• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » What is Cyber Security?

What is Cyber Security?

Cyber Security Definition

Cyber security, sometimes written as cyber security, is a term that encompasses all processes, technologies, legislation, hardware and procedures used to prevent the unauthorized use of data, networks, and programming. Cyber security means protection from theft of services and information.

Cyber security applies at all levels; From consumer level protection, i.e. securing credit card information as it is processed by a point-of-sale device and passes onto to enterprise level processing systems. This can include protecting thousands of credit card number at financial institutions.

In 2017, the United States handed down the longest sentence ever to an individual hacker who made more than $170 million dollars with stolen credit card data.

Cyber security is not just limited to protecting against credit card misuse and identity theft. It encompasses many types of threats. A threat is any intention to inflict damage, steal data, access without permission or harm IT systems, hardware or software at any level and in any way. A threat may be something as simple as altering the home page of a website without permission. A more serious threat would be stealing the human resources records of all employees at the US Internal Revenue Service.

Types of cyber security threats include:

Any event that could lead to loss or damage to hardware, software, data, or capabilities

  • Malware
  • Bots
  • SPAM
  • Phishing scams
  • Spyware
  • Back doors to IT systems, apps, data, etc.…
  • Hardware vandalism

Cyber security is also referred to as IT security, computer security, or online security.

As the world becomes more and more connected via the internet, cyber security grows increasingly difficult. It is estimated that there will be over 50 billion connected devices by the year 2020. Many of which are connected to insecure networks, like free public Wi-Fi. Even supposedly, secure devices are at risk from data sniffing by supposedly trusted mobile apps.

Legislation tends to be reactive rather than proactive when it comes to anything technology related. The US Federal government IT systems are woefully behind in their own cyber security system updates. Future cyber security legislation supposedly will hold US federal agency managers accountable for data breaches, but the new legislation has yet to be passed. Even if it is signed into law, the budget to upgrade federal IT systems to secure standards is estimated to be in the billions of dollars. Although the government allocates billions of dollars every year to upgrading its technologies, their legacy systems are still outdated.

Other scenarios present issues as well. The advent of smart cities presents another new opportunity for data collection by hackers. Connected medical devices and wearable devices also offer a potential back door for hackers.
Proper cyber security also means having the proper procedures and people in place. Even the best hardware systems can be compromised, resulting in data theft if trust is placed in the wrong person.
Cyber security is a global issue. Anyone breach in the system – like paying a credit card bill from a corporate tablet while connected to an airport’s public Wi-Fi – can let a hacker in.

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version