This page has been robot translated, sorry for typos if any. Original content here.

Security

Security - the absence of any risk, in the case of which there are negative consequences (harm) in relation to someone or something.

Information security of the state - the state of preservation of the information resources of the state and the protection of the legal rights of individuals and society in the information sphere.

In modern society, the information sphere has two components: information-technical (artificially created by man the world of technology, technology, etc.) and information-psychological (the natural world of living nature, including the person himself). Accordingly, in the general case, the information security of a society (state) can be represented by two components: information technology security and information psychological (psychophysical) security.

Also an important aspect of information security is the identification and classification of possible security threats.

Computer security - security measures used to protect computing devices (computers, smartphones and others), as well as computer networks (private and public networks, including the Internet). The field of activity of system administrators covers all processes and mechanisms by which digital equipment, information field and services are protected from accidental or unauthorized access, change or destruction of data, and is becoming increasingly important due to the growing dependence on computer systems in the developed community.

Cybersecurity - the process of using security measures to ensure the confidentiality, integrity and availability of data. The system administrator provides protection of assets, including data of a local area network of computers, servers. In addition, buildings and, most importantly, personnel are taken under protection. The purpose of ensuring cybersecurity is to protect data (both in the process of transmission and / or exchange and in storage). In order to ensure data security, countermeasures can also be applied. Some of these measures include (but are not limited to) access control, personnel training, audit and reporting, risk assessment, penetration testing and authorization requirements.

Via wiki