Computer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. [Wikipedia]
CyberSecurity is a subset of Information Security. Information Security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. [Wikipedia]
CyberSecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. [PaloAlto Networks]
CyberSecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. [Cisco]
CyberSecurity is strengthening the security and resilience of cyberspace.
CyberSecurity at the federal level includes: Combating Cyber Crime, Securing Federal Networks, Protecting Critical Infrastructure, Cyber Incident Response, Cyber Safety, Cybersecurity Governance, Cybersecurity Insurance, Cybersecurity Jobs, Cybersecurity Training & Exercises, Information Sharing, Stakeholder Engagement and Cyber Infrastructure Resilience. [U.S. Dept. of Homeland Security – CyberSecurity]
Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. A range of traditional crimes are now being perpetrated through cyberspace. This includes the production and distribution of child pornography and child exploitation conspiracies, banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic consequences.
Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject to sophisticated cyber intrusions that pose new risks. As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend. In light of the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an important homeland security mission. [U.S. Dept. of Homeland Security – Cybersecurity and Infrastructure Security Agency]
No, the above is not a complete listing of all terms used in this website, although maybe someday I’ll make more progress to that end. For now I’m just aiming for the big-ones and CyberSecurity seems as good a place to start as any. More to come…
Resources: Dictionaries, Glossaries and Other Lexicographies
If you are interested, I suggest the following as good general resources:
Information Security — True to form, Wikipedia has a thorough overview on the broad topic of InfoSec. The series on Information Security includes sections on Internet security, Cyberwarfare, Computer security, Mobile security, and Network security. It also lists a variety of threats and defenses. As with much of what’s on Wikipedia, it’s a good place to start.
Sideways Dictionary — Offers a different spin on defining technical terms with a sense of humor. “It's like a dictionary, but using analogies instead of definitions. Use it as a tool for finding and sharing helpful analogies to explain technology. Because if everyone understands technology better, we can make technology work better for everyone." (A project of The Washington Post and Jigsaw.)
Tech Terms Computer Dictionary — Look up definitions of computer and Internet terms. [General level tech terms.]
Free On-Line Dictionary of Computing (“FOLDOC”) — “FOLDOC is a computing dictionary. It includes definitions of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, standards, mathematics, telecoms, electronics, institutions and companies, projects, history, in fact any of the vocabulary you might expect to find in a computer dictionary."
FileInfo — The file extensions database. “Search over 10,000 file extensions and software programs.”
You can also reference these more specialized resources:
Common Vulnerabilities and Exposures (CVE) — CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE Entries are used in numerous cybersecurity products and services from around the world, including the U.S. National Vulnerability Database (NVD). [As of this writing there are 114,074 CVE entries.]
The Jargon Lexicon Glossary — From “ABEND” to “zorkmid” it’s The Jargon File glossary. (What? You’ve never heard of The Jargon File? Well then, by all means, check it out! There’s a good chance you’ll be intrigued.)
Dictionary of Algorithms and Data Structures — National Institute of Standards and Technology: “This is a dictionary of algorithms, algorithmic techniques, data structures, archetypal problems, and related definitions. Algorithms include common functions, such as Ackermann's function. Problems include traveling salesman and Byzantine generals. Some entries have links to implementations and more information. Index pages list entries by area and by type. The two-level index has a total download 1/20 as big as this page.
Don't use this site to cheat. Teachers, contact us if we can help.
Currently we do not include algorithms particular to business data processing, communications, operating systems or distributed algorithms, programming languages, AI, graphics, or numerical analysis: it is tough enough covering ‘general’ algorithms and data structures.”