The policies, processes, and technologies used to protect the integrity, confidentiality, and availability of an organisation’s network from cyber threats.