A set of tools, logical security measures, guidelines, actions, and technologies that are used to protect one's own or third-party assets and the users who make use of them.
It also refers to the dimensions of integrity, authenticity, availability, and confidentiality of communications, services, and information transmitted within cyberspace.
