Monday, May 6, 2019

Psychological Aspects of Cybersecurity Assignment

Psychological Aspects of Cybersecurity - Assignment ExampleToday, when the dependency on the use of reckoner systems and internet technology has increased significantly, the understanding and incorporation of cyber security proves to be highly essential (What is Cyber gage? 2010).The present study has considered social networking as the primary focus in regard to the psychological aspects of cyber security. companionable networking in the present times is used by millions of individuals as a means of remaining connected with the outer world, with friends, near and dear ones as well as for professional purposes. However, a lot of ain information is, in turn, being shared in the process that might be used by cyber attackers to spread malevolent codes, viruses, or may even access the personal information and misuse it for their have purposes (McDowell & Morda, 2011, p.1). and then the need for cyber security arises, and this study focuses on the vulnerabilities and threats associ ated with social networking and having impacts on the services and the users, thus exhausting to determine the possible cyber security measures and the level of customer satisfaction that may be achieved.In the modern years, the use of social networks has been found to have increased significantly. There are several online social networking websites bid Facebook, Myspace, YouTube, and LinkedIn, to name a few. The relative size of the addressees in these social networks is huge, which is often not known to the users of the site. Moreover, the temperament of such users is also unknown. Hence individuals tend to reveal a lot of personal information. This may in truth result in a number of security related threats for the members and hence for the services as well. Thus it proved to be necessary to incorporate such cyber security as to protect personal information on social networks (Hasib, 2008).When individuals post their personal information on social networks, a permanent get d own of the users is created that may be used

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.