In the place and time where I grew up, the phrase “computer science” didn’t really exist. Neither did the word “computer”, as a matter of fact. The whole area roughly equivalent to today’s computer science was called (and I am transliterating from Russian here) “kibernetica, soft of like “cybernetics”, but with broader meaning (see Russian wikipedia entry). So, I sort of grew up with “cyber” (reading plenty of sci-fi helped as well, of course).
In recent years, I made plenty of jokes about “cyber-everything” (and thought this site was brilliant, as far as “cyber-jokes” go). Some “cyber-words” still ring really stupid, and funny (just heard “cyber-diplomacy” the other day – I guess it is the opposite of “cyber-war” or something).
However, the time has come for me to admit defeat. Just like the word “hacker” in the not-so-recent past, “cyber security” has entered daily usage with a more or less set meaning. And, the word is actually kinda cute in futuristic kind of way.
More seriously, I think there are contexts where neither of “computer security” (e.g. non-computer devices or OT), “information security” (e.g. DDoS attacks), “IT security” (e.g. data theft not from IT systems) really work well. Therefore, I have come to peace with the term “cyber security” and may use it as an umbrella term for “all things information, digital, computer, data, information, network, IT security.”
There you have it!
P.S. Those who still plan to fight the war against “cyber”, sorry for abandoning the camp
Read Complimentary Relevant Research
How to Evaluate Cloud Service Provider Security
Security and risk management leaders continue to experience challenges to efficiently and reliably determine whether cloud service providers...
View Relevant Webinars
2017 CIO Agenda: A Security and Risk Management Perspective
The 2017 CIO Agenda highlights the importance of building a digital ecosystem for enterprises. Security and Risk Management leaders must...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.