A part of information security that involves procedures to protect information systems like computer devices and networks, by maintaining data integrity, confidentiality and authentication.