Cyber Security

Cyber Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Snippet from Wikipedia: Computer security

Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It focuses on protecting computer software, systems, and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The growing significance of computer insecurity reflects the increasing dependence on computer systems, the Internet, and evolving wireless network standards. This reliance has expanded with the proliferation of smart devices, including smartphones, televisions, and other components of the Internet of things (IoT).

As digital infrastructure becomes more embedded in everyday life, cybersecurity has emerged as a critical concern. The complexity of modern information systems—and the societal functions they underpin—has introduced new vulnerabilities. Systems that manage essential services, such as power grids, electoral processes, and finance, are particularly sensitive to security breaches.


Although many aspects of computer security involve digital security, such as electronic passwords and encryption, physical security measures, such as metal locks are still used to prevent unauthorized tampering. IT security is not a perfect subset of information security, therefore does not completely align with the security convergence schema.

## ToDo ##

  • FIXME
  • Access Management
  • Active Directory Bridge
  • Active Directory Management
  • Active Directory Recovery
  • Anti-Malware Tools
  • ATP (Advanced Threat Protection)
  • Attack Surface Management (ASM)
  • Authorization Software
  • Automotive Cyber Security
  • Blockchain as a Service
  • Bot Management
  • Breach and Attack Simulation (BAS)
  • Certificate Management Software
  • Cloud Access Security Brokers (CASB)
  • Cloud and Data Center Security
  • Cloud Resource Access Management
  • Cloud Security Posture Management (CSPM)
  • Cloud-Native Application Protection Platforms (CNAPP)
  • Container Security
  • Customer Identity and Access Management
  • CWPP (Cloud Workload Protection Platforms)
  • Cyber Asset Attack Surface Management (CAASM)
  • Cybersecurity Skills Training Platforms
  • Data Loss Prevention (DLP)
  • Digital Asset Custody Services
  • Digital Asset Security Platforms
  • Digital Risk Protection
  • Directory Servers
  • Distributed Denial of Service (DDOS) Protection
  • DSPM- Data Security Posture Management
  • EDR (Endpoint Detection and Response)
  • Endpoint Compliance
  • Endpoint Encryption
  • Enterprise Blockchains
  • Enterprise Infrastructure VPN
  • Enterprise Password Managers
  • EPP (Endpoint Protection for Business)
  • Extended Detection and Response (XDR)
  • Firewall Security Management
  • Firewalls
  • Fraud Detection and Prevention
  • Identity and Access Management as a Service (IDaaS) (IAMaaS)
  • Identity Management (IM)
  • Information Security and Risk Consulting Services
  • Intrusion Detection and Prevention Software (IDPS)
  • IoT Security
  • IT Vendor Risk Management
  • Mainframe Security
  • Managed Detection and Response (MDR)
  • Managed Security Services
  • Microsegmentation Software
  • Mobile Data Protection
  • Mobile Identity
  • Mobile Threat Defense
  • Network Access Control (NAC)
  • Network Detection and Response (NDR)
  • Operational Technology (OT) Security
  • Penetration Testing Services
  • Privileged Access Management (PAM)
  • SaaS Security Posture Management (SSPM)
  • Secure Access Service Edge (SASE)
  • Security Awareness Training
  • Security Incident Response
  • Security Information and Event Management (SIEM)
  • Security Orchestration Automation and Response (SOAR)
  • Session Border Controllers (SBC)
  • Single Sign-On (SSO)
  • SOC as a Service
  • SSL VPN
  • SSL/TLS Decryption
  • Threat Deception Platforms
  • Threat Intelligence Platforms
  • Unified Threat Management (UTM)
  • User Activity Monitoring
  • User Behavior Analytics - UEBA
  • Virtualization Security
  • Vulnerability Management
  • Web Application Firewall (WAF)
  • Web Content Filtering
  • ZTNA
  • ZTNA as a Service
  • SOC
  • method/cyber_security.txt
  • Last modified: 2023/08/22 08:09
  • by Henrik Yllemo