Cybersecurity vs Information Security

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Cybersecurity vs Information Security. hamed.taherdoost@gmail.com.

Scene 2 (7s)

Introduction Definitions of Cybersecurity and Information Security Cybersecurity and Information security Differences Cybersecurity and Information Security from Different Aspects Limitation and Future Directions Conclusion.

Scene 3 (18s)

The Internet and data volume has expanded over the years and cyber risks have grown accordingly threatening businesses that are reliant on data. Thus, a new area of knowledge is developed to address security concerns as Cybersecurity and Information Security are commonly used terms today. Cybersecurity and Information Security are both responsible to protect computer systems against cyber threats ..

Scene 4 (38s)

Definitions of Cybersecurity and Information Security.

Scene 5 (1m 3s)

Cybersecurity and Information Security are so closely linked to each other and overlap in some aspects..

Scene 6 (1m 20s)

Cybersecurity and Information security Differences.

Scene 7 (1m 35s)

Cybersecurity and Information Security from Different Aspects.

Scene 8 (2m 11s)

Limitation and Future Directions. Cyberspace is constantly growing. Studies and models should be developed accordingly. This study is based on conceptual knowledge in this area. This study does not cover any real case about the implementation of cyber security and information security..

Scene 9 (2m 32s)

Despite the constructive role of information in the success of an organization, it is also likely to damage the reputation of the company and lead to significant failures if not protected. Most businesses rely on cyberspace to manage their business processes, transfer information and deliver services. The more organizations are dependent on the Internet. Understanding Information Security and Cybersecurity and how they are different from each other better equip businesses to get protected against threats and risks of information loss..

Scene 10 (2m 55s)

Thank you.