C
C
infrastructure. Where cyber security controls are absent, incomplete, or poorly designed, cyberspace is
considered the wild west of the digital age.
Even those who work in the security profession will have a different view of cyber security depending on the
aspects of cyberspace with which they personally interact. Whether a system is a physical facility or a
collection of cyberspace components, the role of a security professional assigned to that system is to plan for
potential attack and prepare for its consequences.
Although the word “cyber” is mainstream vernacular, to what exactly it refers is elusive. Once a term of
science fiction based on the then-emerging field of computer control and communication known as
cybernetics, it now refers generally to electronic automation (Safire 1994). The corresponding term
“cyberspace” has definitions that range from conceptual to technical, and has been claimed by some to be a
fourth domain, where land, sea, and air are the first three (Kuehl 2009). There are numerous definitions of
cyberspace and cyber security scattered throughout literature. Our intent is not to engage in a debate on
semantics, so we do not include these definitions. Moreover, such debates are unnecessary for our purpose,
as we generally use the term “cyber” not as a noun, but as an adjective that modifies its subject with the
property of supporting a collection of automated electronic systems accessible over networks. As well
reflected in language-usage debates in both the field of cognitive linguistics and popular literature on
lexicography, the way language is used by a given community becomes the de facto definition (Zimmer 2009),
and so we request that our readers set aside the possibility that they will be confused by references to
“cyberspace” and “cyber security” and simply refer to their own current concept of these terms when it makes
sense to do so, while keeping in mind that we generally the term cyber as an adjective whose detailed
attributes will change with the system of interest. At a high level, cyber security is typically explained in terms
of a few triads that describe the objectives of security professionals and their methods, respectively (Bayuk
2010).