You are here

Cybersecurity; Authentication; Privacy

Description:

IT4. Cybersecurity; Authentication; Privacy

This subtopic is intended to cover the major aspects of security related to the internet (except for Internet of Things cybersecurity, which is covered under subtopic IT5).

Cybersecurity refers to security applied both to the internet (including servers and connected devices) and to data stored in or transmitted over the internet. Generally this refers to security against malicious attacks rather than security against (for example) inadvertent data leakage. Cybersecurity is growing in importance due to a confluence of factors, including (i) increased use of the internet to monitor and control critical infrastructure, (ii) increased incidence of cyber-attacks against government and major institutions, (iii) the growing reliance by the general public on internet-based services.

Authentication refers to the reliable authentication of persons using the internet and devices connected to the internet, while privacy refers to the protection against compromise of personal information and user data.

Examples of relevant technical fields include (but are not limited to): detection of cyber vulnerabilities – for example, related to critical infrastructure or financial networks; detection and prevention of cyber-attacks; human factors analytics – to assess people risk; mobile device security; device-cloud security infrastructure; cloud computing security; security/privacy policy compliance; security for BYOD (bring-your-own device) and BYOC (bring-your-own-cloud); big data security; data loss prevention; information assurance; data integrity; encryption; key generation, key management and key distribution; access authorization; identity management; personal authentication – biometrics, multi-factor authentication.

US Flag An Official Website of the United States Government