• OPENVAS REPORT
  • Greenbone Basic
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
Greenbone
  • Products
    • Hardware Appliances
      • Greenbone Enterprise 6500
      • Greenbone Enterprise 5400
      • Greenbone Enterprise 650
      • Greenbone Enterprise 600
      • Greenbone Enterprise 450
      • Greenbone Enterprise 400
      • Greenbone Enterprise 150
      • Greenbone Enterprise 35
    • Virtual Appliances
      • Greenbone Enterprise EXA
      • Greenbone Enterprise PETA
      • Greenbone Enterprise TERA
      • Greenbone Enterprise DECA
      • Greenbone Enterprise CENO
      • Greenbone Enterprise 25V
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • Hardware Appliances
    • Virtual Appliances
    • OPENVAS REPORT
    • Greenbone Basic
      • Greenbone Basic: Order
    • Greenbone Cloud Service
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Greenbone Web App Scanning
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano

Reading time: 12 minutes

What is IT Security?

IT Security, Cyber Security or Internet Security: all these terms seem similar, however, there are subtle differences. Generally, IT Security is defined as the protection of IT systems against damage and risks.

This counts for single files to computers, networks and cloud services to whole data centers. Cyber Security extends IT Security to the overall cyber space.

As most systems are connected to the Internet nowadays, IT Security and Cyber Security are often used interchangeably. IT Security and Cyber Security cover all technical and organizational measures to defend systems from cyber attacks and other threats.

This includes access controls, cryptography, rights management, firewalls, proxies, virus scanners, vulnerability management and much more. The term Internet Security is specifically related to the protection against dangers from the Internet.

Set up a Process

We’ll be happy to help you set up your own vulnerability management process. It will be tailored to your systems, structures and requirements.

Contact us now

Table of Contents

1. Information Security

  1. Data Security
  2. Information Security Management System (ISMS)
  3. Cyber Resilience

2. Questions on IT Security

  1. Why IT Security?
  2. Why Information Security?
  3. What Is the Impact of an Attack on My Information?
  4. Which Attack Methods and Instruments Endanger IT Security?
  5. How Can the IT Security Risk Be Minimized?
  6. How Good Is the IT Security of My Company?
  7. How Do I Prepare My Employees for IT Security?
  8. What Value Has Information or Its Security for the Digitalization/Digital Transformation?
  9. 5 Important Questions about IT Security

3. Paradigm Shift – From IT Security to Cyber Resilience

  1. Realizing Cyber Resilience
  2. Differentiation from Cyber Security/IT Security
  3. Risk Management
  4. Compliance Management

1. Information Security

Often, IT Security and Information Security are used interchangeably. However, strictly speaking, IT Security is only a partial aspect of Information Security. While IT Security is focused on the protection of technical systems, Information Security comprises the preservation of information in general. This information can also exist on non-technical systems such as paper. The protection goals of Information Security are to ensure the confidentiality, integrity and availability of information. For example, suitable measures can be found in the internationally valid ISO/IEC-27000 series of standards. In Germany, the IT-Grundschutz of the Federal Office for Information Security (BSI) serves as a guideline for Information Security. An important component is the establishment of an Information Security Management System (ISMS). For this reason Greenbone is both certified for its ISMS (ISO 27001) and Quality Management (ISO9000) with the certs.
More about: https://www.greenbone.net/en/iso-certification/

Mehrere medizinische CT-Scans eines Gehirns auf einem Bildschirm – Symbol für den Schutz sensibler Gesundheitsdaten und Informationssicherheit.

Information Security for protecting sensitive patient data – @ nimon_t – #87948311 – stock.adobe.com

Data Security

Data Security has the aim to secure the confidentiality, integrity and availability of data. In contrast to data protection, it is not restricted to personal data but includes all data. Confidentiality means only authorized individuals are able to access the data. Integrity means the data was not manipulated or damaged. The availability refers to the fact that the data can be used when it is needed. To establish Data Security, different technical and organizational measures are required, e.g., access controls, cryptography or redundant storage systems.

