Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here
Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Answerclub

Answerclub Logo Answerclub Logo

Answerclub Navigation

  • Home
  • About Us
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • About Us
  • Contact Us

Welcome to Answerclub.org

Questions | Answers | Discussions | Knowledge sharing | Communities & more.

Ask A Question
Home/ Questions/Q 204263
Next
In Process

Answerclub Latest Questions

Shruti Sharma.
  • 0
  • 0
Shruti Sharma.Knowledge Contributor
Asked: August 17, 20242024-08-17T15:55:40+05:30 2024-08-17T15:55:40+05:30In: Technology

What is cyber security?

  • 0
  • 0
What is cyber security?
aieducationquestiontechnology
4
  • 4 4 Answers
  • 86 Views
  • 0 Followers
  • 0
Answer
  • Report

4 Answers

  • Voted
  • Oldest
  • Recent
  • Random
  1. [Deleted User]
    [Deleted User]
    2024-08-20T16:26:58+05:30Added an answer on August 20, 2024 at 4:26 pm

    Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting normal business processes.

      • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  2. manali
    manali Knowledge Contributor
    2024-08-22T12:21:50+05:30Added an answer on August 22, 2024 at 12:21 pm

    Cybersecurity involves protecting computer systems, networks, and data from digital attacks, theft, and damage. It encompasses various measures and practices to safeguard information and ensure the integrity, confidentiality, and availability of digital assets.

      • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  3. HDM
    HDM Knowledge Contributor
    2024-08-25T19:27:35+05:30Added an answer on August 25, 2024 at 7:27 pm

    Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks.It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
    eg: Third Part Cookies on world wide web – By tracking users’ browsing habits, third-party cookies contribute to the creation of detailed profiles, raising serious privacy concerns. The accumulation of such information allows for the targeted delivery of advertisements and content, often without users consent.

      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  4. Priyanka Rani
    Priyanka Rani Beginner
    2025-07-01T22:20:35+05:30Added an answer on July 1, 2025 at 10:20 pm

    Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage. It ensures confidentiality, integrity, and availability of information in the digital world https://www.excellencetechnology.in/cyber-security-course-in-chandigarh/

      • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

You must login to add an answer.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sidebar

Ask A Question

Stats

  • Questions 59,881
  • Answers 53,528
  • Popular
  • Answers
  • Mr.Doge

    What are the best AI tools available for Creative Designing?

    • 52 Answers
  • Mr.Doge

    How is tax calculated in India for investing in US ...

    • 41 Answers
  • Mr.Doge

    How to invest in NCD/ Corporate Bonds in India? Is ...

    • 36 Answers
  • Pavi
    Pavi added an answer Influencer marketing builds trust by leveraging relationships that creators already… April 8, 2026 at 5:42 pm
  • Pavi
    Pavi added an answer Influencer marketing is more powerful than traditional advertising because it… April 8, 2026 at 5:41 pm
  • dmktg39 singhal
    dmktg39 singhal added an answer HDPE sheets are widely used for applications that require strength,… April 8, 2026 at 4:32 pm

Related Questions

  • What makes Yotech Infocom Private Limited’s Seamless Indoor LED Wall ...

    • 1 Answer
  • What makes Yotech Infocom Private Limited’s Seamless Indoor LED Wall ...

    • 0 Answers
  • What makes Yotech Infocom Private Limited’s Seamless Indoor LED Wall ...

    • 0 Answers
  • What makes Yotech Infocom Private Limited’s Seamless Indoor LED Wall ...

    • 0 Answers
  • How does responsive website design dubai support mobile users?

    • 1 Answer

Trending Tags

ai (245) biology (376) branch of study (241) business (238) cricket (270) digital marketing (217) education (1095) english (343) environment (179) fashion (171) finance (172) food (300) general knowledge. (1051) general science (258) geography (269) gk (776) health (396) history (798) lifestyle (208) pilates (305) pilates fitness (275) pilates workout (260) poll (261) psychology (229) question (7819) science (352) sports (334) technology (367) tonic method (172) travel (367)

Explore

  • Home
  • Groups
  • Add group
  • Catagories
  • Questions
    • New Questions
    • Most Answered
  • Polls
  • Tags
  • Badges

© 2024 Answerclub.org | All Rights Reserved
Designed & Developed by INFINITEBOX & TechTrends