Browse Definitions:
Definition

cybersecurity

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.

Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include:

One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defense Department organizations), describes the problem:

"The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly..."

To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.

According to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020.

This was last updated in November 2016

Continue Reading About cybersecurity

Join the conversation

9 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

i think i should study Cybersecurity to be a part of it
Cancel
bye bye gam gam
Cancel
Cyber Security is a Large Domain! here is the complete knowledge about it: http://goo.gl/VbcAaM
Cancel
In Cyber Security, selling the problem has become the preferred approach because there is no convincing Cyber solution to sell. Cyber Security is a problem without a solution. The remedy? Don’t use the Internet for data and information you cannot afford to lose. If an organization is currently using the Internet for data and information it cannot afford to lose, then it must engage in Operation Cyber Pullback.

The approach for industry? Use the Internet only for data and information you can afford to lose. Employ three-factor authentication. Employ keyless encryption based on arbitrary nondeterministic, key-based mathematical methods.

The approach for government? Set a high goal to achieve resilience. Here resilience is the ability to anticipate, avoid, withstand, minimize, and recover from the effects of adversity whether natural or man made under all circumstances of use. Employ integration engineering, a resilience integrator, and intelligent middlemen in the Critical Infrastructure system of systems. Understand and anticipate cascade triggers in the Critical Infrastructure system of systems. Indemnify industry partners to foster information sharing needed for anticipation and avoidance.

In the resilience value proposition, the payoff comes in avoiding consequences, outcomes, and bad actors.
1. Avoidance of consequences includes loss of data and information, loss of privacy, loss of well being, loss of identity, loss of money, loss of life, loss of opportunity, cleanup costs, loss of trust, and loss of availability.
2. Avoidance of outcomes includes unauthorized access, loss of data, tampering with data, erosion of performance, and denial of service.
3. Avoidance of bad actors includes disgruntled employee, hacker, corporate spy, criminal, terrorist, organized crime, and nation state.
Cancel
what is VID as it relates to cyber security?
Cancel
nice
Cancel
Can I choose a cybersecurity as my minor in b.tech as I'm weak in coding?
Cancel
Are security robots part of the cyber security system?
Cancel
yes, cos is programmed by cyber 
criminals
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

SearchSolidStateStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • NVMe (non-volatile memory express)

    NVMe (non-volatile memory express) is a host controller interface and storage protocol to enable a solid-state drive to use the ...

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close