GET THE APP

Cybernetics and Cybersecurity
..

Journal of Computer Science & Systems Biology

ISSN: 0974-7230

Open Access

Brief Report - (2022) Volume 15, Issue 1

Cybernetics and Cybersecurity

Sanika Swapna*
*Correspondence: Sanika Swapna, Department of Biotechnology, Osmania University, Hyderabad, Telangana, India, Email:
Department of Biotechnology, Osmania University, Hyderabad, Telangana, India

Received: 03-Jan-2022, Manuscript No. jcsb-22-56301; Editor assigned: 05-Jan-2022, Pre QC No. P-56301; Reviewed: 17-Jan-2022, QC No. Q-56301; Revised: 22-Jan-2022, Manuscript No. 22-Jan-2022; Published: 29-Jan-2022 , DOI: 10.37421/ jms.2022.11. 393.
Citation: Swapna, Sanika. “Cybernetics and Cybersecurity.” J Comput Sci Syst Biol 15 (2022):393.
Copyright: © 2022 Swapna S. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Brief Report

Cybernetics is a method of studying regulatory systems, including their structures, constraints, options, and controls. In layman's terms, cybernetics is the study of controls in any system through the use of technology. However, the essence of this approach is to comprehend the functions and processes of systems capable of receiving, storing, and processing information before using it to control itself.

Cybernetics is a broad field that includes the study of mechanical, biological, social, physical, and cognitive systems. Cybernetics applies to systems with closed signaling loops. In this type of closed signaling system, action generated within the system causes changes in the system environment, which causes some type of system change. As a result, it is a closed loop in which the action and its reaction occur within the same system environment. System theory, philosophy, game theory, perceptual control, architecture, artificial intelligence, and many other fields of study have been influenced by cybernetics. However, the fundamental goal remains the same: to investigate system controls for all underlying mechanisms. Knowledge of cybernetics is becoming increasingly important in terms of both what and how designers design.

The science of feedback, or information that travels from a system through its environment and back to the system, is known as cybernetics. A feedback system is said to have a goal, such as maintaining a variable's level (e.g., water volume, temperature, direction, speed, or blood glucose concentration). Feedback indicates the difference between the current state and the desired state, and the system acts to correct the difference. When disturbances threaten dynamic systems such as machines, software, organisms, and organizations, this process helps to ensure stability. Goals are imposed on simple feedback systems. Second-order systems that observe themselves may change their objectives. Second-order systems can learn as well as react. Interaction occurs when two first-order systems interact. They are pushing each other. When two second-order systems interact, they may have a conversation, an exchange of goals and means. As the discussion of cybernetics expands to second-order systems, ethical concerns emerge.

Cybernetics provides a language (both vocabulary and frameworks) that allows scientists (as well as designers and others) from various domains of knowledge and practice to communicate to describe the structural similarities of systems and to recognize patterns in information flows. This common language is especially useful in analyzing, designing, and managing complex, adaptive systems, which are intertwined with many of today's most difficult problems. What designers create. Over the last 30 years, design practice has evolved from a focus on object form to a broader concern for interaction with systems and product-service ecologies (systems of systems).

Today's products are frequently intelligent (controlled by microprocessors), aware (equipped with sensors), and connected (to each other and to cloudbased services). These products and services, as well as our interactions with them, generate increasing amounts of data at a time when computer processing is becoming a utility and pattern-finding software (AI) is advancing. Today's designers must consider how information flows through these systems, how data can improve operations and user experiences, and how feedback creates opportunities for learning. Cybernetics knowledge can help to inform these processes [1-5].

References

  1. Pankanti, Sharath, Andrew Senior and Lisa Brown, et al. "Security, privacy, and health." IEEE Pervasive Comput 2 (2003): 96-97.
  2. Google Scholar, Crossref

  3. Hu, Zhengbing, Viktor Gnatyuk and Viktoriia Sydorenko,et al. "Method for cyberincidents network-centric monitoring in critical information infrastructure." Int J Comput Netw Inf Secur 9(2017): 30.
  4. Google Scholar, Crossref

  5. Karuppanchetty, Chockalingam, William Edmonds and Kim Sun il,et al. "Artificially augmented training for anomaly-based network intrusion detection systems." Int J Comput Netw Inf Secur 7 (2015): 1.
  6. Google Scholar, Crossref

  7. Tomar, Kuldeep and SS Tyagi. "HTTP packet inspection policy for improvising internal network security." Int J Comput Netw Inf Secur 6 (2014): 35-42.  
  8. Google Scholar, Crossref

  9. Rasmi, Mohammad and Ahmad Al Qerem. "Pnfea: A proposal approach for proactive network forensics evidence analysis to resolve cyber crimes." Int J Comput Netw Inf Secur 7 (2015): 25-32.
  10. Google Scholar, Crossref

Google Scholar citation report
Citations: 2279

Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report

Journal of Computer Science & Systems Biology peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward