MSU logo
MSU logo
LOG IN
Jump to Header Jump to Main Content Jump to Footer
MSU logo
  • Home
  • Share
  • Connect
  • Grow
    • Feed
    • Browse
  • Events
  • Thank an Educator
  • Center for T&LI
  • Mediaspace
  • MSU Commons
  • Getting Started
  • Help
MSU logo
Back

Computer security, cybersecurity or information technology security

playlist image

Computer security, cybersecurity or information technology security

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Cyber could be defined as something related to the group of computers or the internet. At the same time, security means the mechanism of protecting anything. So both the terms Cyber and security took together define the way of protecting user data from the malicious attacks that could lead to the security breach.
+ view more

profile-img
Posted by
Rupali Jagtap

{"id"=>1491, "level_no"=>1, "level_title"=>"how do cyber-security measures protect end users and systems", "notes"=>"First, cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data. This not only protects information in transit, but also guards against loss or theft.", "challenge_id"=>673, "created_at"=>Wed, 22 Sep 2021 09:44:50.731958000 UTC +00:00, "updated_at"=>Wed, 22 Sep 2021 09:44:50.731958000 UTC +00:00}

  • Playlist Sections
  • how do cyber-security measures protect end users and systems
  • Section 2
  • Section 3
  • Section 4
  • Section 5

Description

First, cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data. This not only protects information in transit, but also guards against loss or theft.
Genetics and Molecular Biology consider contributions that present the results of original research in genetics, evolution, and related scientific disciplines. Manuscripts presenting methods and applications only, without an analysis of genetic data

Description

The threats countered by cyber-security are three-fold: 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyber-attack often involves politically motivated information gathering. 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
Artificial General Intelligence (AGI) is also commonly known as Deep AI or Strong AI. It is a conceptual idea where AI can mimic human intelligence. AGI has the capability to learn from its iterative tasks and assist in problem-solving. In fact, Deep AI has the capability to think and understand, similar to that of humans. But, as of now, researchers have not completely achieved strong AI. In order to successfully create Strong AI, machines need to be conscious while offering them a plethora of cognitive abilities.
Artificial intelligence is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen

Submission: Experience summary

Write a paragraph about what you learned.




×
Michigan State University Wordmark
  • Call us: (517) 355-5482
  • Contact Information
  • Site Map
  • Privacy Statement
  • Site Accessibility
  • Call MSU: (517) 355-1855
  • Visit: msu.edu
  • Notice of Nondiscrimination
  • CTLI events, programs, and activities are open to all MSU educators and students, who are encouraged to participate fully.
  • Spartans Will.
  • © Michigan State University
  • Subscribe to #iteachmsu Digest

Wizdn Watermark image


OK

OK
Cancel