Secure Computing

Home > Computer Science > Computer Security and Cryptography > Secure Computing

The study of techniques used to protect computer systems, software, and data from unauthorized access, theft, and damage.

Encryption: Encrypting data to make it unreadable to unauthorized users.
Authentication: Verifying the identity of an individual or system to ensure authorized access.
Access control: Controlling access to resources and limiting the actions that can be performed by authorized users.
Vulnerability management: Identifying and mitigating potential security weaknesses in software, hardware or configurations.
Threat modeling: Identifying and prioritizing potential threats and vulnerabilities in a system.
Network security: Protecting network infrastructure from unauthorized access and malicious attacks.
Incident response: Handling security breaches and minimizing damage in the event of an attack.
Data privacy: Protecting sensitive data from unauthorized access, use, disclosure or destruction.
Physical security: Ensuring the physical security of systems and resources, such as data centers and servers.
Security policies: Developing and implementing policies to ensure security compliance and best practices in an organization.
Risk management: Assessing potential risks and implementing processes and controls to mitigate these risks.
Cryptography: Ensuring the confidentiality, integrity, authenticity and non-repudiation of information through encryption, digital signatures and other cryptographic techniques.
Security audit and compliance: Verifying that security systems are operating in accordance with established policies and standards.
Social engineering: Understanding and mitigating the human element of security breaches, such as phishing and social engineering attacks.
Security in cloud computing: Ensuring the security of data and applications hosted in cloud-based environments.
Access control: Access control is the process of allowing or denying access to digital resources based on predefined rules or policies.
Antivirus software: Antivirus software is designed to detect, prevent, and remove malware and other harmful software from computer systems.
Authentication: Authentication is the process of verifying the identity of a user or system.
Biometrics: Biometrics refers to the use of unique physical or behavioral traits, such as fingerprints, face recognition, or iris scans, to identify and authenticate individuals.
Cryptography: Cryptography is the practice of securing communication from third-party access by encoding the message.
Data backup and recovery: Data backup and recovery refer to the process of creating copies of digital data and restoring them in case of loss or damage.
Firewall: A Firewall is a system designed to prevent unauthorized access to or from a private computer network.
Intrusion detection: Intrusion detection is the process of detecting and responding to attacks on computer systems or networks.
Physical security: Physical security refers to the measures taken to protect computer hardware and physical assets, such as servers, data centers, and other critical infrastructure.
Secure coding: Secure coding refers to the process of writing and testing computer code to ensure that it is free from vulnerabilities that could be exploited by hackers or other malicious actors.
Security auditing: Security auditing refers to the process of assessing and analyzing the security of computer systems, networks, and other digital assets.
Security management: Security management refers to the activities involved in managing the ongoing security of computer systems, networks, and other digital assets.
Virtual Private Network (VPN): A VPN is a secure, private network that enables users to connect to the internet securely and anonymously.
"Computer security, cyber security, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide."
"...unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide."
"The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi."
"Also, due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT)."
"Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support."
"Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, elections, and finance."
"Computer security, cyber security, digital security or information technology security (IT security)..."
"...protection of computer systems and networks from attacks by malicious actors..."
"...attacks by malicious actors that may result in unauthorized information disclosure..."
"...theft of, or damage to hardware, software, or data..."
"...as well as from the disruption or misdirection of the services they provide."
"The expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi."
"...growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT)."
"Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support."
"Power distribution, elections, and finance."
"...protection of computer systems and networks from attacks by malicious actors..."
"...attacks by malicious actors that may result in unauthorized information disclosure..."
"...systems that govern large-scale systems with far-reaching physical effects..."
"...protection of computer systems and networks from attacks by malicious actors that may result in theft of, or damage to hardware, software, or data..."
"...as well as from the disruption or misdirection of the services they provide."