Computer security


Topic | v1 | created by jjones |
Description

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.


Relations

parent of Continuous authentication

Continuous authentication is a method of identity confirmation on an ongoing basis. Instead of a user...

subtopic of Computer science

Computer science is the study of computation and information. Computer science deals with theory of c...

parent of Password reset

Reset password is the action of invalidating the current password for an account on a website, servic...

relates to Security hacker

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in...

parent of Bitsquatting

Bitsquatting is a form of cybersquatting which relies on bit-flip errors that occur during the proces...

uses Google blacklist

Google quarantines around 10,000 suspicious websites every day and puts them on a “Google blacklist”....

parent of Authorization

Authorization is the function of specifying access rights/privileges to resources, which is related t...

parent of Password manager

A password manager is a computer program that allows users to store, generate, and manage their passw...

parent of Zero-knowledge proof

In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (th...


Edit details Edit relations Attach new author Attach new topic Attach new resource
Resources

treated in Security Economics

10.0 rating 2.0 level 8.5 clarity 3.5 background – 2 ratings

treated in TryHackMe | Learn Cybersecurity

Making it easier to break into security, all through your browser.

treated in Darknet Diaries – True stories from the dark side of the Internet.

This is a podcast about hackers, breaches, shadow government activity, hacktivism, cybercrime, and al...