A-Z Popular Blog Security Search »
Information Security
Related Guides
Related Topics
Confidential Information

18 Examples of Cybersecurity

 , updated on
Cybersecurity is the protection of computing resources from unauthorized access, use, modification, misdirection or disruption. The following are illustrative examples.


Encrypting data in storage, transit and use.


Securely identifying people and digital entities.


Defining and implementing privileges for computing resources.

Network Security

Securing networks with techniques such as a network perimeter.


Running untrusted software in a virtual environment where it can do no harm.

Internal Controls

Internal controls such as the requirement that different people write code, review the code and launch it into production.

Security by Design

Architecting and designing systems, applications and infrastructure to be secure.

Secure Coding

A series of principles and practices for developing code that is free of security vulnerabilities.

Secure Testing

Testing cycles designed to discover security vulnerabilities.

Defense in Depth

The principle that each layer of security doesn't assume anything. For example, an application that doesn't assume that a firewall has prevented external access.

Physical Security

Physical security such as a data center with access controls.

Audit Trail

Logging that records interactions with systems, applications, databases and infrastructure such that malicious activity can be detected and reconstructed.

Defensive Computing

Users who are aware of cybersecurity and are careful in their use of technology.


The ability to prove that a commercial transaction took place.

Security Infrastructure

Foundational tools that offer security services such as a virus scanner or intrusion detection system.


Monitoring systems, applications and infrastructure and promptly investigating suspicious activity.

Vulnerability Management

Tracking known vulnerabilities to software and hardware and applying fixes in a timely manner.

Response to Breaches

Defending your services, resources and data from an attack.
Overview: Cybersecurity
The protection of computing resources from unauthorized access, use, modification, misdirection or disruption.
Also Known As
Cyber Security
Computer Security
Information Security
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Digital Identity
Failure Of Imagination
Incident Response
IoT Security
Key Stretching
Network Security
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Secure Code Review
Security As A Service
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Encryption Examples

A definition of encryption with examples.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.

Public Network

A definition of public network with examples.


A definition of sandbox with examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map