The topic of cybersecurity encompasses sets of standards, procedures and tools whose aim it is to ensure the availability, integrity, confidentiality and proper use of information that resides in an information system. Achieving security in a networked environment requires being able to identify and eliminate vulnerabilities.
These procedures include defining hours of operation, restrictions based on location, approvals, denials, user profiles, emergency plans, protocols and anything else necessary that allows a good level of security while also minimizing the impact upon the organization and the worker, and especially the impact of using applications developed by the programmers.
The rapid growth of information technology has brought with it an exponential growth of cyber threats that businesses must address. Included among the most obvious risks are computer fraud, espionage, piracy, hacking, sabotage, stealing computer services, resource saturation, and data theft, among others. But there are other risks associated with cybersecurity such as low productivity, misuse of resources, accidental leaks of confidential information, copying of information onto unauthorized media, damage to the corporate image, non-compliance with regulations, and the unnecessarily high demands often put on support personnel.
Cybersecurity is designed to protect information assets like:
It is fundamental for warehousing and managing information, as well as for the very functioning of the organization. The role of cybersecurity with regard to IT Infrastructure is to ensure that the equipment is working properly, and to anticipate faults, theft, fire, boycotts, natural disasters, power failures or any other factor that might threaten the infrastructure.
They are the people who use the communications infrastructure and who manage the information. The system must have overall protection so that its use by users does not raise doubts about the vulnerability of data during its handling or storage.
It is the most important business asset and resides in the IT Infrastructure and is utilized by users.