“…The term Cybersecurity has recently been introduced to indicate the set of procedures and methodologies used to defend computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. Cybersecurity [ 1 , 2 , 3 ] is therefore applied to various contexts, from the economic one to that relating to mobile technologies and includes various actions: - Network security : the procedures for using the network safely;
- Application Security : the procedures and solutions for using applications safely;
- Information security : the management of information in a secure way and in a privacy-sensitive manner in accordance with pre-established regulations;
- Operational security : the security in IT operations, such as, for example, in bank-type transactions;
- Disaster recovery and operational continuity : the procedures for restarting after problems that have affected the regular/routine operation of a system and to ensure operational continuity. For example, using informatic solutions such as an efficient disk mirroring and/or backup policy;
- End-user training : specific training for the actors involved in the use of the systems, which where necessary, must also include the citizen.
…”