Providing the best practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.he term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.