Loading the player...

What is 'Cybersecurity'

Cybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems.

(See Also: 7 Cybersecurity Tips for Financial Advisors.)

BREAKING DOWN 'Cybersecurity'

Cybersecurity measures are put in place because any information stored on a computer or electronic device or on the Internet can be hacked, and with the proper measures in place, this can be prevented. As the world is more reliant on computers than ever before, cybersecurity has become essential. In order to ensure that a system is secure, one must understand the risks and vulnerabilities inherent to that specific device or network and whether or not these vulnerabilities are exploitable.

Types of Cyber Attacks

Threats to a computer system are classified by the method used to attack. While there are many types of cyber attacks, some of the most common types include:

  • Backdoor attacks: Exploits any alternate methods of accessing a system that don't require the usual methods of authentication. Some systems come with these backdoors by design, while others result from error.
  • Denial-of-service attacks: Prevents the rightful user from accessing the system. A common method of doing this is entering a wrong password enough times that the account is locked.
  • Direct-access attacks: Includes bugs and viruses, which gain access to a system and copy its information and/or modify the system.

Examples of Cybersecurity Measures

Cybersecurity ranges from simple to complex. As a basic preventive measure, most devices come equipped with password protection to prevent hacking. If a system is attacked or at risk of an attack, specific measures might be taken depending on the type of attack. For example, disk encryption is one way to prevent direct-access attacks. 

In order to be effective, cybersecurity measures must constantly adjust to new technologies and developments. Hackers adapt their methods to new forms of cybersecurity and render it ineffective, so the security programs must stay one step ahead.

Common Targets of Cyberattacks

While any individual system is at some level of cyber-attack risk, larger entities such as businesses and government systems are often the targets of these attacks. The Department of Homeland Security uses high-tech cybersecurity measures to protect sensitive government information from other countries, nation-states, and individual hackers. Any financial system that stores credit card information from its users is at a high risk, since hackers can directly steal money from people by accessing these accounts. Large businesses are often attacked, as they store personal information about their large network of employees. Other targets include systems that control infrastructures, such as telecommunications and energy networks, as attackers seek to control this equipment.

RELATED TERMS
  1. Mobile Banking

    Mobile banking is the act of making financial transactions on ...
  2. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  3. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  4. 51% Attack

    51% attack refers to an attack on a blockchain by a group of ...
  5. Direct Deposit

    Direct deposit is the deposit of electronic funds directly into ...
  6. Bank Wire

    A bank wire is an electronic message system, which allows major ...
Related Articles
  1. Investing

    13 Ways to Invest in Cybersecurity

    Rarely a week goes by without a new media story about data breaches, hacking schemes or cyber attacks impacting individuals, companies and even governments. Four top investment experts who contribute ...
  2. Tech

    How to Avoid Human Errors in Cybersecurity

    There is a significant human element to cybersecurity that shouldn't be ignored.
  3. Tech

    Financial Advisors Are Feeling Cyber-insecure

    Financial advisors are increasingly fretting over cybersecurity and client data breaches. Here's what they and their clients should watch out for.
  4. Tech

    2 Cybersecurity ETFs to Consider (CIBR, HACK)

    Consider these two cybersecurity ETFs. Cybercrime is among the the top five global risks, and the cybersecurity market is growing at double-digit rates.
  5. Investing

    Palo Alto Networks Releases Cybersecurity Guide

    A new publication for organizations in Singapore aims to help leaders defend against cyberattacks.
  6. Tech

    Are Cybersecurity Stocks On Sale? (HACK)

    Cybersecurity stocks may be on sale, providing an opportunity for value investors. A high-profile attack or two could benefit the Cyber Security ETF (HACK)
  7. Investing

    Terrorism's Effects on Wall Street

    Terrorist activity tends to have a negative impact on the markets, but just how much? Find out how to take cover.
  8. Trading

    How to Trade the Rise in Cybersecurity Stocks

    Strategic traders are using bullish price action on cybersecurity-related ETFs as a sign that prices are headed higher.
  9. Investing

    Cybersecurity Earnings Season: What to Look For

    Industry pioneers seek new growth in the emerging segments, while old guard buys up smaller rivals.
  10. Financial Advisor

    Don't Hide From The Reality Of How Terrorism Affects The Economy

    After major terror attacks, most people don't want to think about economics. But the post-terror economy affects the lives of the whole world, so it's important to be knowledgeable.
RELATED FAQS
  1. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  2. What is the Difference Between a Capitalist System and a Free Market System?

    Learn how capitalism and free market systems work, along with their differences. Read Answer >>
  3. What are the main advantages and disadvantages to the cost accounting method?

    Read a brief overview of the main advantages and disadvantages of the cost accounting method as it relates to business analysis ... Read Answer >>
  4. What are the most important aspects of a capitalist system?

    Understand the main aspects of a capitalist system and how they contrast with the tenets of other types of economic systems, ... Read Answer >>
Hot Definitions
  1. Futures Contract

    An agreement to buy or sell the underlying commodity or asset at a specific price at a future date.
  2. Yield Curve

    A yield curve is a line that plots the interest rates, at a set point in time, of bonds having equal credit quality, but ...
  3. Portfolio

    A portfolio is a grouping of financial assets such as stocks, bonds and cash equivalents, also their mutual, exchange-traded ...
  4. Gross Profit

    Gross profit is the profit a company makes after deducting the costs of making and selling its products, or the costs of ...
  5. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
  6. Intrinsic Value

    Intrinsic value is the perceived or calculated value of a company, including tangible and intangible factors, and may differ ...
Trading Center