Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CYBERSECURITY EMERGING CHALLENGES

EXPRESS YOUR IDEAS

Name of Student: Miranda, Denise May E. Activity Title: Express Your Ideas
Year and Section: BSIT 2 – ST. ANTHONY Date Submitted: 11/06/23

Instructions:
1. Complete the table below by providing the correct information per item.
A. Differentiate the Information Security and Cybersecurity.
B. Explain protecting digital assets.

Note:
 Acceptable Work is 0% - 20% plagiarized only.
o Attach your plug scan here.
 Submit the activity Express your Ideas to your class representative, then your class
representative will submit it to me on November 6, 2023 after your examination.

ANSWER

A. Differentiate the Information Security and Cybersecurity.


Information Security and Cybersecurity are related fields but have distinct
focuses. Information Security is concerned with protecting all types of
information, whether it is in digital or physical form. It contains protections to
assure the confidentiality, integrity, and availability of information.

For example, implementing access controls, encrypting sensitive data, and


creating backup systems are part of information security.

On the other hand, Cybersecurity specifically deals with protecting digital


systems, networks, and data from cyber threats. It focuses on defending against
attacks targeting computers, servers, networks, and digital infrastructure.

For instance, protecting against malware, securing network connections, and


training employees to recognize phishing emails are all aspects of
cybersecurity.

B. Explain protecting digital assets.


Protecting digital assets involves safeguarding valuable resources in the digital
domain. This includes protecting data, software, networks, and digital
infrastructure from unauthorized access, damage, or theft.
For example, using strong passwords, regularly updating software, and
implementing firewalls are ways to protect digital assets. Additionally,
encrypting sensitive information, conducting regular security audits, and
implementing user access controls are practices to enhance the protection of
digital assets.

PLAGIARISM SCAN REPORT


A.

B.

You might also like