Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences

Summary Details

The advancement in digital technology in contemporary epoch is believed to be a springboard for the proliferation of security threats and attacks that have gained prominence in the 21st century. The robust advancement in technological devices like rise of the internet age, manufacture of weapons of mass destruction and the rest. Ironically, this research has also stated clearly that these same technological devices can also guide in the implementation of cyber and security mechanisms towards the management of these attacks and threats. The study has as interest to unravel the relevant measures that have been considered over the years in managing the frequent occurrences of cyber-attacks and threats activities around the globe. A qualitative method of data analysis is the apt methodology guiding this study. The results of the paper show that attacks and threats have become dominant with rise in technology. This research paper has therefore proposed that for effective cyber and security policies to actually work, there should be more collaboration and information sharing among stakeholders.

Buy now

Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences

Academic Paper , 2025 , 18 Pages

Autor:in: Enowsoum Konrad (Author)

Computer Science - IT-Security
Look inside the ebook

Details

Title
Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
Author
Enowsoum Konrad (Author)
Publication Year
2025
Pages
18
Catalog Number
V1574361
ISBN (PDF)
9783389127094
ISBN (Book)
9783389127100
Language
English
Tags
Technology policy security cyber-attacks cyber threats cyber security
Product Safety
GRIN Publishing GmbH
Quote paper
Enowsoum Konrad (Author), 2025, Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences, Munich, GRIN Verlag, https://www.grin.com/document/1574361
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  18  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint