Cybersecurity is concerned with theft or damage to computer hardware and the software such devices use. It protects computer systems from both physical and virtual loss. This includes both

  • data loss, and
  • information theft or destruction

See also Questions.

Cybersecurity protects people

There is no such thing as an invulnerable computer system.

Desktop computers, network printers, netbooks, tablets, or smart phones. But don't forget your smart appliances, whatever they are.

Computer applications: database, spreadsheet, and wordprocessing.

Networking applications: firewalls, antivirus, backup, etc.

Internet: Browsers, e.g., Chrome, Explorer, Firefox, Opera, and Safarim and whatever is associated with them.

Firmware is computer programming that straddles the boundary between what's "hard"  (the computer or printer) and "soft" (a program that makes the computer useful, such as accounting software).  Any modern appliance that relies on programs stored on the device itself is firmware: remote controls, for example, or any other programmable device: radios, fridge, microwave ovens — and certainly smartphones.

The Internet of things now commonly controls physical access to anyplace a computer is located. Cybersecurity on such appliances is now essential. This level of cybersecurity controls two elements:

  1. who may access the computer, and 
  2. what networks the computer may connect to, including the Internet

The malicious use of a computer system is called an attack.  Attacks affect both standalone computers and computer networks.

External attackers grip the popular imagination. Insiders, however, do perpetrate attacks — often without any idea their behaviour is malicious.

You cannot eliminate this vulnerability – you can only prevent it.

You must plan to control or prevent this loss. Your plan leads to one or more policies that govern computer use and network access. Your policies inform the organisation's security culture.

Data is an unorganized collection of facts. Processing data transforms it to information. Information is an organized collection of useful facts structured to provide context.

Downloading confidential data or information to any of these devices creates an unauthorized copy. This can cause irreparable harm to your organization, whether the download is intentional or not.

You must plan to control or prevent this loss. Your plan leads to one or more policies that govern computer use and network access. Your policies inform the organisation's security culture.