More about Data Security

Information Security Management System (ISMS)

An Information Security Management System (ISMS) is not a technical system but defines rules and methods for ensuring, checking and continuously improving Information Security. Amongst other things, this includes the determination and evaluation of risks, the specification of security goals as well as a clear definition and documentation of responsibilities, communication channels and processes. The requirements for an ISMS are regulated in the ISO27001 standard. An ISMS is an important component for a comprehensive IT security concept.

Mehrere Monitore mit Netzwerkanalysen – Symbol für Informationssicherheits-Management (ISMS)

Systems for Information Security can serve the central control of rail transport – @ chungking – #70423572 – stock.adobe.com

Cyber Resilience

Cyber Resilience is understood as the ability of a company or an organization to maintain its business processes despite adverse cyber circumstances. These can be cyber attacks but also unintentional obstacles such as a failed software update or human error. Cyber Resilience is a comprehensive concept exceeding IT Security. It combines the areas Information Security, business continuity and organizational resilience. To achieve a state of Cyber Resilience, it is important to identify vulnerabilities at an early stage, to prioritize them economically and to remove them.

You are interested in our solutions or want to receive additional information?

Get in touch

2. Questions on IT Security

Why IT Security?

IT is a central element of each company and forms the base for almost all business processes. Without it, nearly nothing works anymore. In the worst case, IT disruptions can stop the whole business leading to huge economical and reputational damages. Hence, it is essential for companies to secure their IT systems and protect them against cyber risks and cyber attacks. More linkage leads to a larger attack surface as well. Each linked device is a potential gateway for cyber criminals increasing the risk for being attacked.

Abstrakte digitale Darstellung einer Kette aus vernetzten Datenpunkten – Symbol für IT-Sicherheit und vernetzte Systeme

IT Security for ensuring digital linkage – @ Sashkin – #195865436 – stock.adobe.com

Why Information Security?

Information is one oft the most valuable company goods. Nowadays, it is mostly present as digital data within IT systems where it is stored, transported and processed. However, it can also be put down on paper or passed on verbally. If information is lost, stolen, manipulated or no longer usable, existence-threatening effects can be the consequence for companies. For this reason, it is important to take care of an adequate Information Security to ensure information confidentiality, integrity and availability.

What Is the Impact of an Attack on My Information?

If the availability, confidentiality and integrity of information is affected, serious consequences may be the result. For example, due to an attack sensitive data can fall into the wrong hands – whether personal data or business secrets. Hackers are able to carry out industrial espionage, steal the identities of individuals, abuse credit card information and much more. The manipulation of data can lead to incorrect transactions, production errors or wrong analysis results. If data is not available, business processes that rely on data processing are affected as well. In such cases, orders cannot be placed or production machines stop.

Hacker mit Kapuzenpullover vor mehreren Bildschirmen mit Code und Netzwerkanalysen

Cyber criminals are a constant threat to IT Security – @ Gorodenkoff – #164586542 – stock.adobe.com

Which Attack Methods and Instruments Endanger IT Security?

Cyber criminals develop new attack methods constantly and become smarter. Nowadays, they are usually organized professionally and work with the latest technology. Thus, IT Security is a permanent race against growing threats.Common attack methods are:

Advanced Persistent Threats (APTs)

This refers to targeted cyber attacks that are adjusted to chosen victims or victim groups and work with advanced methods. Attackers gain permanent access to a network and then expand this access to other systems. To do so, cyber criminals often implant malware.

Malware

The term “malware” includes all types of computer programs that run undesirable or harmful operations on a system, e.g., viruses, worms and Trojan.

Ransomware

Ransomware is malware that encrypts a system and only enables access to the data again if the victim pays a ransom. This type of malware has become particularly popular in the recent years. Known examples are the cypto Trojans WannaCry and Petya. Common distribution channels for ransomware are spam mails, phishing and drive-by exploits. The latter take advantage of vulnerabilities in browsers, browser plug-ins or operating systems.

