Loading the player...

What is 'Cybersecurity'

Cybersecurity refers to the measures taken to keep electronic information private and safe from damage or theft. It is also used to make sure these devices and data are not misused. Cybersecurity applies to both software and hardware, as well as information on the Internet, and can be used to protect everything from personal information to complex government systems.

(See Also: 7 Cybersecurity Tips for Financial Advisors.)

BREAKING DOWN 'Cybersecurity'

Cybersecurity measures are put in place because any information stored on a computer or electronic device or on the Internet can be hacked, and with the proper measures in place, this can be prevented. As the world is more reliant on computers than ever before, cybersecurity has become essential. In order to ensure that a system is secure, one must understand the risks and vulnerabilities inherent to that specific device or network and whether or not these vulnerabilities are exploitable.

Types of Cyber Attacks

Threats to a computer system are classified by the method used to attack. While there are many types of cyber attacks, some of the most common types include:

  • Backdoor attacks: Exploits any alternate methods of accessing a system that don't require the usual methods of authentication. Some systems come with these backdoors by design, while others result from error.
  • Denial-of-service attacks: Prevents the rightful user from accessing the system. A common method of doing this is entering a wrong password enough times that the account is locked.
  • Direct-access attacks: Includes bugs and viruses, which gain access to a system and copy its information and/or modify the system.

Examples of Cybersecurity Measures

Cybersecurity ranges from simple to complex. As a basic preventive measure, most devices come equipped with password protection to prevent hacking. If a system is attacked or at risk of an attack, specific measures might be taken depending on the type of attack. For example, disk encryption is one way to prevent direct-access attacks. 

In order to be effective, cybersecurity measures must constantly adjust to new technologies and developments. Hackers adapt their methods to new forms of cybersecurity and render it ineffective, so the security programs must stay one step ahead.

Common Targets of Cyberattacks

While any individual system is at some level of cyber-attack risk, larger entities such as businesses and government systems are often the targets of these attacks. The Department of Homeland Security uses high-tech cybersecurity measures to protect sensitive government information from other countries, nation-states, and individual hackers. Any financial system that stores credit card information from its users is at a high risk, since hackers can directly steal money from people by accessing these accounts. Large businesses are often attacked, as they store personal information about their large network of employees. Other targets include systems that control infrastructures, such as telecommunications and energy networks, as attackers seek to control this equipment.

RELATED TERMS
  1. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack ...
  2. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, ...
  3. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  4. Supply Chain Attack

    A supply chain attack is a cyberattack that attempts to inflict ...
  5. Bank Wire

    A bank wire is an electronic message system, which allows major ...
  6. Accounting Information System - ...

    An accounting information system is the collection, storage and ...
Related Articles
  1. Investing

    13 Ways to Invest in Cybersecurity

    Rarely a week goes by without a new media story about data breaches, hacking schemes or cyber attacks impacting individuals, companies and even governments. Four top investment experts who contribute ...
  2. Tech

    How to Avoid Human Errors in Cybersecurity

    There is a significant human element to cybersecurity that shouldn't be ignored.
  3. Investing

    Investors Rally to Cybersecurity (HACK, SYMC)

    With cybercrime and IoT on the rise globally, the demand for security solutions continues to skyrocket, proving upside for cybersecurity ETFs and leaders.
  4. Personal Finance

    How Cyber Security Risks Impact Your Bank

    Here's how cyber security risks mean for the financial industry and consumers.
  5. Insights

    Top Cyber Security Risks for Financial Advisors

    Cyber crime is on the rise. Here's what advisory firms, big and small, need to be aware of and how to prepare.
  6. Investing

    Palo Alto Networks Releases Cybersecurity Guide

    A new publication for organizations in Singapore aims to help leaders defend against cyberattacks.
  7. Tech

    Are Cybersecurity Stocks On Sale? (HACK)

    Cybersecurity stocks may be on sale, providing an opportunity for value investors. A high-profile attack or two could benefit the Cyber Security ETF (HACK)
  8. Financial Advisor

    Your Financial Advisory Firm Has Been Hacked. Now What?

    Taking the right steps following a cyber attack can mitigate the impact on clients.
  9. Managing Wealth

    High Net Worth Investors Are Worried About Cybersecurity

    Many wealthy investors are more afraid of cybersecurity attacks than acts of terrorism.
  10. Trading

    How to Trade the Rise in Cybersecurity Stocks

    Strategic traders are using bullish price action on cybersecurity-related ETFs as a sign that prices are headed higher.
RELATED FAQS
  1. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  2. What are the risks associated with investing in the banking sector?

    Find out about the risks associated with investing in the banking sector including liquidity, risk management, consumer protection ... Read Answer >>
  3. Is Apple Pay safe and free?

    Learn more about Apple Pay, one of Apple's newest and most metamorphic programs that is changing the way consumers purchase ... Read Answer >>
  4. What is the Difference Between a Capitalist System and a Free Market System?

    Learn the main differences between capitalism and a free market system and how these economic systems function. Read Answer >>
  5. Systemic versus systematic risk: What's the difference?

    Systemic risk generally refers to an event that can trigger a collapse in a certain industry or economy as systematic risk ... Read Answer >>
Hot Definitions
  1. Treasury Yield

    Treasury yield is the return on investment, expressed as a percentage, on the U.S. government's debt obligations.
  2. Return on Assets - ROA

    Return on assets (ROA) is an indicator of how profitable a company is relative to its total assets.
  3. Fibonacci Retracement

    A term used in technical analysis that refers to areas of support (price stops going lower) or resistance (price stops going ...
  4. Ethereum

    Ethereum is a decentralized software platform that enables SmartContracts and Distributed Applications (ĐApps) to be built ...
  5. Cryptocurrency

    A digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of ...
  6. Financial Industry Regulatory Authority - FINRA

    A regulatory body created after the merger of the National Association of Securities Dealers and the New York Stock Exchange's ...
Trading Center