10 Management of Information Security, 5th Edition © Cengage Learning Parameters CYBER SECURITY INFORMATION SECURITY Defence Acts as first line of defence. Comes into play when security is breached. Threats Primarily deals with digital threats, such as hacking, malware, and phishing Addresses a wider range of threats, including physical theft, espionage, and human error Goal Protects against unauthorized access, use, disclosure, disruption, modification, or destruction of digital information Protects the confidentiality, integrity, and availability of all types of information, regardless of the medium in which it is stored Technologies Relies on a variety of technologies, such as firewalls, antivirus software, and intrusion detection systems Uses a range of technologies, including encryption, access controls, and data loss prevention tools Skills required Requires specialized knowledge of computer systems and networks, as well as programming and software development skills Requires knowledge of risk management, compliance, legal and regulatory issues, as well as technical knowledge Focus on data Emphasizes protecting the data itself, regardless of where it is stored or how it is transmitted Emphasizes the protection of information assets, which includes data but also other information such as intellectual property, trade secrets, and confidential customer information Threat landscape Deals with constantly evolving threats, such as new forms of malware and emerging cybercrime techniques Deals with a wide range of threats, including physical security breaches, insider threats, and social engineering attacks