::Computer security
::concepts
Security::title Security::computer Systems::system Network::cyber Access::canada Computer::attacks
{{#invoke:Sidebar|sidebar}}
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.<ref>{{#invoke:citation/CS1|citation
|CitationClass=book
}}</ref> It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,<ref>{{#invoke:citation/CS1|citation
|CitationClass=web
}}</ref> and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web
}}</ref>
The field is of growing importance due to the increasing reliance of computer systems in most societies.<ref>"Reliance spells end of road for ICT amateurs", May 07, 2013, The Australian</ref> Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things - and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest.<ref>http://www.evolllution.com/opinions/cybersecurity-understanding-online-threat/</ref>
Computer security sections
Intro Vulnerabilities and attacks Systems at risk Impact of security breaches Attacker motivation Computer protection (countermeasures) Notable computer security attacks and breaches Legal issues and global regulation Government Actions and teams in the US International actions National teams Modern warfare The cyber security job market Terminology Scholars See also Further reading References External links
PREVIOUS: Intro | NEXT: Vulnerabilities and attacks |
<< | >> |