You are here

Cyber Security and Privacy

Description:

This subtopic focuses on information technology innovations that protect networks and devices against cyber-attack, or protect data and user information against compromise.

Examples of relevant technical fields include (but are not limited to): big data security; data/network analytics to detect cyber vulnerabilities and cyber-attacks; human factors analytics - to assess people risk; mobile device security; devicecloud security infrastructure; cloud computing security; security/privacy policy compliance; security for BYOD (bring-your-own device) and BYOC (bring-your-own-cloud); security for the Internet of Things (IoT), from industrial IoT settings to smart homes to wearable devices; data loss prevention; information assurance; data integrity; encryption; key generation, key management and key distribution; access authorization; identity management; personal authentication - biometrics, multi-factor authentication.

US Flag An Official Website of the United States Government