All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. Cybersecurity is security as it is applied to information technology. This is a list of cybersecurity information technology. ( Learn how and when to remove this template message) JSTOR ( April 2021) ( Learn how and when to remove this template message).Unsourced material may be challenged and removed.įind sources: 'Cybersecurity information technology list' – news Please help improve this article by adding citations to reliable sources. This article needs additional citations for verification.