Generated by GPT-5-mini| Cybersecurity | |
|---|---|
![]() Golftheman · CC BY-SA 3.0 · source | |
| Name | Cybersecurity |
| Focus | Information protection |
| Related | Information security, Computer security |
Cybersecurity Cybersecurity is the practice of protecting digital systems, networks, and data from unauthorized access, disruption, or damage. It intersects with technical fields, policy arenas, and legal frameworks to address threats against computing infrastructure and information assets. Major actors include technology companies, research institutions, standards bodies, and national agencies engaged in prevention, detection, response, and recovery.
Cybersecurity spans hardware, software, and human processes and involves coordination among organizations such as Microsoft, Google, Apple Inc., Amazon (company), IBM, Intel, Cisco Systems, Oracle Corporation, Siemens, SAP SE, Amazon Web Services, and Cloudflare. Research contributions arise from institutions like Massachusetts Institute of Technology, Stanford University, Carnegie Mellon University, University of Cambridge, ETH Zurich, National Institute of Standards and Technology, and SANS Institute. Standards and frameworks are shaped by bodies including International Organization for Standardization, Institute of Electrical and Electronics Engineers, Internet Engineering Task Force, World Wide Web Consortium, and Payment Card Industry Security Standards Council. Policy and defense actors include National Security Agency (United States), European Union Agency for Cybersecurity, NATO, UK National Cyber Security Centre, Australian Cyber Security Centre, Cybersecurity and Infrastructure Security Agency, and Japanese Cabinet Secretariat. Prominent conferences and publications include Black Hat (security conference), DEF CON, RSA Conference, Usenix, ACM Conference on Computer and Communications Security, IEEE Symposium on Security and Privacy, Nature (journal), and Communications of the ACM.
Common adversaries have been attributed to states, criminal organizations, hacktivist collectives, and insider actors such as Fancy Bear, Lazarus Group, Equation Group, Anonymous (hacker group), REvil, Conti (ransomware group), Charming Kitten, FIN7, and The Shadow Brokers. Attack techniques include malware, ransomware, phishing, supply chain compromise, distributed denial-of-service, zero-day exploitation, credential stuffing, man-in-the-middle, and insider misuse. Notable toolsets and exploits have names like Stuxnet, NotPetya, WannaCry, Mirai (malware), Emotet, Zeus (malware), Heartbleed, Spectre and Meltdown, EternalBlue, Shellshock, SolarWinds (software), and Log4Shell. Vectors involve vulnerabilities in products from vendors such as Microsoft Exchange Server, SolarWinds Orion, Citrix Systems, Fortinet, Palo Alto Networks, VMware, Red Hat, Juniper Networks, and Adobe Systems. Attacks have targeted infrastructure overseen by entities like Equifax, Target (retailer), Sony Pictures Entertainment, Yahoo!, Marriott International, Colonial Pipeline, and JBS S.A..
Defensive approaches integrate endpoint protection, network security, identity and access management, encryption, secure software development, and threat intelligence. Technologies and vendors include Symantec, McAfee, CrowdStrike, FireEye, Tenable, Inc., Splunk, Palo Alto Networks, Check Point Software Technologies, Trend Micro, Bitdefender, and Kaspersky Lab. Cryptographic mechanisms rely on standards such as Advanced Encryption Standard, RSA (cryptosystem), Elliptic-curve cryptography, Diffie–Hellman key exchange, and protocols like Transport Layer Security. Authentication and identity frameworks reference OAuth, OpenID Connect, SAML, FIDO Alliance, and hardware tokens from Yubico. Secure development and testing use practices advocated by OWASP, NIST Cybersecurity Framework, ISO/IEC 27001, and continuous integration tools supported by GitHub, GitLab, and Jenkins. Incident response and forensics draw on techniques used by Europol, FBI, Interpol, CERT Coordination Center, and national computer emergency response teams.
Risk governance combines enterprise risk management, supply chain risk, third-party risk, and resilience planning. Frameworks and regulations shaping governance include NIST Cybersecurity Framework, ISO 31000, ISO/IEC 27001, GDPR, California Consumer Privacy Act, Sarbanes–Oxley Act, Federal Information Security Management Act, Payment Card Industry Data Security Standard, NIS Directive, and Cybersecurity Maturity Model Certification. Boards and executives rely on guidance from auditors and firms like Deloitte, PwC, KPMG, Ernst & Young, McKinsey & Company, Gartner, and Forrester Research. Insurance markets involve carriers such as AIG, Chubb, and Zurich Insurance Group, which underwrite cyber insurance policies. Standards for disclosure and reporting intersect with agencies like the Securities and Exchange Commission and national data protection authorities including Information Commissioner's Office (United Kingdom) and CNIL.
Legal frameworks address interception, breach notification, liability, attribution, and export controls involving entities such as Wassenaar Arrangement and courts like the European Court of Human Rights. Privacy debates reference laws and institutions like GDPR, California Consumer Privacy Act, Federal Trade Commission, Office of the Privacy Commissioner of Canada, and European Data Protection Board. Ethical considerations are informed by academic centers and organizations such as Berkman Klein Center, Center for Strategic and International Studies, RAND Corporation, Hoover Institution, and Oxford Internet Institute. Notable prosecutions and legal cases have involved agencies like the Department of Justice (United States), Crown Prosecution Service, and figures such as Kevin Mitnick, Gary McKinnon, Albert Gonzalez, and Marcus Hutchins.
Critical sectors deploying cybersecurity include finance, healthcare, energy, transportation, telecommunications, manufacturing, retail, defense, and education. Key firms and institutions include JPMorgan Chase, Bank of America, Goldman Sachs, World Health Organization, Pfizer, Boeing, General Electric, Siemens Energy, ExxonMobil, Deutsche Telekom, Verizon Communications, AT&T, Toyota, Tesla, Inc., Lockheed Martin, Raytheon Technologies, Northrop Grumman, Siemens Healthineers, and University of Oxford. Emerging domains include Internet of Things platforms developed by ARM Holdings, Qualcomm, Broadcom Inc., and industrial control systems vendors such as Schneider Electric and ABB.
The field evolved from early work at institutions like DARPA, RAND Corporation, Bell Labs, MITRE Corporation, and SRI International. Milestones include the development of ARPANET, the publication of The Cuckoo's Egg (book by Clifford Stoll), and events such as the Morris worm, the ILOVEYOU (computer worm), and breaches at Morris (computer worm), Equifax, Yahoo!, Sony Pictures Entertainment, Target (retailer), Stuxnet, NotPetya, WannaCry, SolarWinds (software), and Colonial Pipeline. Investigations and attributions have involved organizations such as Mandiant, Kaspersky Lab, FireEye, Microsoft Threat Intelligence Center, and law enforcement agencies including the FBI and Europol. Awards and recognition in the field include honors from ACM, IEEE, and prizes such as the Turing Award winners who contributed to underlying computer science.
Category:Information security