This is a list of cybersecurity information technologies. Cybersecurity concerns all technologies that store, manipulate, or move computer data, such as computers, data networks, and all devices connected to or included in said networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Users of information technology are to be protected from theft of assets, extortion, identity theft, loss of privacy, damage to equipment, business process compromise, and general disruption. The public should be protected against acts of cyberterrorism, such as compromise or denial of service.
Cybersecurity is a major endeavor in the IT industry. There are a number of professional certifications given for cybersecurity training and expertise.[1] Billions of dollars are spent annually on cybersecurity, but no computer or network is immune from attacks or can be considered completely secure.
This article attempts to list important Wikipedia articles about cybersecurity.
General
Introductory articles about cybersecurity subjects:
The art of secret writing or code. A "plaintext" message is converted by the sender to "ciphertext" by means of a mathematical algorithm that uses a secret key. The receiver of the message then reverses the process and converts the ciphertext back to the original plaintext.[6]
Computerized utilities designed to study and analyze the security of IT facilities and/or break into them on an unauthorized and potentially criminal basis.[11]
The processes by which security technology is monitored for faults, deployed and configured, measured for its usage, queried for performance metrics and log files, and/or monitored for intrusions.[20]
^The Open University (2016). Network security. Kindle.
^Merkow & Breithaupt (2014). Information Security: Principles and Practice (2 ed.). Pearson. ISBN978-0789753250.
^Stallings, William (2016). Cryptography and Network Security (7th ed.). Pearson. ISBN978-0134444284.
^Kahn, David (1967). The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner. ISBN0-684-83130-9.
^Fridrich, Jessica (2009). Steganography in Digital Media. Cambridge. ISBN978-0521190190.
^Macrakis, Kristie (2014). Prisoners, Lovers, and Spies: The Story of Invisible Ink from Herodotus to Al-Qaeda. Yale University Press. ISBN978-0300179255.
^Kao, I Lung (2019). Effective and Efficient Authentication and Authorization in Distributed Systems. University of Florida. ISBN978-0530003245.
^ICT School (2019). Hacking Tools for Computers. ICT School. ISBN9781088521588.