Cyber security, also known as information technology security, is the practice of protecting electronic information by mitigating information risks and vulnerabilities. Information risks can include unauthorized access, use, disclosure, interception, or destruction of data. Data can include, but is not limited to, the confidential information of business or individual users.Unauthorized access to data can lead to information theft, fraud, or other malicious activity. Data interception can lead to eavesdropping, data leakage, or denial of service attacks. Data destruction can lead to data loss, service interruption, or destruction of critical infrastructure.cyber security seeks to protect electronic information from unauthorized access, use, disclosure, interception, or destruction. Cyber security includes the procedures and technologies used to protect networks, computers, and data from attack, damage, or unauthorized access.Data security, also known as information security, is the practice of protecting electronic information from unauthorized access, use, disclosure, interception, or destruction. Data security includes the procedures and technologies used to protect networks, computers, and data from attack, damage, or unauthorized access.Network security is the practice of protecting a computer network from unauthorized access or damage. Network security includes the procedures and technologies used to protect networks, computers, and data from attack, damage, or unauthorized access.Computer security, also known as cybersecurity or IT security, is the practice of protecting electronic information from unauthorized access, use, disclosure, interception, or destruction. Computer security includes the procedures and technologies used to protect networks, computers, and data from attack, damage, or unauthorized access.