INTRODUCTIONCyber security is an important area today for any network administrator, system analyst, IT technician, database administrator and even computer scientist. Although this list shows professionals who dabble in information technology, there should be no misconception that the average home computer user should not worry about computer security. A computer, be it a personal computer, a laptop or a simple netbook, is one of the elements that adorn every home. Mobile phones should also not be left out when the issue of cybersecurity arises, as they are the latest target of cyber criminals (SANS Institute). Inevitably, this has led to the development and growth of a complex industry focused on cybersecurity. There are many real threats to cybersecurity. These threats come from the state of today's computer technology, computer users who are ignorant of how to protect their computers, the current trend of unrestricted data distribution, and the advent of the mobile office (Vacca, J., 2009, 3-4). First, the modern PC today has evolved from the Abacus, a tool used for simple mathematical calculations (Sadiku and Obiozor) to a powerful machine capable of storing and manipulating data (Vacca. J., 2009, 3). The work of Sadiku and Obiothor shows the evolution of the computer starting from the Abacus, to the machines created by inventors such as Blaise Pascal, Gottfried Wilhelm von Leibniz, Charles Babbage and Thomas of Colmar, to the electromechanical punched card computer, up to the first computer digital using integrated circuits. It is precisely this latest development, especially in the production of integrated circuits, that has… middle of paper… the trends for next year.” Retrieved from http://www.sans.org/security-resources/10_security_trends.pdf This is an electronic book prepared by a leading professional body for cybersecurity professionals. The main reason this source was chosen is that it is the product of a survey conducted by the organization on cybersecurity trends. The participants in this survey were professionals from the cybersecurity industry. Vacca, J. R. (2009). “Cyber and Information Security Handbook.” Burlington: Morgan Kaufmann Publishers. This book contains information on how to identify gaps in any network and contains in-depth tips on how to fix them. The main interest in choosing this book is that it contains a good introduction showing the main causes of cyber insecurity and the general misconceptions surrounding cyber security.
tags