Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements & Transformative Options
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Cybersecurity
1.
A state of non-compromise of computerized systems.
Learn more in: Modeling Processes and Outcomes From Cybersecurity Talent Gaps in Global Labor Markets
2.
Cybersecurity
is an act to protect data, devices, applications, servers, network from the malicious attack through various tools and techniques. The process also ensures the confidentiality, integrity, availability, and non-repudiation of the content.
Learn more in: Preserving Information Security Using Fractal-Based Cryptosystem
3.
Information security (infosec) but broadly referring to technology and human systems that are built around the secure exchange, storage, and management of information.
Learn more in: Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces
4.
Protection against criminal access to one’s data and information and against criminal manipulation of computer networks/data/systems.
Learn more in: Beware!: A Multimodal Analysis of Cautionary Tales in Strategic Cybersecurity Messaging Online
5.
Is defined as the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, organization, and user assets.
Learn more in: Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
6.
is to protect computer networks from acts of theft or damage failure of hardware, software, or database, as well as from disruption or disorientation of services provided. These actions are applied and sentenced by the Law on
Cybersecurity
and Criminal Code of Vietnam.
Learn more in: Prevent and Combat Sexual Assault and Exploitation of Children on Cyberspace in Vietnam: Situations, Challenges, and Responses
7.
Focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
Learn more in: Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
8.
It is the organization and collection of resources, processes, and structures used to protect cyberspace from security events.
Learn more in: A Black-Box Framework for Malicious Traffic Detection in ICT Environments
9.
The application of technologies, processes and controls to protect computer systems, and the data they hold and transmit, from unauthorised use, theft, damage, and disruption. Within the business world,
cybersecurity
is widely seen as one of the major barriers to increasing business adoption of digital technologies.
Learn more in: Corporate Digital Responsibility: Approaches of the Leading IT Companies
10.
Cybersecurity
is the protection of internet-connected systems such as hardware, software, and data from cyber threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Learn more in: The Significance of STEM Education for National Security
11.
The optimal state where users can function securely and achieve their goals in the cyberspace domain by effectively managing risks posed by multidimensional threats.
Learn more in: The Increased Need for Cybersecurity in Developing Countries: COVID-19 and the Adverse Cybercrime Risks Imposed
12.
Cybersecurity
refers to the set of technologies, processes, and practices designed to safeguard networks, devices, programs, and data from attack, threats, or unauthorized access.
Learn more in: Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
13.
Cybersecurity
is seen where security alerts and cyber-attacks are becoming more frequent and malicious, these threats include private access attempts and exploitation software or phishing, malware, web application attacks, and network penetration. Organisations can counter these threats through two key areas of innovation, security analytics and biometric identity measurement. The focus of security analytics is on predicting and preventing breaches through early identification and intervention of such threats, to apprehend intruders enabled through managed services platforms. Biometric security for a more secure, accurate, and convenient form of identification has become the standard for governments in all identification documentation. Biometric fingerprint sensors are the favoured identification method currently in use in commercial access control.
Learn more in: Implications of Digital Transformation on the Strategy Development Process for Business Leaders
14.
It is a general term which describes technologies, processes, methods, and practices for the purpose of protection of internet-connected information systems from attacks, i.e., cyberattacks.
Cybersecurity
can refer to security of data, software or hardware within information systems.
Learn more in: Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT: CCTV Security and DDoS Attack Detection
15.
A combination of technologies, processes, and behaviours aimed at preventing attacks, damage, and illegal access to networks, computers, applications, and data.
Learn more in: Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
16.
The protection of computer systems from theft and damage to their assets and from manipulation and distraction of their services.
Learn more in: Security Awareness in the Internet of Everything
17.
Is a skill or capability, activity, or process by which Information and Communication Systems and Data are protected against damage, unauthorized use or any type of modification or exploitation.
Learn more in: Senior Citizens Learning Safe Behaviors on the Web: A Case Study Involving an Online Educational Game
18.
The protection of data, servers, mobile devices, electronic systems, computers, and networks from malicious attacks.
Learn more in: Business Management and Strategy in Cybersecurity for Digital Transformation
19.
Protecting digital networks and systems from unauthorized usage or disruption.
Learn more in: All the World's a Stage: Achieving Deliberate Practice and Performance Improvement Through Story-Based Learning
20.
Also known as computer security or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.
Learn more in: What the 3Vs Acronym Didn't Put Into Perspective?
21.
Cybersecurity
deals with damage to, unauthorized use of, exploitation of electronic information and communications systems that ensure confidentiality, integrity and availability.
