Difference between revisions of "Computer security"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→See also) |
Karl Jones (Talk | contribs) (→See also) |
||
Line 18: | Line 18: | ||
* [[Browser security]] | * [[Browser security]] | ||
+ | * [[Bruce_Schneier]] | ||
* [[Credential]] | * [[Credential]] | ||
* [[Cross-site scripting]] | * [[Cross-site scripting]] | ||
+ | * [[Dan Kaminsky]] | ||
* [[Encryption]] | * [[Encryption]] | ||
* [[Exploit (computer security)]] | * [[Exploit (computer security)]] |
Revision as of 09:24, 21 February 2016
Computer security, also known as cybersecurity or IT security, is security applied to computers, computer networks, and the data stored in and transmitted over them.
Contents
Description
The field is of growing importance due to the increasing reliance of computer systems in most societies.
Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
Topics
Computer security covers:
- All the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction
- The process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest
See also
- Browser security
- Bruce_Schneier
- Credential
- Cross-site scripting
- Dan Kaminsky
- Encryption
- Exploit (computer security)
- Internet security
- Password
- Security
- Software defect
- Vulnerability (computing)
- Web security
External links
- Computer security @ Wikipedia