<s>
This	O
is	O
a	O
list	B-General_Concept
of	I-General_Concept
cybersecurity	I-General_Concept
information	I-General_Concept
technology	I-General_Concept
.	O
</s>
<s>
Cybersecurity	O
is	O
security	O
as	O
it	O
is	O
applied	O
to	O
information	B-General_Concept
technology	I-General_Concept
.	O
</s>
<s>
This	O
includes	O
all	O
technology	O
that	O
stores	O
,	O
manipulates	O
,	O
or	O
moves	O
data	O
,	O
such	O
as	O
computers	O
,	O
data	B-Architecture
networks	I-Architecture
,	O
and	O
all	O
devices	O
connected	O
to	O
or	O
included	O
in	O
networks	O
,	O
such	O
as	O
routers	B-Protocol
and	O
switches	O
.	O
</s>
<s>
All	O
information	B-General_Concept
technology	I-General_Concept
devices	O
and	O
facilities	O
need	O
to	O
be	O
secured	O
against	O
intrusion	O
,	O
unauthorized	O
use	O
,	O
and	O
vandalism	O
.	O
</s>
<s>
Additionally	O
,	O
the	O
users	O
of	O
information	B-General_Concept
technology	I-General_Concept
should	O
be	O
protected	O
from	O
theft	O
of	O
assets	O
,	O
extortion	O
,	O
identity	O
theft	O
,	O
loss	O
of	O
privacy	O
and	O
confidentiality	O
of	O
personal	O
information	O
,	O
malicious	O
mischief	O
,	O
damage	O
to	O
equipment	O
,	O
business	O
process	O
compromise	O
,	O
and	O
the	O
general	O
activity	O
of	O
cybercriminals	O
.	O
</s>
<s>
Cybersecurity	O
is	O
a	O
major	O
endeavor	O
in	O
the	O
IT	B-General_Concept
industry	I-General_Concept
.	O
</s>