Learn more in: Cybersecurity: What Matters to Consumers – An Exploratory Study
22.
The process using technology and personnel to protect digital assets.
Learn more in: Federal Government Application of the Cloud Computing Application Integration Model
23.
The protection of internet-connected systems, including their hardware, software, and data, against malicious cyberattacks is referred to as
cybersecurity
. To prevent unwanted access to data centers and other computerized systems, people and businesses alike engage in the practice of using two-factor authentication (2FA).
Learn more in: Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
24.
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Learn more in: Cybersecurity Legislation
25.
Includes process, procedures, technologies, and controls designed to protect systems, networks, and data.
Learn more in: How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
26.
The strategies and measures that are taken to ensure the protection of computer systems.
Learn more in: Detecting Individual-Level Deception in the Digital Age: The DETECT Model ©
27.
The protection of internet-connected systems, including their hardware, software, and data, against malicious cyberattacks is referred to as
cybersecurity
. To prevent unwanted access to data centers and other computerized systems, people and businesses alike engage in the practice of using two-factor authentication (2FA).
Learn more in: Contemporary Security Threats: Some Proposals for Banking Networks in Bangladesh
28.
A computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries.
Learn more in: Cybersecurity Curricular Guidelines
29.
The organization and collection of resources, processes, and structures used to protect cyberspace from occurrences that misalign de jure from de facto property rights.
Learn more in: A Three-Vector Approach to Blind Spots in Cybersecurity
30.
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
Learn more in: National Security Policy and Strategy and Cyber Security Risks
31.
Is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises
cybersecurity
and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.
Learn more in: Sovereign Bureaucrats vs. Global Tech Companies: Ethical and Regulatory Challenges
32.
The practice of securing systems, networks, and programs from digital threats and attacks is known as
cybersecurity
. These cyberattacks are typically aimed at gaining access to, altering, or destroying sensitive data, extorting money from users, or disrupting normal corporate activities.
Learn more in: Cybersecurity Risk: Assessment and Management
33.
The protection of computer systems and networks from unauthorized exploitation, theft, damage to software, hardware, and electronic data.
Learn more in: Evaluating Cybersecurity Strategies in Africa
34.
A set of processes, practices, and technologies designed to protect, in the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Learn more in: Automotive Vehicle Security Standards, Regulations, and Compliance
35.
Acts taken, technologies created and deployed, policies written and enacted, to protect computer systems and networks against misuse, intrusion, and exploitation.
Learn more in: The Electronic Hive Mind and Cybersecurity: Mass-Scale Human Cognitive Limits to Explain the “Weakest Link” in Cybersecurity
36.
Mechanism to fend off cyber crime.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
37.
The
cybersecurity
is the protection measures of the computer systems and networks from the cyberattack. The cyberattack includes the information disclosure, theft or damage to the hardware systems, the disruption or misdirection of the services associated with the system.
Learn more in: Deep Learning in Instructional Analysis, Design, Development, Implementation, and Evaluation (ADDIE)
38.
A set of processes, practices, and technologies designed to protect, in the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Learn more in: NERC CIP Standards: Review, Compliance, and Training
39.
A set of processes, practices, and technologies designed to protect, on the realm of cyberspace, the three tenets of information security: confidentiality, integrity, and availability.
Learn more in: Auditor Evaluation and Reporting on Cybersecurity Risks
40.
The defense and protection of computers, mobile devices, servers, and networks from criminal or unauthorized use of electronic data.
Learn more in: The Dark Side of Digital Culture
41.
Cybersecurity
is the practice of protecting and securing the IT systems, networks both wireless and wired, and software programs and hardware from digital attacks.
Learn more in: Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges
42.
Cybersecurity
is the practice of protecting computer systems and programs from digital attacks.
Learn more in: A Case Study on the United Arab Emirates (UAE) as a Digital Economy Exemplar
43.
A set of processes, practices, and technologies designed to protect, on the realm of cyberspace, and the three tenets of information security: confidentiality, integrity, and availability.
Learn more in: Using the NIST Framework and COBIT 2019 in Offering Cybersecurity Consulting and Assurance Services
44.
Strategic scientific policies and practices of individuals and corporations to ensure the integrity of computer systems and networks from criminal activity. Such abuse ranges from lurking, stealing, manipulating, or outright controlling individual computers or networked systems. Any cyberattack that is successful can significantly paralyze business or an individual’s life. To resolve the instability or frozen nature of technology, hackers often seek to be compensated by a ransom, many times in cryptocurrency to ensure anonymity.
