What Is Cyber Security? The Facts You Need to Know About This Fast-Growing Field

what is cyber security

Like it or not, we live in a digital world. As a result of widespread technology and connectivity, millions of people have converted important information about their lives into data that is used for a myriad of legitimate reasons.

Unfortunately, this data is also valuable to hackers and other less-than-savory characters looking to make money or cause havoc in our world. Cyber security—also known as information security—is the response to keep these forces in check.

But what is cyber security, exactly? Join us as we dive deeper into this growing sector of technology, explaining why it’s important and what can be done to help keep our data and systems secure.

What is cyber security?

So what is cyber security? Simply put, cyber security refers to the measures taken to keep systems secure. Adnan Raja, vice president of marketing for Atlantic.Net, offers a broader explanation, defining cyber security as the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve protection.

No matter how you define it, the intent is clear—to keep information and systems accessible to only the people who should have access.

Why is cyber security so important?

Would you like your health records, bank passwords, text messages, personal emails or other private information published online or put into the hands of organized crime? Probably not, as we all have an expectation of privacy and security in our lives.

But let’s look beyond just the potential for harm to an individual. Cybercrime and security breaches are a worldwide problem with widespread costs and consequences. One McAfee report estimates cybercrime may cost the world’s economy almost $600 billion—about .8 percent of global gross domestic product (GDP).1 That’s a tremendous loss of potential and a drain on the world’s economic production.

Cybercrime isn’t just an inconvenience for businesses, but it also poses a massive national security threat. Imagine the mayhem if a hostile group launched an exploit that wreaked havoc on our electrical grid, weapons or any number of the essential systems keeping our lives humming along safely. It’s enough to keep cyber security professionals up at night.

Nick Santora, CEO of Curricula says it affects everyone. “As we become more and more connected to devices, the internet plays a tremendous role in making our lives better, but it also introduces unknown risks,” he explains. “From hacking vehicles, energy plants, medical equipment and bank accounts, cyber security plays a role in everyone’s lives.”

What are some common cyber security threats?

There are many tactics cyber criminals use to attack companies and individuals. In 2017, a series of ransomware attacks made global news when hackers crippled tens of thousands of computers around the world by holding them “hostage” with payment demands to regain access. Raja thinks crimes like ransomware are getting easier to commit.

“The multimillion-dollar ransomware industry has grown and will continue to grow with amazing speed in the years to come,” Raja says. “This is in part due to the spread of untraceable cryptocurrency such as Bitcoin and the proliferation of ransomware kits on the dark web, which allows anybody to put together and reap the financial rewards of ransomware attacks.”

Other times, crimes can be more straightforward, like when cyber criminals go directly to the person using a method called phishing. This is an attack that misleads victims to click on malicious links or share personal information. These phishing attacks are often sophisticated and seem credible at first glance. An email that appears to come from your bank’s customer service department asking you to change your password is one example of phishing.

Another common criminal tactic that requires almost zero computer work is social engineering. Social engineering occurs when scammers contact an individual via phone with the goal of getting them to reveal details about themselves. This information can be handed off to a hacker who will then use it to exploit their computer systems.

Who’s fighting back against cyber security threats?

At the front lines of the fight for cyber security are information security analysts, who work behind the scenes to devise and carry out security measures for businesses and organizations. Given the attention-grabbing headlines of late, it might not surprise you to find employers devoting more resources to cyber security. In fact, jobs for information security analysts are projected to grow 28 percent from 2016 to 2026, according to the Bureau of Labor Statistics (BLS).2

What exactly do these professionals do to protect their organizations against these crimes? “Cyber security experts have to prioritize risks of all types including low-risk, high-impact events and high-probability, low-impact events,” Santora explains. “Examining threats from every angle and using the available resources to defend against those threats are an important part of any cyber security expert’s job.”

In their work, analysts will test their organization’s networks for vulnerabilities, help develop security policies, train users on proper security measures as well as monitor networks and respond to security breaches.

There are also a number of practical ways organizations and individuals can protect themselves from cybercrimes like ransomware attacks. Companies and organizations need to properly train employees on how to recognize and avoid suspicious links or email attachments. They also need to set high standards for password protection—including multi-factor authentication—to keep systems secure. Additionally, Raja says autonomous offsite backup of data is a must for minimizing damage in the event of a breach.

What can be done to help?

Here’s the truth—even the best team of cyber security professionals can’t stop it all on their own. They need everyone to pitch in and be more vigilant. Santora believes we all need to be more aware of the breadth and depth of cyberattacks to truly arm ourselves against them.

“Many times, people think of a cyber security attack as coming inside the perimeter of a computer network and breaking in,” Santora says. “This does happen, but it is not always the case.”

Sometimes, decreasing our vulnerability just means being a little more aware of the risks. “More frequently, attacks occur because of human error or ignorance of what a good process or procedure is for handling sensitive or personal data,” he adds.

Interested in a cyber security career?

Does protecting organizations from hackers and educating employees on security issues sound like it’s up your alley? Maybe it’s time to learn more about what it’s like to work in cyber security. To further explore this growing career field, check out our article, “5 Things You Should Know About a Career in Cyber Security.”

1McAfee, Center for Strategic and International Studies, Economic Impact of Cybercrime—No Slowing Down, [Information accessed June 15, 2018] https://csis-prod.s3.amazonaws.com/s3fs-public/publication/economic-impact-cybercrime.pdf
2Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, [career information accessed June 15, 2018] www.bls.gov/ooh/. This represents national, averaged data for the occupations listed and includes workers at all levels of education and experience. Employment conditions in your area may vary.

Will Erstad

Will is a Sr. Content Specialist at Collegis Education. He researches and writes student-focused articles on a variety of topics for Rasmussen College. He is passionate about learning and enjoys writing engaging content to help current and future students on their path to a rewarding education.


Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college.

Add your comment


Please enter your name.


Please enter your email.


Please enter your comment.


Take the Next Step—Talk to Us!

There are some errors in the form. Please correct the errors and submit again.

Request More Information

Talk with a program manager today.

Fill out the form to receive information about:
  • Program Details and Applying for Classes 
  • Financial Aid and FAFSA (for those who qualify)
  • Customized Support Services
  • Detailed Program Plan

Step 1 of 3

What's Your Name?

Please enter your first name.

Please enter your last name.

Step 2 of 3

Contact Information

Please enter your email address.

Please enter your phone number.

Please enter your five digit zip code.

Step 3 of 3

Program Preferences

Please choose a school of study.

Please choose a program.

Please choose a degree.

The program you have selected is not available in your area. Please select another program of interest.

By requesting information, I authorize Rasmussen College to contact me by email, phone or text message at the number provided. There is no obligation to enroll.

icon-colored-advance icon-colored-build icon-colored-certificate icon-colored-continual-developement icon-colored-growth icon-colored-national icon-colored-prep icon-colored-regional icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-laptop icon-general-leader icon-general-map icon-general-paperwork icon-general-phone icon-general-speak-out icon-camera icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-share-square-o icon-spinner icon-tag logo-accreditation-acen logo-accreditation-ccne ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x