Cybersecurity
![]() |

Computer security, also known as cybersecurity or IT security, is about protecting computer systems, networks, and software from threats like data theft, unauthorized access, or damage.[1][2]
As people rely on computer more it has become important to protect the Internet and smart devices like smartphones and IoT devices. With information systems becoming more complex, securing them is a big challenge we face today, especially for areas like power grids, elections, and finance.[3][4] While digital tools like passwords and encryption are key, traditional physical security, like locks, still plays a role. Cybersecurity is a broad field and doesn’t fully overlap with other types of security. It can be categorized into 3 areas:
- Database protection, which involves encryption, control, data backup, and regular access monitoring.
- Identity and Access Management (IAM) provides access to systems and data based on the level of trust and user rights.
- Threat detection and prevention includes antivirus software, firewalls and intrusion prevention systems (IPS).[5]
Why Cybersecurity is Important
[change | change source]Prevention of Cyberattacks
[change | change source]Cybersecurity measures help prevent various attacks, including malware, ransomware, and phishing. These attacks can result in significant operational disruption,[6] data loss, and financial damages. The global average cost of a single data breach reached USD 4.88 million in 2024, which is a 10% increase over last year.[7] This figure reflects direct financial losses and the long-term costs associated with incident response,[8] legal liabilities, and reputational damage due to cyberattacks.[9]
Protection of Data
[change | change source]Cybersecurity plays a critical role in safeguarding sensitive information, including personally identifiable information (PII),[10] financial records, healthcare data, intellectual property, and business intelligence.[11] These categories of data are frequently targeted in cyberattacks due to their value for identity theft, financial fraud,[12] and other forms of exploitation. Unauthorized access[13] to such data can result in significant individual harm and institutional reputational damage.
The scale of data exposure continues to grow annually. In 2024, it was reported that personal data belonging to over 1.7 billion individuals was compromised in various breaches.[14] This widespread compromise shows that data breaches are becoming more serious and common, putting regular people at risk of identity theft, financial loss, and privacy violations. This highlights the fact that cybersecurity is essential not only for organizations but also for the protection of the general public. It plays a vital role in ensuring the security of individuals’ private information, safeguarding them from the rising threats associated with an increasingly interconnected digital environment.
Compliance and Regulatory Requirements
[change | change source]Various laws and regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the Federal Information Security Modernization Act (FISMA), mandate specific cybersecurity standards. Organizations must comply with these to avoid legal and financial penalties.
References
[change | change source]- ↑ Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.
- ↑ Cybersecurity at the Encyclopædia Britannica
- ↑ Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021). "Systematically Understanding Cybersecurity Economics: A Survey". Sustainability. 13 (24): 13677. doi:10.3390/su132413677. hdl:11250/2978306. ISSN 2071-1050.
- ↑ Stevens, Tim (11 June 2018). "Global Cybersecurity: New Directions in Theory and Methods" (PDF). Politics and Governance. 6 (2): 1–4. doi:10.17645/pag.v6i2.1569. Archived (PDF) from the original on 2019-09-04.
- ↑ Kasyanenko, Yevhen (25 September 2024). "Global Cybersecurity: New Directions in Theory and Methods".
- ↑ "Operational disruption Definition". Law Insider. Retrieved 2025-04-24.
- ↑ "Cost of a data breach 2024 | IBM". www.ibm.com. Retrieved 2025-04-24.
- ↑ "What is Incident Response? Definition and Complete Guide | TechTarget". Search Security. Retrieved 2025-04-24.
- ↑ "Reputational damage and cyber risk go hand in hand | Aon". www.aon.com. Retrieved 2025-04-24.
- ↑ "Personally Identifiable Information (PII): Definition, Types, and Examples". Investopedia. Retrieved 2025-04-24.
- ↑ "What is Business Intelligence (BI)?". Google Cloud. Retrieved 2025-04-24.
- ↑ "What is financial fraud?". www.usbank.com. Retrieved 2025-04-24.
- ↑ "Unauthorized Access". Information Security. Retrieved 2025-04-24.
- ↑ Alder, Steve (2025-01-29). "More Than 1.7 Billion Individuals Had Personal Data Compromised in 2024". The HIPAA Journal. Retrieved 2025-04-24.