Learn more in: Cybersex Trafficking: The Insidious Side of the Internet
45.
Security of computer-based systems. These systems employ a wide variety of methods such as encryption, firewalls, backup, and internal controls.
Learn more in: Service Organization Control (SOC) Reports and Their Usefulness
46.
The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights.
Learn more in: The Threat of Cyber Warfare in the SADC Region: The Case of Zimbabwe
47.
This term refers to the online peacefulness, safety, and harmony of state (nation), organisation and even individual. It also refers to the absolute absence, or a substantial degree of the guarantee of the absence of cyberviolence, ‘cyberaggression’, cyberconflict and other forms of online threat to a nation’s, organisation’s or individual entity’s overall sense of being secure from any phenomenon that may cause a great deal of panic, and fear, or the absence of peace, or the prevalence of war-like situation, or all of these in the cyberspace.
Learn more in: Implications of Artificial Intelligence-Driven Deepfakes for Cybersecurity and Regulation in Nigeria: Theorising for Cyberfakes and Cyberviolence
48.
Security measures against various forms of cyberattacks on the business.
Learn more in: Ethical Values and Responsibilities of Directors in the Digital Era
49.
A combination of tools, policies, controls, and best practices to protect an organization’s assets such as people, data, technology, and processes.
Learn more in: US Cybersecurity Laws and Regulations: Current Trends and Recommendations for Improvement
50.
The art of ensuring the existence and continuity of the Information Society of a nation, guaranteeing and protecting, in Cyberspace, its information assets and critical infrastructure.
Learn more in: Cybersecurity: The New Challenge of the Information Society
51.
The protection of systems, networks, and data in cyberspace.
Learn more in: Global Wannacrypt Ransomware Attack: Tackling the Threat of Virtual Marauders
52.
A set of techniques and algorithms to protect computers, networks, programs, and data from unauthorized access or exploitation, on criteria for maintaining usability, reliability, confidentiality, integrity, and availability.
Learn more in: Cybersecurity of Industrial Internet of Things
53.
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
Learn more in: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
54.
The protection of electronic data from unauthorised or criminal activity.
Learn more in: Transforming Cities
55.
Cybersecurity
is the protection of computer systems and networks from the cyberattacks so that their hardware, software, or data are not disrupted or misdirected of the services that they provide.
Learn more in: Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things
56.
A set of efforts to protect information systems from theft and unauthorized access to data and services the systems provide.
Learn more in: Old Media, New Media, and Public Engagement with Science and Technology
57.
Freedom from potential compromise and potential harm stemming from unauthorized access to computers and computer networks.
Learn more in: Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR
58.
The protection of internet-connected systems including hardware, software, and data from cyberattacks.
Learn more in: A Managerial Perspective for the Software Development Process: Achieving Software Product Quality by the Theory of Constraints
59.
The protection of digital information and related technologies against misuse, unauthorized access, or any form of compromise.
Learn more in: Online Calling Cards and Professional Profiles in Cybersecurity From Social Media
60.
Cybersecurity
is the practice of protecting systems, networks, and programs from digital attacks.
Learn more in: Information Security Awareness in Tourism Enterprises: Case of Turkish Manager Opinions
61.
Mechanism to fend off cyber crime.
Learn more in: Concept and Practices of Cyber Supply Chain in Manufacturing Context
62.
The application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks
Learn more in: Deepfake and Digital Citizenship: A Long-Term Protection Method for Children and Youth
63.
This is the application of diverse technologies, processes, procedures, and controls to safeguard systems, networks, programs, devices, and data from cyber attacks. Overall cyber security objective is to diminish the risk of cyber attacks and guard against the unsanctioned misuses of systems, networks, and technologies.
Learn more in: Realizing a Multi-Layered Mobile Strategy for Underserved Areas for Cybersecurity Leadership
Find more terms and definitions using our
Dictionary Search
.
Cybersecurity
appears in:
Global Cyber Security Labor Shortage and...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Cybersecurity
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 175,500 titles for
Cybersecurity
to find related research papers.
Learn More About Cybersecurity in These Related Titles
The Role of Child Life Specialists in Commun...
Social Sciences & Humanities
Copyright 2023. 472 pages.
While the genesis of the Certified Child Life Spec...
In Stock
$29.50 Individual Chapters
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$29.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$29.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Servant Leadership: Research and Practice
Business & Management
Copyright 2014. 405 pages.
Leaders represent a necessary part of any organiza...
In Stock
$29.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$29.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$29.50 Individual Chapters