Difference between revisions of "Computer security"
Karl Jones (Talk | contribs) (WiFi) |
Karl Jones (Talk | contribs) |
||
Line 1: | Line 1: | ||
'''Computer security''', also known as '''cybersecurity''' or '''IT security''', is [[security]] applied to [[Computer|computers]], [[Computer network|computer networks]], and the [[data]] stored in and transmitted over them. | '''Computer security''', also known as '''cybersecurity''' or '''IT security''', is [[security]] applied to [[Computer|computers]], [[Computer network|computer networks]], and the [[data]] stored in and transmitted over them. | ||
+ | |||
+ | == Description == | ||
The field is of growing importance due to the increasing reliance of computer systems in most societies. | The field is of growing importance due to the increasing reliance of computer systems in most societies. | ||
Line 10: | Line 12: | ||
* [[Browser security]] | * [[Browser security]] | ||
+ | * [[Cross-site scripting]] | ||
* [[Internet security]] | * [[Internet security]] | ||
* [[Security]] | * [[Security]] | ||
+ | * [[Web security]] | ||
== External links == | == External links == | ||
* [https://en.wikipedia.org/wiki/Computer_security Computer security] @ Wikipedia | * [https://en.wikipedia.org/wiki/Computer_security Computer security] @ Wikipedia |
Revision as of 09:45, 9 September 2015
Computer security, also known as cybersecurity or IT security, is security applied to computers, computer networks, and the data stored in and transmitted over them.
Description
The field is of growing importance due to the increasing reliance of computer systems in most societies.
Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest.
See also
External links
- Computer security @ Wikipedia