The focus is on ensuring that the software and devices are free from threats.
The focus is to protect websites from cyber security risk and attack.
Involves the decisions and processes for handling and protecting data assets.
Maintain integrity and privacy of information, both in storage and in transit.
Enables organizations to protect their servers, workstations, and mobile devices from remote and local cyber-attacks.
Prevents Internet attacks targeted at browsers, network, operating systems, and other applications
The practice of securing network infrastructure from unauthorized access and any other modification that will render the network infrastructure useless.
Defines how organization reacts to cyber security incident or other similar events that result in data losses and operation breakdown.