In the place and time where I grew up, the phrase “computer science” didn’t really exist. Neither did the word “computer”, as a matter of fact. The whole area roughly equivalent to today’s computer science was called (and I am transliterating from Russian here) “kibernetica, soft of like “cybernetics”, but with broader meaning (see Russian wikipedia entry). So, I sort of grew up with “cyber” (reading plenty of sci-fi helped as well, of course).
In recent years, I made plenty of jokes about “cyber-everything” (and thought this site was brilliant, as far as “cyber-jokes” go). Some “cyber-words” still ring really stupid, and funny (just heard “cyber-diplomacy” the other day – I guess it is the opposite of “cyber-war” or something).
However, the time has come for me to admit defeat. Just like the word “hacker” in the not-so-recent past, “cyber security” has entered daily usage with a more or less set meaning. And, the word is actually kinda cute in futuristic kind of way.
More seriously, I think there are contexts where neither of “computer security” (e.g. non-computer devices or OT), “information security” (e.g. DDoS attacks), “IT security” (e.g. data theft not from IT systems) really work well. Therefore, I have come to peace with the term “cyber security” and may use it as an umbrella term for “all things information, digital, computer, data, information, network, IT security.”
There you have it!
P.S. Those who still plan to fight the war against “cyber”, sorry for abandoning the camp
Read Complimentary Relevant Research
Managing Risk and Security at the Speed of Digital Business
Digital business challenges the basic principles of information risk and security management. Risk and security leaders must understand...
View Relevant Webinars
Ransomware Protection: Facts and Myths
Solutions for preventing, detecting and recovering from ransomware have strengths and weaknesses. What are the true facts, and what myths...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.