: electronic data and connected electronic networks, together with the people who use them. • Cyber-Security: protecting electronic data and connected electronic networks, together with the people who use them, from those who would seek to inflict harm, damage, theft, harassment or similar acts. Technology is of course a critical constituent part of cyberspace, but so too are people, and this human aspect is often afforded insufficient attention in discussions about cyberspace and cyber security. e way that humans behave in cyberspace is central to any effective cyber-security policy, yet our understanding of human behavior in cyberspace is as yet rudimentary. What is clear is that cyberspace is in terms of evolutionary psychology an unfamiliar environment, where the indicators that cue cautious behavior have either not been fully developed or are not adequately understood. is is a serious current limitation to the development of effective cyber- security policies and technologies.3 So too are the inherited approaches to security in both government and the private sector that have served to increase our vulnerability to cyber and other threats. Historically, governments and businesses emphasized distinct disciplines: personnel security, physical security, and communications and electronic security. ese disciplines were frequently planned, organized and pursued by separate teams, often working under different senior managers—the so-called "stove-pipe" approach to security.

Articles in this issue

Archives of this issue

view archives of Free HYLAND Magazine Issues - Edition 22