Skip to main content

Difference Between Information Security and Cyber Security

I have been working the cybersecurity field for many years. I have come across people with different levels of technical knowledge, but very few possess the ability to explain a complex technical concept in simple terms. The funny part is, I have also seen people explaining simple concepts in the most complicated form.

Understanding and correlating is the mother of all knowledge

No technology remains fixed. Technology starts, develops, persists, mutates, stagnates, and declines. With the ever-growing advancement in technology, the amount of time a person spends in understanding the technology is comparatively lower. Gone are the days when children and teenagers would play around with breaking and reassembling toys. Today's children and teenagers spend most of their playtime on gadgets and social media platforms. The ability to break and reassemble things is slowly fading away from the younger generation.

The education pattern in schools and colleges must be upgraded to comply with the technological advancements. More STEM-related (Science, Technology, Engineering, and Maths ) topics should be incorporated into school curriculum. We are moving towards a future dependent on Machine Learning and AI, Quantum computing, cybersecurity, virtual and augmented reality, and autonomous vehicles. These technological trends have always been developing and evolving into a mature model.

Knowing the basics

I have worked with many CISSPs and CCIEs professionals and I was quite astonished when few of them were not aware of the dark web and the tor network concepts. I totally agree that it is not necessary to know about the dark web to get CISSP or CCIE certified, but it shows the lack of interest these people possess to learn something out of the box. I'm lucky enough to be blessed with a highly technical working culture where I'm able to learn and teach regularly. I often receive speaking opportunities at security conferences and workshops.

Difference Between Information Security and Cyber Security

I have rolled up my sleeves and dug into the many cyber-mess and technical deficiencies in organizations. I'm planning to write article series on topics related to cybersecurity. To start with, let's have a look at the difference between information security and cybersecurity. 




Comments

Popular posts from this blog

Digital Dark Age: Information Explosion and Data Risks

“Old formats of documents that we’ve created or presentations may not be readable by the latest version of the software because backwards compatibility is not always guaranteed,” says Vint Cerf, Google’s Vice President and one the fathers of the Internet. Digital dark age  describes the belief that the rapid evolution of technology will eventually make storage formats obsolete, and data will not be accessible to generations to come. It’s easy to assume that the data we store will somehow be preserved forever. Vint Cerf calls this phenomenon as ‘ bit rot ‘. Evolution of Digital Storage Magnetic tape was the first storage medium that revolutionized the digital industry. It was first introduced in the year 1928. Over the years, magnetic tape can suffer from deterioration called  sticky-shed syndrome , caused by absorption of moisture into the binder of the tape, rendering the tape unusable. Storage of 1024 bits of information was successfully implemented in 1948 using electrostati

Will Quantum Computers Threaten Modern Cryptography?

Modern cryptography, including  elliptic curve cryptography , is being used extensively for securing our internet payments, banking transactions, emails and even phone conversations. The majority of today’s cryptographic algorithms are based on public-key encryption, which is considered to be secure against attacks from modern computers. Quantum computing can simply break this security by reverse computing private keys faster than a conventional computer. RISK OF QUANTUM COMPUTING Although quantum computers are still in their infancy and non-operational, with publicly known experimental quantum computers too small to attack conventional cryptographic algorithms, many national governments and organizations have begun to understand the risk involved when this technology becomes a practical reality. Military agencies and leading technology companies have already increased fundings and accelerated processes in developing quantum computers because of the fact that it can process

Shower your loved ones with affection

John Dewey, one of America's most profound philosopher said that the deepest urge in human nature is "the desire to be important." Lincoln once began a letter saying: "Everybody likes a compliment." William James said: "The deepest principle in human nature is the craving to be appreciated." Dewey and James said something similar, the desire to be important and the craving to be appreciated. Craving is a strong desire for something. Everybody wants to be a great human. We got to to keep one thing in mind, nothing can be achieved by criticizing, condemning or complaing others. Showing love and respect to others will help in yielding a healthy relationship Instead of condemning people, let's try to understand them. Let's try to figure out why they do. That's a lot more profitable and intriguing than criticism, and it breeds sympathy, tolerance and kindness. "To know all is to forgive all"- Nixon Waterman Bob Hoover, a