| |
Cybersecurity is the protection of computing resources from unauthorized access, use, modification, misdirection or disruption. The following are illustrative examples.Encrypting data in storage, transit and use.
Securely identifying people and digital entities. AuthorizationDefining and implementing privileges for computing resources. Securing networks with techniques such as a network perimeter.
Running untrusted software in a virtual environment where it can do no harm.Internal controls such as the requirement that different people write code, review the code and launch it into production.Security by DesignArchitecting and designing systems, applications and infrastructure to be secure.
Secure CodingA series of principles and practices for developing code that is free of security vulnerabilities.Secure TestingTesting cycles designed to discover security vulnerabilities.The principle that each layer of security doesn't assume anything. For example, an application that doesn't assume that a firewall has prevented external access.
Physical SecurityPhysical security such as a data center with access controls.Logging that records interactions with systems, applications, databases and infrastructure such that malicious activity can be detected and reconstructed.
Defensive ComputingUsers who are aware of cybersecurity and are careful in their use of technology. The ability to prove that a commercial transaction took place.Security InfrastructureFoundational tools that offer security services such as a virus scanner or intrusion detection system.
MonitoringMonitoring systems, applications and infrastructure and promptly investigating suspicious activity.Vulnerability ManagementTracking known vulnerabilities to software and hardware and applying fixes in a timely manner.Response to BreachesDefending your services, resources and data from an attack.|
Type | | Definition | The protection of computing resources from unauthorized access, use, modification, misdirection or disruption. | Also Known As | Cyber SecurityComputer SecurityInformation SecurityInfoSec | Related Concepts | |
Information Security
This is the complete list of articles we have written about information security.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|