Protection of computer systems from information disclosure, theft or damage
Part of a series on
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture and ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
Types of hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware
List of computer criminals
Script kiddie
Hacking tools
Exploit
forensics-focused operating systems
Payload
Social engineering
Vulnerability
Practice sites
HackThisSite
Zone-H
Malware
Rootkit
Backdoor
Trojan horse
Virus
Worm
Spyware
Ransomware
Logic bomb
Botnet
Keystroke logging
HIDS
Web shell
RCE
Computer security
Application security
Cloud computing security
Network security
Groups
Anonymous
Chaos Computer Club
Homebrew Computer Club (defunct)
Legion of Doom (defunct)
LulzSec (defunct)
Masters of Deception (defunct)
Red team / Blue team
Publications
2600: The Hacker Quarterly
Hacker News
Nuts and Volts
Phrack
v
t
e
Operating systems
Common features
Process management
Interrupts
Memory management
File system
Device drivers
Networking
Security
Input/output
v
t
e
Computer security, cybersecurity, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.[1][2]
The field is significant due to the expanded reliance on computer systems, the Internet,[3] and wireless network standards such as Bluetooth and Wi-Fi. It is also significant due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance.[4][5]
While most aspects of computer security involve digital measures such as electronic passwords and encryption, physical security measures such as metal locks are still used to prevent unauthorized tampering.
^Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.
^Computer security at the Encyclopædia Britannica
^Tate, Nick (7 May 2013). "Reliance spells end of road for ICT amateurs". The Australian.
^Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021). "Systematically Understanding Cybersecurity Economics: A Survey". Sustainability. 13 (24): 13677. doi:10.3390/su132413677. hdl:11250/2978306.
^Stevens, Tim (11 June 2018). "Global Cybersecurity: New Directions in Theory and Methods" (PDF). Politics and Governance. 6 (2): 1–4. doi:10.17645/pag.v6i2.1569. Archived (PDF) from the original on 4 September 2019.
Computersecurity, cybersecurity, digital security or information technology security (IT security) is the protection of computer systems and networks...
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated...
The means of computersecurity include the physical security of systems and the security of information held on them. Corporate security refers to the...
cryptography and computersecurity involve studying the means for secure communication and preventing security vulnerabilities. Computer graphics and computational...
A computersecurity model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights...
A computersecurity conference is a convention for individuals involved in computersecurity. They generally serve as meeting places for system and network...
Computersecurity software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context...
as an information technology security audit or a computersecurity audit. However, information security encompasses much more than IT. The auditor is responsible...
topical guide to computersecurity: Computersecurity is commonly known as security applied to computing devices such as computers and smartphones, as...
In computersecurity, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or...
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely...
DoD ComputerSecurity Center was founded in 1981 and renamed the National ComputerSecurity Center (NCSC) in 1985. NCSC was responsible for computer security...
associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would...
A computersecurity policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal. Security...
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those...
information technology (IT) security specialists. These specialists apply information security to technology (most often some form of computer system). It is worthwhile...
A computer emergency response team (CERT) is an expert group that handles computersecurity incidents. Alternative names for such groups include cyber...
of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files". Chaos Computer Club forms in Germany. Ian...
protocol". ComputerSecurity Resource Center (NIST). Archived from the original on 17 May 2019. Retrieved 17 May 2019. "Passphrase". ComputerSecurity Resource...
improving fault tolerance) and malicious behavior (by providing computersecurity). Computer operating systems provide different levels of access to resources...