Changes

no edit summary
Line 1: Line 1:  
'''Cybersecurity''' is the practice of protecting systems, networks, and programs from digital attacks. Cyberattacks usually seek to access, change, or destroy sensitive information; extort money from their victims; or disrupt business as usual.<ref>[https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~types-of-threats What is Cybersecurity, Cisco]</ref> Implementing cybersecurity measures is challenging because it is a cat-and-mouse game, and today there are more devices than people.
 
'''Cybersecurity''' is the practice of protecting systems, networks, and programs from digital attacks. Cyberattacks usually seek to access, change, or destroy sensitive information; extort money from their victims; or disrupt business as usual.<ref>[https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~types-of-threats What is Cybersecurity, Cisco]</ref> Implementing cybersecurity measures is challenging because it is a cat-and-mouse game, and today there are more devices than people.
   −
Ensuring the cybersecurity of computers, networks, programs, and data relies on multiple layers of protection involving the detection, investigation, and remediation of threats. Users need to understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data. However, many questions remain over whether people can outsmart [[Social Engineering Attacks]]. Common technology used to protect endpoint devices, such as computers, smart devices, and routers; networks; and the cloud, include firewalls, DNS filtering, malware protection, antivirus software, and email security.
+
Ensuring the cybersecurity of computers, networks, programs, and data relies on multiple layers of protection involving the detection, investigation, and remediation of threats. Users need to understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data. However, many questions remain over whether people can outsmart [[Social Engineering Attacks]]. Common technology used to protect endpoint devices (such as computers, smart devices, and routers), networks, and clouds include firewalls, DNS filtering, malware protection, antivirus software, and email security.
    
==History==
 
==History==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits