Cybersecurity protects electronic systems, back-end systems and end-user applications, the users of those systems, and the information they store, just as physical security is aimed at protecting physical property and people from illicit behavior or unintentional damage. Cyber protection is aimed at preventing entry, harm, interruption or alteration of IT networks and applications by cybercriminals, insider threats, or others.
Both facets of our lives are enabled by networks, computers and other mobile gadgets, and technological applications as human culture goes digital. As a central part of their activities, vital infrastructure, including hospitals, financial services, states, and industry, all use computers or mobile devices. The vast majority of these computers have an Internet connection. Security actors have a greater opportunity than ever for financial benefit, extortion, political or social purposes (known as hacktivism), or actually vandalism, to find ways to penetrate certain information networks. Cyber assaults against vital facilities in all developing nations have been conducted over the past two decades, and numerous organisations have suffered devastating losses. Every year, there are over 2,000 reported data breaches worldwide, with each breach costing an average of over $3.9 million ($8.1 million in the USA).
The primary goal of cyber protection is to secure records. The security community generally refers to a triangular connected values that ensure data is safe, known as the CIA triad:
Confidentiality: ensuring that classified information is available only to the persons who genuinely use it and are able to use it in compliance with corporate protocols, while restricting access to others.
Integrity: ensuring that data and processes are not modified because of threat agents' behavior or unintended change. Steps should be taken to eliminate wrongdoing or destruction of confidential data and, if this happens, to recover quickly from such an occurrence.
Availability: ensuring that data remains available and useful for its end-users, and that this access is not hindered by system malfunction, cyber crimes, or even security measures themselves.