You are on page 1of 3

Security Assignment

Supervised By

Dr Mohamed Abo Rizka

Prepared By
Saif Allah Mohamed Bakry
what is the difference between computer security &
information security & network security & cybersecurity?

Points of
Computer security Cybersecurity
difference
Cybersecurity is the practice of securing
Computer security is the
systems, networks, and programs
safeguarding of computer
systems and information against digital attacks. Cybersecurity
against danger, theft, and techniques include methods for
Definition unauthorized use. It is the
assisting and securing various digital
process of detecting and
avoiding unauthorized components. Unauthorized digital
computer usage on your access to networks, data, and computer
system.
systems

1. Application 1. Critical infrastructure security


Security 2. Application security
2. Internet Security 3. Network security
Types
3. Endpoint Security
4. mobile device 4. Cloud security
security 5. Internet of Things (IoT) security
Provides security from
Scope Provides security from external threats
internal threats
To ensure electronic data is
To ensure integrity, confidentiality, and
not attacked, stolen, or
Goal availability of data within an
compromised by cyber
organization
thieves

2|Page
Points of
Information security Network Security
difference

It helps to safeguard data


against unauthorized users, It safeguards data as it
Data
travels across the network
access, and modification

It is a subcategory both for It is a subset of cyber


Part of
cyber and network security security

Information security applies to It protects anything in the


Protection
all types of information network realm

It is concerned with the


It is concerned with the
Attack protection of data from any
prevention of DOS attacks
type of threat

It protects against
unauthorized access, Network Security takes
Scope
modification of disclosure, and action against trojans
disruption

It ensures confidentiality, It provides security over


Usage
integrity, and accessibility the network only
It is concerned with
information assets as well as It protects data sent across
Deals with
their integrity, confidentiality, the network by terminals
and availability.

3|Page

You might also like