In the place and time where I grew up, the phrase “computer science” didn’t really exist. Neither did the word “computer”, as a matter of fact. The whole area roughly equivalent to today’s computer science was called (and I am transliterating from Russian here) “kibernetica, soft of like “cybernetics”, but with broader meaning (see Russian wikipedia entry). So, I sort of grew up with “cyber” (reading plenty of sci-fi helped as well, of course).
In recent years, I made plenty of jokes about “cyber-everything” (and thought this site was brilliant, as far as “cyber-jokes” go). Some “cyber-words” still ring really stupid, and funny (just heard “cyber-diplomacy” the other day – I guess it is the opposite of “cyber-war” or something).
However, the time has come for me to admit defeat. Just like the word “hacker” in the not-so-recent past, “cyber security” has entered daily usage with a more or less set meaning. And, the word is actually kinda cute in futuristic kind of way.
More seriously, I think there are contexts where neither of “computer security” (e.g. non-computer devices or OT), “information security” (e.g. DDoS attacks), “IT security” (e.g. data theft not from IT systems) really work well. Therefore, I have come to peace with the term “cyber security” and may use it as an umbrella term for “all things information, digital, computer, data, information, network, IT security.”
There you have it!
P.S. Those who still plan to fight the war against “cyber”, sorry for abandoning the camp
Read Complimentary Relevant Research
Security Monitoring and Operations Primer for 2017
Security monitoring and operations excellence is a key component of any effective security program. Gartner's 2017 research will guide...
View Relevant Webinars
The Rise of Hardware Security in the IoT Era
Global economic impact of $2 trillion. More than 21 billion connected "things" by 2020. While the Internet of Things is creating more...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.