{"id":3710,"date":"2024-05-24T08:59:08","date_gmt":"2024-05-24T08:59:08","guid":{"rendered":"https:\/\/selitys.fi\/what-is-cyber-security\/"},"modified":"2024-05-24T08:59:08","modified_gmt":"2024-05-24T08:59:08","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/","title":{"rendered":"What is cyber security?"},"content":{"rendered":"<p>Cyber \u200b\u200bsecurity is a broad and complex concept that covers all measures and technologies aimed at protecting information systems, networks and data from cyber threats. Cyber \u200b\u200bthreats can be, for example, hacking, data breaches, malware, denial-of-service attacks and other similar actions that can endanger the confidentiality, integrity and availability of data.<\/p>\n<h2>What does cyber security include?<\/h2>\n<p>Cyber \u200b\u200bsecurity consists of several different areas, which together form a comprehensive protection against cyber threats. These areas include:<\/p>\n<ul>\n<li><b>Network security:<\/b> Measures to protect information networks and information passing through them. This includes things like firewalls, intrusion detection systems and VPN connections.<\/li>\n<li><b>Software security:<\/b> Measures related to the development and use of software aimed at preventing the exploitation of vulnerabilities. This includes, for example, regular updates and security testing.<\/li>\n<li><b>Information security:<\/b> Measures to protect information throughout its entire life cycle. This includes things like encryption, backup and access control.<\/li>\n<li><b>Operational security:<\/b> Measures to ensure that the day-to-day operations of an organization are secure. This includes, for example, user training and adherence to safety protocols.<\/li>\n<\/ul>\n<h2>Why is cyber security important?<\/h2>\n<p>Cyber \u200b\u200bsecurity is important for many reasons:<\/p>\n<ol>\n<li><b>Confidentiality:<\/b> Cyber \u200b\u200bsecurity ensures that sensitive information remains protected and only accessible to authorized persons.<\/li>\n<li><b>Integrity:<\/b> Cyber \u200b\u200bsecurity prevents unauthorized modification or destruction of data, which is critical for data reliability.<\/li>\n<li><b>Availability:<\/b> Cyber \u200b\u200bsecurity ensures that information systems and services are available when they are needed.<\/li>\n<li><b>Business continuity:<\/b> Cyber \u200b\u200bsecurity helps organizations protect themselves from cyber attacks that could cause significant financial losses and reputational damage.<\/li>\n<\/ol>\n<h2>Challenges of cyber security<\/h2>\n<p>Cyber \u200b\u200bsecurity is an ever-evolving field, with many challenges:<\/p>\n<ul>\n<li><b>Emergence of new threats:<\/b> Cyber \u200b\u200bthreats are constantly evolving, and new methods of attack are constantly being invented. This requires constant vigilance and updates to protective measures.<\/li>\n<li><b>Complex systems:<\/b> Current information systems are often very complex, which makes protecting them challenging.<\/li>\n<li><b>Human activity:<\/b> Human errors and carelessness are often the biggest data security risk. This highlights the importance of education and awareness raising.<\/li>\n<\/ul>\n<h2>Sources<\/h2>\n<p>You can find more information about cyber security from the following sources:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/topics\/cybersecurity-education\" target=\"_blank\" rel=\"noopener\">ENISA &#8211; Cybersecurity Education<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/cybersecurity\" target=\"_blank\" rel=\"noopener\">CISA &#8211; Cybersecurity<\/a><\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/section\/about-ncsc\/what-is-cyber-security\" target=\"_blank\" rel=\"noopener\">NCSC &#8211; What is Cyber \u200b\u200bSecurity?<\/a ><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cyber \u200b\u200bsecurity is a broad and complex concept that covers all measures and technologies aimed at protecting information systems, networks and data from cyber threats. Cyber \u200b\u200bthreats can be, for example, hacking, data breaches, malware, denial-of-service attacks and other similar actions that can endanger the confidentiality, integrity and availability of data. What does cyber security&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2431,1974],"tags":[],"class_list":["post-3710","post","type-post","status-publish","format-standard","hentry","category-security-issues","category-technology-issues"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is cyber security? | Selitys.fi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/selitys.fi\/en\/what-is-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cyber security? | Selitys.fi\" \/>\n<meta property=\"og:description\" content=\"Cyber \u200b\u200bsecurity is a broad and complex concept that covers all measures and technologies aimed at protecting information systems, networks and data from cyber threats. Cyber \u200b\u200bthreats can be, for example, hacking, data breaches, malware, denial-of-service attacks and other similar actions that can endanger the confidentiality, integrity and availability of data. What does cyber security&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/selitys.fi\/en\/what-is-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Selitys.fi\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-24T08:59:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/selitys.fi\/wp-content\/uploads\/2024\/02\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Tapio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tapio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/\"},\"author\":{\"name\":\"Tapio\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#\\\/schema\\\/person\\\/0848ac8101ca66b44e7db38e353fd5a5\"},\"headline\":\"What is cyber security?