Angel Berniz 206 Questions 8 Answers 0 Best Answers 2287 Points View Profile 1 Angel Berniz CybersecurityLearner Asked: January 28, 2019 What is Cybersecurity? 1 What is Cybersecurity?5 (100%) 2 vote[s] How would you define Cybersecurity in plain words? ShareTweetShare0 Shares Share Facebook 3 Answers Voted Oldest Recent Tarek Mahran 4 Questions 20 Answers 0 Best Answers 268 Points View Profile Tarek Mahran CybersecurityLearner Added an answer on March 17, 2019 at 7:26 pm Computer security, cybersecurity or information technology security is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. 1 Login to Reply Share Share Share on Facebook Share on Twitter Share on WhatsApp QAF Saudi Arabia 2 Questions 3 Answers 0 Best Answers 42 Points View Profile qaf CybersecurityLearner Added an answer on February 3, 2019 at 12:14 pm Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. Major areas covered in cyber security i.e Application Security, Information Security Disaster recovery, Network Security . Cyber Security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals. 0 Login to Reply Share Share Share on Facebook Share on Twitter Share on WhatsApp Ashish Jaiswal 32 Questions 69 Answers 1 Best Answers 795 Points View Profile Ashish Jaiswal CybersecurityLearner Added an answer on January 29, 2019 at 6:17 am Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. The core functionality of cybersecurity involves protecting information and systems from major cyberthreats. These cyberthreats take many forms (e.g., application attacks, malware, ransomware, phishing, exploit kits). 0 Login to Reply Share Share Share on Facebook Share on Twitter Share on WhatsApp Leave an answerCancel replyYou must login or register to add a new answer.