Difference between revisions of "Computer security"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→See also) |
Karl Jones (Talk | contribs) |
||
(9 intermediate revisions by the same user not shown) | |||
Line 18: | Line 18: | ||
* [[Browser security]] | * [[Browser security]] | ||
+ | * [[Bruce Schneier]] | ||
* [[Credential]] | * [[Credential]] | ||
* [[Cross-site scripting]] | * [[Cross-site scripting]] | ||
+ | * [[Dan Kaminsky]] | ||
+ | * [[Denial-of-service attack]] | ||
+ | * [[Encryption]] | ||
+ | * [[Exploit (computer security)]] | ||
* [[Internet security]] | * [[Internet security]] | ||
+ | * [[Password]] | ||
* [[Security]] | * [[Security]] | ||
+ | * [[Software defect]] | ||
+ | * [[Vulnerability (computing)]] | ||
* [[Web security]] | * [[Web security]] | ||
Line 27: | Line 35: | ||
* [https://en.wikipedia.org/wiki/Computer_security Computer security] @ Wikipedia | * [https://en.wikipedia.org/wiki/Computer_security Computer security] @ Wikipedia | ||
+ | |||
+ | [[Category:Computer science]] | ||
+ | [[Category:Computer security]] | ||
+ | [[Category:Internet security]] | ||
+ | [[Category:Security]] | ||
+ | [[Category:Web design and development]] |
Latest revision as of 12:59, 24 April 2016
Computer security, also known as cybersecurity or IT security, is security applied to computers, computer networks, and the data stored in and transmitted over them.
Contents
Description
The field is of growing importance due to the increasing reliance of computer systems in most societies.
Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
Topics
Computer security covers:
- All the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction
- The process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest
See also
- Browser security
- Bruce Schneier
- Credential
- Cross-site scripting
- Dan Kaminsky
- Denial-of-service attack
- Encryption
- Exploit (computer security)
- Internet security
- Password
- Security
- Software defect
- Vulnerability (computing)
- Web security
External links
- Computer security @ Wikipedia