Skip to main content

Difference Between Information Security and Cyber Security

I have been working the cybersecurity field for many years. I have come across people with different levels of technical knowledge, but very few possess the ability to explain a complex technical concept in simple terms. The funny part is, I have also seen people explaining simple concepts in the most complicated form.

Understanding and correlating is the mother of all knowledge

No technology remains fixed. Technology starts, develops, persists, mutates, stagnates, and declines. With the ever-growing advancement in technology, the amount of time a person spends in understanding the technology is comparatively lower. Gone are the days when children and teenagers would play around with breaking and reassembling toys. Today's children and teenagers spend most of their playtime on gadgets and social media platforms. The ability to break and reassemble things is slowly fading away from the younger generation.

The education pattern in schools and colleges must be upgraded to comply with the technological advancements. More STEM-related (Science, Technology, Engineering, and Maths ) topics should be incorporated into school curriculum. We are moving towards a future dependent on Machine Learning and AI, Quantum computing, cybersecurity, virtual and augmented reality, and autonomous vehicles. These technological trends have always been developing and evolving into a mature model.

Knowing the basics

I have worked with many CISSPs and CCIEs professionals and I was quite astonished when few of them were not aware of the dark web and the tor network concepts. I totally agree that it is not necessary to know about the dark web to get CISSP or CCIE certified, but it shows the lack of interest these people possess to learn something out of the box. I'm lucky enough to be blessed with a highly technical working culture where I'm able to learn and teach regularly. I often receive speaking opportunities at security conferences and workshops.

Difference Between Information Security and Cyber Security

I have rolled up my sleeves and dug into the many cyber-mess and technical deficiencies in organizations. I'm planning to write article series on topics related to cybersecurity. To start with, let's have a look at the difference between information security and cybersecurity. 




Comments

Popular posts from this blog

What is the relationship between Software Lines of Code and Security Bugs ?

Our world today is more connected than ever. We have our pacemakers, 3D printers, Insulin pumps and even cars connected to the internet. Moore's law states that the number of transistors on integrated circuits would double every two years. Or in simple terms, the processing speed will double every two years or 18 months or 12 months. With the drastic growth in processing powers, we saw a steep increase in the internet connected systems and software. The millennials are too dependent on internet and apps for personal data storage, banking, studies and even employment. The source code of Apollo 11 Guidance system that took the US to the moon and back was published on GitHub. It contains 145,000 Lines of Code (LOC). Now compare that with a space shuttle that uses a 400,000 LOC, curiosity (rover) 2.5 Million LOC, Android 12 Million LOC and Google services which is at a whopping 2 Billion LOC. Many researches state that, on average, there are around 30 to 50 bugs in 1000 LOC. No...

Security Nightmare of Driverless Cars

Security Nightmare of Driverless Cars The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challenges confronting the automotive industry today. CAR MANUFACTURERS Initially, car manufacturers were not very familiar with the cyber security community. From a hacker’s perspective, as more and more cars are connecting to the internet, the attack surface area increases drastically.  Remote access to vehicles could be gained through vulnerabilities in the connected ecosystem. With the series of controlled hacking demonstrations on autonomous vehicles leading to discovery of fundamental flaws, companies are starting to notice the potential security threats.  “Such incidents could demolish public confidence in autonomous vehicles overnight and undo years of costly research and development,” says Jan Mohr, who co-authored a research report on driverless cars. For complete articl...