The practice and study of techniques for secure communication in the presence of third parties.
The policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.