Cybersecurity information technology list explained

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Cybersecurity is a major endeavor in the IT industry. There are a number of professional certifications given for cybersecurity training and expertise.[1] Although billions of dollars are spent annually on cybersecurity, no computer or network is immune from attacks or can be considered completely secure. The single most expensive loss due to a cybersecurity exploit was the ILOVEYOU or Love Bug email worm of 2000, which cost an estimated 10 billion dollars.[2]

This article attempts to list all the important Wikipedia articles about cybersecurity. There are a number of minor articles that can be reached by means of links in the listed articles.

General

Introductory articles about cybersecurity subjects:

Cryptography

The art of secret writing or code. A "plaintext" message is converted by the sender to "ciphertext" by means of a mathematical algorithm that uses a secret key. The receiver of the message then reverses the process and converts the ciphertext back to the original plaintext.[7]

Steganography

The art of hidden writing. The secret message is hidden within another object, such as a digital photograph.[9]

Authentication and access

The process by which a potential client is granted authorized use of an IT facility by proving its identity.[11]

Public Key Infrastructure (PKI)

A framework for managing digital certificates and encryption keys.

Tools

Computerized utilities designed to study and analyze the security of IT facilities and/or break into them on an unauthorized and potentially criminal basis.[12]

Threats

Modes of potential attacks on IT facilities.[13]

Exploits

Security exploits affecting computers.[14]

Criminal activity

Violation of the law by means of breaking into and/or misusing IT facilities. Laws that attempt to prevent these crimes.[15]

Nation states

Countries and their governments that use, misuse, and/or violate IT facilities to achieve national goals.[16]

End-point protection

The securing of networked computers, mobile devices and terminals.[17]

Network protection

The protection of the means by which data is moved from one IT facility to another.[18]

Processing protection

The securing of IT facilities that manipulate data, such as computer servers, often by means of specialized cybersecurity hardware.[19]

Storage protection

The protection of data in its non-moving state, usually on magnetic or optical media or in computer memory.[20]

Management of security

The processes by which security technology is monitored for faults, deployed and configured, measured for its usage, queried for performance metrics and log files, and/or monitored for intrusions.[21]

Standards, frameworks, & requirements

Officially agreed architectures and conceptual structures for designing, building, and conducting cybersecurity.[22] [23]

See also

Notes and References

  1. Web site: CompTIA Career Roadmap . CompTIA . 20 Aug 2019.
  2. Book: Ciampia . Mark . Security+ Guide to Network Security Fundamentals . 2018 . Cengage . 978-1337288781.
  3. Book: Stallings & Brown . Computer Security: Principles and Practice . 2017 . Pearson . 978-0134794105 . 4.
  4. Book: Stallings . William . Network and Internetwork Security: Principles and Practice . registration . 1995 . IEEE Press . 0-7803-1107-8.
  5. Book: The Open University . Network security . Kindle . 2016.
  6. Book: Merkow & Breithaupt . Information Security: Principles and Practice . 2014 . Pearson . 978-0789753250 . 2.
  7. Book: Stallings . William . Cryptography and Network Security . 2016 . Pearson . 978-0134444284 . 7th.
  8. Book: Kahn . David . The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet . 1967 . Scribner . 0-684-83130-9.
  9. Book: Fridrich . Jessica . Steganography in Digital Media . 2009 . Cambridge . 978-0521190190.
  10. Book: Macrakis . Kristie . Prisoners, Lovers, and Spies: The Story of Invisible Ink from Herodotus to Al-Qaeda . 2014 . Yale University Press . 978-0300179255.
  11. Book: Kao . I Lung . Effective and Efficient Authentication and Authorization in Distributed Systems . 2019 . University of Florida . 978-0530003245.
  12. Book: ICT School . Hacking Tools for Computers . 2019 . ICT School . 9781088521588.
  13. Book: Diogenes & Ozkaya . Cybersecurity--Attack and Defense Strategies . 2018 . Packt Publishing . 978-1-78847-529-7.
  14. Book: Andes . Thomas . The Encyclopedia of Computer Security Exploits . 8 April 2016 . 9781530944682.
  15. Book: Britz . Marjie . Computer Forensics and Cyber Crime . 2013 . Pearson . 978-0132677714 . 3.
  16. Book: Kaplan . Fred . Dark Territory: The Secret History of Cyber War . 2016 . Simon & Schuster . 978-1476763262.
  17. Book: Lopez & Setola . Critical Infrastructure Protection . 2012 . Springer-Verlog . 978-3642289194.
  18. Book: Stewart . Michael . Network Security, Firewalls, and VPNs . 2013 . James & Bartlett Learning . 978-1284031676 . 2.
  19. Book: Grasser . Michael . Secure CPU: A Secure Processor Architecture for Embedded Systems . 2008 . VDM Verlag . 978-3639027839.
  20. Book: Jacobs & Rudis . Data-Driven Security . 2014 . Wiley . 978-1118793725.
  21. Book: Practical Information Security Management: A Complete Guide to Planning and Implementation . Campbell, T. . APress . 2016 . 9781484216859.
  22. Book: Calder . Alan . NIST Cybersecurity Framework: A Pocket Guide . 28 September 2018 . IT Governance Publishing Ltd . 978-1787780422.
  23. Book: Alsmatti . Izzat . The NICE Cybersecurity Framework . 2019 . Springer . 978-3030023591.
  24. Web site: Framework for Improving Critical Infrastructure Cybersecurity v1.1 . NIST . NIST . 19 Aug 2019.
  25. Web site: NIST . Cybersecurity Framework Page . NIST . 12 November 2013 . 19 Aug 2019.
  26. Web site: NIST . NIST SP 800-181: NICE Cybersecurrity Workforce Framework . NIST . 19 Aug 2019.
  27. Web site: U.S. Congress . Cybersecurity Enhancement Act of 2014 . U.S. Congress . 19 Aug 2019.
  28. Book: Center for Internet Security . CIS Controls V7.1.
  29. Book: Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations. NIST .
  30. Book: Talabis & Martin . Information Security Risk Assessment Toolkit . 2013 . Syngress . 978-1597497350.
  31. Book: ISACA . The Risk IT Practitioner Guide.
  32. Book: Kosseff . Jeff . Cyber Security Law . 2017 . Wiley . 978-1119231509.
  33. Book: Taylor . Laura . FISMA Compliance Handbook . 2013 . Elsevier . 978-0124058712 . 2.