Electronic protection of computer-based information from unauthorized alteration or intentional or accidental destruction. Also, it is the process of controlling access and maintaining confidentiality when entering, storing, processing, and communicating information.