Cybersecurity
Cybersecurity: Measures taken to protect computer systems and data from attach and unauthorized access or use.
Definition
Measures taken to protect computer systems and data from attach and unauthorized access or use.
Alternative Definitions
- Definition 2
Measures taken to protect computer systems and data from attack and unauthorized access or use.
- Definition 3
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, elec- tronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
- Definition 4
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
- Definition 5
Prevention of damage to, protection of, and restoration of computers, electronic commu- nications systems, electronic communications services, wire communication, and electronic communication. This includes ensuring the availability, integrity, authentication, confidenti- ality, and nonrepudiation of the information contained therein.
- Definition 6
The prevention of damage to, unauthorized use of, or exploitation of, and, if needed, the restoration of electronic information and communications systems and the information contained therein to ensure confidentiality, integrity, and availability; includes protection and restoration, when needed, of information networks and wireline, wireless, satellite, public safety answering points, and 911 communications systems and control systems. (Source: 2009 NIPP)
- Definition 7
Measures taken to protect computer systems from attack and unauthorized access or use. Cybersecurity tools include hardware, software and procedures. Election officials must defend against attacks and unauthorized access of election and voting systems. The most common cybersecurity technique is good password management.
- Definition 8
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.