0% found this document useful (0 votes)
99 views

Security Assignment

This document compares and contrasts computer security, cybersecurity, information security, and network security. It defines each term and outlines their key differences in areas such as scope, goals, threats addressed, and the types of assets protected. Computer security focuses on securing individual systems, while cybersecurity takes a broader view of securing entire digital infrastructures. Information security protects all types of data, and network security specifically safeguards data as it travels across networks.

Uploaded by

Saif Bakry
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Security Assignment

This document compares and contrasts computer security, cybersecurity, information security, and network security. It defines each term and outlines their key differences in areas such as scope, goals, threats addressed, and the types of assets protected. Computer security focuses on securing individual systems, while cybersecurity takes a broader view of securing entire digital infrastructures. Information security protects all types of data, and network security specifically safeguards data as it travels across networks.

Uploaded by

Saif Bakry
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Security Assignment

Supervised By

Dr Mohamed Abo Rizka

Prepared By
Saif Allah Mohamed Bakry
what is the difference between computer security &
information security & network security & cybersecurity?
Points of
differenc Computer security Cybersecurity
e
Cybersecurity is the practice of securing
Computer security is the
systems, networks, and programs
safeguarding of computer
systems and information against digital attacks. Cybersecurity
against danger, theft, and techniques include methods for
Definition unauthorized use. It is the
assisting and securing various digital
process of detecting and
avoiding unauthorized components. Unauthorized digital
computer usage on your access to networks, data, and computer
system.
systems

1. Application 1. Critical infrastructure security


Security 2. Application security
2. Internet Security
Types 3. Network security
3. Endpoint Security
4. mobile device 4. Cloud security
security 5. Internet of Things (IoT) security
Provides security from
Scope Provides security from external threats
internal threats
To ensure electronic data is
To ensure integrity, confidentiality, and
not attacked, stolen, or
Goal availability of data within an
compromised by cyber
organization
thieves

2|Page
Points of
Information security Network Security
difference

It helps to safeguard data


It safeguards data as it
Data against unauthorized users,
travels across the network
access, and modification

It is a subcategory both for It is a subset of cyber


Part of
cyber and network security security

Information security applies to It protects anything in the


Protection
all types of information network realm

It is concerned with the


It is concerned with the
Attack protection of data from any
prevention of DOS attacks
type of threat

It protects against
unauthorized access, Network Security takes
Scope
modification of disclosure, and action against trojans
disruption

It ensures confidentiality, It provides security over


Usage
integrity, and accessibility the network only
It is concerned with
information assets as well as It protects data sent across
Deals with
their integrity, confidentiality, the network by terminals
and availability.

3|Page

You might also like