In the place and time where I grew up, the phrase “computer science” didn’t really exist. Neither did the word “computer”, as a matter of fact. The whole area roughly equivalent to today’s computer science was called (and I am transliterating from Russian here) “kibernetica, soft of like “cybernetics”, but with broader meaning (see Russian wikipedia entry). So, I sort of grew up with “cyber” (reading plenty of sci-fi helped as well, of course).
In recent years, I made plenty of jokes about “cyber-everything” (and thought this site was brilliant, as far as “cyber-jokes” go). Some “cyber-words” still ring really stupid, and funny (just heard “cyber-diplomacy” the other day – I guess it is the opposite of “cyber-war” or something).
However, the time has come for me to admit defeat. Just like the word “hacker” in the not-so-recent past, “cyber security” has entered daily usage with a more or less set meaning. And, the word is actually kinda cute in futuristic kind of way.
More seriously, I think there are contexts where neither of “computer security” (e.g. non-computer devices or OT), “information security” (e.g. DDoS attacks), “IT security” (e.g. data theft not from IT systems) really work well. Therefore, I have come to peace with the term “cyber security” and may use it as an umbrella term for “all things information, digital, computer, data, information, network, IT security.”
There you have it!
P.S. Those who still plan to fight the war against “cyber”, sorry for abandoning the camp
Read Complimentary Relevant Research
Leadership Vision for 2018: Security and Risk Leaders
Security and risk management are key enablers for digital business. SRM leaders are accountable for helping the enterprise balance the...
View Relevant Webinars
The Top Security Trends for Midsize Enterprises
Security continues to be both a top challenge and an investment priority for IT leaders in midsize organizations. By keeping these trends...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.