\",\"datePublished\":\"2024-05-24T08:59:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/\"},\"wordCount\":354,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#organization\"},\"articleSection\":[\"Security issues\",\"Technology issues\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/\",\"url\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/\",\"name\":\"What is cyber security? | Selitys.fi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#website\"},\"datePublished\":\"2024-05-24T08:59:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/what-is-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/selitys.fi\\\/en\\\/etusivu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is cyber security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/selitys.fi\\\/en\\\/\",\"name\":\"Suomalaiset sananlaskut\",\"description\":\"Vastaukset kysymyksiisi\",\"publisher\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/selitys.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#organization\",\"name\":\"Suomalaiset sananlaskut\",\"url\":\"https:\\\/\\\/selitys.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/selitys.fi\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp\",\"contentUrl\":\"http:\\\/\\\/selitys.fi\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp\",\"width\":1024,\"height\":1024,\"caption\":\"Suomalaiset sananlaskut\"},\"image\":{\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/selitys.fi\\\/en\\\/#\\\/schema\\\/person\\\/0848ac8101ca66b44e7db38e353fd5a5\",\"name\":\"Tapio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g\",\"caption\":\"Tapio\"},\"sameAs\":[\"http:\\\/\\\/selitys.fi\"],\"url\":\"https:\\\/\\\/selitys.fi\\\/en\\\/author\\\/tapio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is cyber security? | Selitys.fi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What is cyber security? | Selitys.fi","og_description":"Cyber \u200b\u200bsecurity is a broad and complex concept that covers all measures and technologies aimed at protecting information systems, networks and data from cyber threats. Cyber \u200b\u200bthreats can be, for example, hacking, data breaches, malware, denial-of-service attacks and other similar actions that can endanger the confidentiality, integrity and availability of data. What does cyber security&hellip;","og_url":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/","og_site_name":"Selitys.fi","article_published_time":"2024-05-24T08:59:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/selitys.fi\/wp-content\/uploads\/2024\/02\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp","type":"image\/webp"}],"author":"Tapio","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tapio","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/#article","isPartOf":{"@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/"},"author":{"name":"Tapio","@id":"https:\/\/selitys.fi\/en\/#\/schema\/person\/0848ac8101ca66b44e7db38e353fd5a5"},"headline":"What is cyber security?","datePublished":"2024-05-24T08:59:08+00:00","mainEntityOfPage":{"@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/"},"wordCount":354,"commentCount":0,"publisher":{"@id":"https:\/\/selitys.fi\/en\/#organization"},"articleSection":["Security issues","Technology issues"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/","url":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/","name":"What is cyber security? | Selitys.fi","isPartOf":{"@id":"https:\/\/selitys.fi\/en\/#website"},"datePublished":"2024-05-24T08:59:08+00:00","breadcrumb":{"@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/selitys.fi\/en\/what-is-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/selitys.fi\/en\/what-is-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/selitys.fi\/en\/etusivu\/"},{"@type":"ListItem","position":2,"name":"What is cyber security?"}]},{"@type":"WebSite","@id":"https:\/\/selitys.fi\/en\/#website","url":"https:\/\/selitys.fi\/en\/","name":"Suomalaiset sananlaskut","description":"Vastaukset kysymyksiisi","publisher":{"@id":"https:\/\/selitys.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/selitys.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/selitys.fi\/en\/#organization","name":"Suomalaiset sananlaskut","url":"https:\/\/selitys.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/selitys.fi\/en\/#\/schema\/logo\/image\/","url":"http:\/\/selitys.fi\/wp-content\/uploads\/2024\/02\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp","contentUrl":"http:\/\/selitys.fi\/wp-content\/uploads\/2024\/02\/DALL\u00b7E-2024-02-22-14.56.12-Create-an-icon-representing-Finnish-Proverbs-for-a-website.-The-icon-should-visually-capture-the-essence-of-Finnish-culture-and-tradition-incorpora.webp","width":1024,"height":1024,"caption":"Suomalaiset sananlaskut"},"image":{"@id":"https:\/\/selitys.fi\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/selitys.fi\/en\/#\/schema\/person\/0848ac8101ca66b44e7db38e353fd5a5","name":"Tapio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/841e72698e94eda1dbb61e1780060ec9d71d27993408a3d1dce683339a1f9243?s=96&d=mm&r=g","caption":"Tapio"},"sameAs":["http:\/\/selitys.fi"],"url":"https:\/\/selitys.fi\/en\/author\/tapio\/"}]}},"_links":{"self":[{"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/posts\/3710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/comments?post=3710"}],"version-history":[{"count":0,"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/posts\/3710\/revisions"}],"wp:attachment":[{"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/media?parent=3710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/categories?post=3710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/selitys.fi\/en\/wp-json\/wp\/v2\/tags?post=3710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}