Spam and Phishing

Spam describes undesirable e-mails and is a popular method to distribute malware. Phishing e-mails are a special type of spam. They should convince a user to carry out a certain action – for example, revealing login data or installing malware.

Botnets

Cyber criminals integrate foreign computer systems in botnets – an amalgamation of compromised PCs they can control remotely like robots and misuse for their purposes. For that, the computers are infected with malware. A popular field of applications for botnets are Distributed Denial of Service attacks (DDoS).

DDoS Attacks

Distributed Denial of Service attacks intend to paralyze a service or server. Mostly this happens by hackers sending vast amounts of requests to the server via a botnet, overloading the server and making it inoperative.

Vulnerabilities in Software and Hardware

Cyber criminals often exploit vulnerabilities in software or hardware for their attacks. Thus, it is significant for IT Security, to recognize and eliminate such vulnerabilities. For example, an important measure is installing up-to-date updates and patches to close security holes.

You are interested in our solutions or want to receive additional information?

Get in touch

How Can the IT Security Risk Be Minimized?

To minimize IT risks and to provide IT Security, companies have to introduce both technical and organizational measures. First of all, a process and vulnerability analysis is important. It serves to identify which processes are particularly essential for the company, which vulnerabilities exist, how likely the vulnerabilities are exploited and which damage this may cause. It will never be possible to eradicate all IT risks. Instead, a good risk management is required. Companies have to evaluate risks and reduce them according to their priority.

Zwei IT-Sicherheitsexperten in Tarnuniform inspizieren Serverracks in einem Rechenzentrum

IT Security at the German Bundeswehr – @ Gorodenkoff – #161860908 – stock.adobe.com

How Good Is the IT Security of My Company?

IT Security is never completed but an ongoing process. For this reason, companies should check their status and measures continuously. Vulnerability Management or a security audit by a specialized consultant may be helpful for that.

How Do I Prepare My Employees for IT Security?

IT Security and Information Security are not only a matter of technology. In fact, humans are the biggest vulnerability. Cyber criminals take advantage of this, for example by gaining network or system access using social engineering or phishing. For this reason it is important to train employees and to sensitize them for IT risks and IT Security. Online trainings with interactive exercises are advisable. Employees are able to carry out those trainings independently at any desired time and receive direct feedback due to the interactive components. In this way, a fast learning effect is achieved.

What Value Has Information or Its Security for the Digitalization/Digital Transformation?

Data plays a key role for a successful digital transformation. Based on data, companies are able to gain knowledge, derive action recommendations and develop new business models. The ability to collect and evaluate data and to use it correctly is significant for success. Because of this, it is essential for companies to protect the confidentiality, integrity and availability of their data.

IT Security in control centers – @ Gorodenkoff – #184811629 – stock.adobe.com

5 Important Questions about IT Security:

Why does my company need IT security?

Today, IT is a central component of every company and forms the basis for almost all business processes. In the worst case scenario, IT disruptions can bring the entire business to a standstill, which can lead to major economic damage. Therefore, secure your IT systems and protect them against cyber risks and cyber attacks. In addition, increasing digitalization and networking are also increasing the attack surface, which increases the risk of attacks.

What is the difference between IT security, information security and data security?

IT security is the protection of IT systems – from individual files to computers, networks and cloud services through to data centers – against damage and threats. Cyber security extends IT security to the entire cyberspace. IT security is a sub-aspect of information security. While IT security refers to the protection of technical systems, information security is generally concerned with the protection of information. The aim of data security is to ensure the confidentiality, integrity and availability of data. In contrast to data protection, it is not limited to personal data, but extends to all data.

How can I implement IT security in my company?

Inhalt des Toggles hier reinBoth technical and organizational measures are necessary to minimize IT risks and ensure IT security. First of all, a process and vulnerability analysis must be carried out to determine which processes are particularly important for the company, which vulnerabilities they have, how great the risk is that these vulnerabilities will be exploited and what damage can be caused as a result. You can never eliminate all vulnerabilities. Companies must therefore assess and prioritize risks.

