Computer security

From WikiMD.org
Jump to navigation Jump to search

Computer Security

Computer security, also known as cybersecurity or IT security, is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Pronunciation

/kəmˈpjuːtər sɪˈkjʊərɪti/

Etymology

The term "computer security" is derived from the English words "computer", which comes from the Latin word "computare" meaning "to calculate", and "security", which comes from the Latin word "securus" meaning "free from danger".

Related Terms

  • Information Security: The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
  • Network Security: The practice of preventing and protecting against unauthorized intrusion into corporate networks.
  • Internet Security: A branch of computer security specifically related to not only the Internet, but also network security as it applies to other applications or operating systems as a whole.
  • Cybercrime: A crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • Malware: Any software intentionally designed to cause damage to a computer, server, client, or computer network.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  • Antivirus Software: A program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
  • Encryption: The method by which information is converted into secret code that hides the information's true meaning.
  • Data Breach: The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  • Phishing: The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  • Virtual Private Network (VPN): A private network that has been extended across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  • Password Manager: A software application that helps a user store and organize passwords.

External links

Esculaap.svg

This WikiMD article is a stub. You can help make it a full article.


Languages: - East Asian 中文, 日本, 한국어, South Asian हिन्दी, Urdu, বাংলা, తెలుగు, தமிழ், ಕನ್ನಡ,
Southeast Asian Indonesian, Vietnamese, Thai, မြန်မာဘာသာ, European español, Deutsch, français, русский, português do Brasil, Italian, polski