::Computer security


Security::title    Security::computer    Systems::system    Network::cyber    Access::canada    Computer::attacks

{{#invoke:Sidebar|sidebar}} Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.<ref>{{#invoke:citation/CS1|citation |CitationClass=book }}</ref> It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>

The field is of growing importance due to the increasing reliance of computer systems in most societies.<ref>"Reliance spells end of road for ICT amateurs", May 07, 2013, The Australian</ref> Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things - and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest.<ref>http://www.evolllution.com/opinions/cybersecurity-understanding-online-threat/</ref>

Computer security sections
Intro  Vulnerabilities and attacks   Systems at risk   Impact of security breaches  Attacker motivation   Computer protection (countermeasures)   Notable computer security attacks and breaches  Legal issues and global regulation  Government  Actions and teams in the US  International actions  National teams  Modern warfare  The cyber security job market   Terminology    Scholars    See also   Further reading   References    External links   

PREVIOUS: IntroNEXT: Vulnerabilities and attacks