IT security and information security are not just a question of technology. People are the biggest weak point. It is therefore important to train employees and raise their awareness of IT risks and IT security.

What impact does an attack have on my company’s IT security?

In the event of an attack, the availability, confidentiality and integrity of information can be severely compromised – with significant economic consequences. If personal data or company secrets fall into the wrong hands, the consequences can be industrial espionage, identity theft or credit card misuse. Losses can also occur if data is not available. If data can no longer be processed, this can mean, for example, that production can no longer take place.

What methods and means of attack threaten IT security?

Cyber criminals today are usually professionally organized and are constantly developing new methods of attack. Malware, for example, can carry out unwanted or harmful actions on the target system, as is the case with viruses, worms or Trojans. Ransomware, on the other hand, uses malware to encrypt a system and blackmail a victim into releasing the system only against payment of a ransom. Social engineering, in which attackers pretend to be trustworthy or known to the victim, is also widespread. One form is phishing, where the victim is tricked into performing certain actions, such as unknowingly installing malware. These are just some of the many methods cyber criminals use to threaten IT security.

Paradigm Shift – From IT Security to Cyber Resilience

Realizing Cyber Resilience

Considering the growing threat situation, companies have to strive for sustainable Cyber Resilience. This means preventing attacks if possible, reacting fast in case of a security incident and maintaining business operations without larger damage. To gain Cyber Resilience, companies have to take suitable technical and organizational actions, e.g., hardening the company IT and reducing the attack surface.

Differentiation from Cyber Security/IT Security

Cyber Resilience includes Cyber Security, but goes even further. While Cyber Security mostly concentrates on technical measures, Cyber Resilience is a comprehensive, more strategically oriented concept. In the past, Cyber Security was usually oriented reactively. Nowadays, this is not sufficient anymore. Companies have to face IT risks preventively. A paradigm shift is necessary – from Cyber Security to Cyber Resilience.

Risk Management

The steps leading to Cyber Resilience start with a risk management. Companies have to evaluate and prioritize IT risks they want to protect themselves against by all means or they may accept. IT risks can never be eliminated completely because protection measures have to be considered against the background of economic efficiency and must not disrupt running business operations. Building a large barrier around IT would not be useful and affect the flexibility. IT risks have to be managed instead.

The IT risk management base is an analysis of the business processes and their vulnerabilities. Which are the most important assets of a company, what damage could an attack cause to these assets and how likely is such an attack? A risk evaluation with the levels low, medium and high results from the relation between possible damage and probability of occurrence. Companies should now prioritize and reduce the risks according to the rating.

Compliance Management

Compliance management comes with a good risk management. Compliance is understood as the observance of rules. These can be legal requirements, ethical principles or corporate regulations. Compliance violation is a risk companies have to take into account when carrying out the risk management. The introduction of a Compliance Management Systems (CMS) is recommended. It defines processes, measures and structures to ensure compliance observance.

Test Us!

Greenbone Basic
Our entry-level enterprise product for 2,450 € per year

Test 14 Days Free of Charge

Do you have further questions?

Or do you wish to talk personally? We are there for you. Get in contact with us or leave your contact data, so that we are able to reach you as soon as possible.

+49-541-760278-20 sales@greenbone.net Contact Form

Current Topics From Our Community

Be a part of our community and participate in exciting debates.

To the Community Forum

Always Be up to Date

Also visit our blog and do not miss any news.

To the Blog

Products & Solutions

  • Hardware Appliances
  • Virtual Appliances
  • OPENVAS REPORT
  • Greenbone Basic
  • Greenbone Free
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • Greenbone Web App Scanning
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
ISO27001-EN

About us

  • About Greenbone
  • Blog
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

This site is only using technically necessary cookies. By continuing to browse the site, you are agreeing to use this cookies.

OKPrivacy policy

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Datenschutzerklärung
Einstellungen akzeptierenVerberge nur die Benachrichtigung