Cybersecurity is concerned with theft or damage to computer hardware and the software such devices use. It protects computer systems from both physical and virtual loss. This includes both
- data loss, and
- information theft or destruction

Hardware
Desktop computers, netbooks, tablets, or smart phones.
Software
Computer programs, such as
- database, spreadsheet, and wordprocessing
- firewalls, antivirus, backup, etc.
- Internet browsers, e.g., Chrome, Explorer, Firefox, Opera, and Safari
Firmware
Computer programs used to control certain devices, such as remote controls.
Theft Protection
Cybersecurity controls physical access to anyplace a computer is located.
Data & Information Protection
Cybersecurity controls two elements:
- who may access the computer, and
- what networks the computer may connect to, including the Internet
There is no such thing as an invulnerable computer system.
The malicious use of a computer system is called an attack. Attacks affect both standalone computers and computer networks.
External attackers grip the popular imagination. Insiders, however, do perpetrate attacks — often without any idea their behaviour is malicious.
You cannot eliminate this vulnerability – you can only prevent it.
You must plan to control or prevent this loss. Your plan leads to one or more policies that govern computer use and network access. Your policies inform the organisation’s security culture.
Data vs Information
- Data is an unorganized collection of facts.
- Processing data transforms it to information.
- Information is an organized collection of useful facts structured to provide context.
Downloading confidential data or information to any of these devices creates an unauthorized copy. This can cause irreparable harm to your organization, whether the download is intentional or not.
Clicking these links will open a new tab or window in your browser.