Skip to content

Questions & Answers

What are the 10 domains of cyber security?


Get the answers you need


What are the 10 domains of cyber security?


1. Network Security: Network security focuses on protecting the integrity, confidentiality, and availability of network resources. It includes technologies such as firewalls, intrusion detection systems, virtual private networks (VPNs), and secure socket layers (SSLs).

2. Application Security: Application security is the practice of ensuring that applications are designed and developed securely. This includes secure coding practices, secure application architecture, and secure deployment and maintenance.

3. Endpoint Security: Endpoint security focuses on protecting the devices that access the network, such as computers, tablets, and smartphones. It includes technologies such as antivirus software, malware protection, and device encryption.

4. Data Security: Data security focuses on protecting the data stored on the network from unauthorized access or modification. It includes technologies such as encryption, access control, and data loss prevention.

5. Cloud Security: Cloud security focuses on protecting data stored in the cloud from unauthorized access or modification. It includes technologies such as encryption, access control, and identity and access management.

6. Identity and Access Management: Identity and access management focuses on controlling who has access to what resources on the network. It includes technologies such as authentication, authorization, and single sign-on.

7. Risk Management: Risk management is the practice of identifying, assessing, and mitigating risks that could potentially impact the security of the network. It includes technologies such as threat modeling and risk assessment.

8. Cryptography: Cryptography focuses on using cryptographic techniques to protect data from unauthorized access or modification. It includes technologies such as encryption, digital signatures, and key management.

9. Disaster Recovery and Business Continuity: Disaster recovery and business continuity focuses on ensuring that the network can be recovered and continue to operate in the event of a disaster. It includes technologies such as backup and restore, high availability, and disaster recovery plans.

10. Compliance and Auditing: Compliance and auditing focuses on ensuring that the network meets the requirements of applicable laws and regulations. It includes technologies such as logging and monitoring, vulnerability scanning, and penetration testing.