Security - the absence of any risk, in the case of which there are negative consequences (harm) in relation to someone or something.
Information security of the state - the state of preservation of the information resources of the state and the protection of the legal rights of individuals and society in the information sphere.
In modern society, the information sphere has two components: information technology (artificially created by man the world of technology, technology, etc.) and informational and psychological (the natural world of living nature, including the man himself). Accordingly, in the general case, the information security of a society (state) can be represented by two components: information technology security and information psychological (psychophysical) security.
Also an important aspect of information security is the identification and classification of possible security threats.
Computer security - security measures used to protect computing devices (computers, smartphones and others), as well as computer networks (private and public networks, including the Internet). The field of activity of system administrators covers all processes and mechanisms by which digital equipment, information field and services are protected from accidental or unauthorized access, alteration or destruction of data, and is becoming increasingly important due to the growing dependence on computer systems in the developed community.
Cybersecurity is the process of using security measures to ensure the confidentiality, integrity and availability of data. The system administrator ensures the protection of assets, including data from the local network of computers and servers. In addition, buildings and, most importantly, personnel are taken under protection. The purpose of ensuring cybersecurity is to protect data (both in the process of transmission and / or exchange and in storage). In order to ensure data security, countermeasures can also be applied. Some of these measures include (but are not limited to) access control, personnel training, audit and reporting, risk assessment, penetration testing and authorization requirements.