The methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)