Critical infrastructure
Concerns the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety. Examples include hospitals, electricity grids and traffic lights.
Internet of Things
Internet of Things (IoT)—networks of connected devices, appliances and machines embedded with software and sensors that can send and receive data through the internet—offers new opportunities and impressive growth potential, but it also creates new vulnerabilities.
Cloud security
Protects cloud platforms, services and data against unauthorized access and disruption through access management, network security and secure cloud configurations. Examples of security in cloud include encryption and disaster recovery.
Network security
Works to act against unauthorized intrusion of internal networks. It protects the internal infrastructure by inhibiting access to it. Examples include extra logins, new passwords and monitored internet access.
Application security
A set of best practices, functions and/or features added to an organization’s software to help prevent and remediate threats from cyberattacks, data breaches and other sources. Examples include antivirus programs, firewalls and encryption programs that prevent unauthorized access