Table of Contents

Outline of computer security

Short description: Overview of and topical guide to computer security

The following outline is provided as an overview of and topical guide to computer security:

Computer security; security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance in line with the increasing reliance on computer systems of most societies worldwide.1) Computer security includes measures taken to ensure the integrity of files stored on a computer or server as well as measures taken to prevent unauthorized access to stored data, by securing the physical perimeter of the computer equipment, authentication of users or computer accounts accessing the data, and providing a secure method of data transmission.

Essence of computer security

Computer security can be described as all of the following:

Areas of computer security

:* Computer access control; includes authorization, authentication, access approval, and audit. :::Authentication ::::* Knowledge-based authentication :::::* Integrated Windows Authentication ::::* Password :::::* Password length parameter :::::* Secure Password Authentication :::* Secure Shell :::* Kerberos (protocol) :::* SPNEGO :::* NTLMSSP :::* AEGIS SecureConnect :::* TACACS

Computer security threats

The variety of threats combined with the rapid development of new threats has made cyber insecurity and the removal of information assurance the 'status quo'. As long as man continues to use the computer, man will also takes interest in manipulating, modifying, creating and bypassing 'rules' and 'security standards.'

The most common and effective method of violating computer security protocols is Phishing; Phishing is the process of providing a cloned login page for a site the victim uses, for example, Google's Gmail - once the user enters his/her login information, the data is captured and access to the victims account is gained.

Many corporations executive's, mid-ranking managers and even low level staff of many current U.S. corporations have no idea that a malicious user is quietly and passively intercepting their communications. Why? A strong motivation is the theft of Intellectual Property. Often victims of phishing either never become aware there privacy has been breached, or many months pass before they become aware that their privacy has been lost.2)

Methods of Computer Network Attack and Computer Network Exploitation

Social engineering is a frequent method of attack, and can take the form of phishing, or spear phishing in the corporate or government world, as well as counterfeit websites.

Computer defenses and security measures

Access control

Access control; selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Application security

Application security

Data security

Data security; protecting data, such as a database, from destructive forces and the unwanted actions of unauthorized users.<ref name=“Summers, G. 2004 p4-5”/>

Information privacy

Mobile security

Network security

World Wide Web Security

History of computer security

Computer security industry

Computer security software

Testing labs

independent organization which evaluates and rates antivirus and security suite software for Microsoft Windows and Android operating systems, according to a variety of criteria. Every other month, the researchers publish the results of their testing, where they list which products they awarded their certification.

Computer security companies

Computer security publications

Journals and magazines

Books on computer security

Books on cryptography

Cyber security community

Cyber security communities

Computer security organizations

Academic

Commercial

See also: Computer security companies, above

Government agencies

Law enforcement agencies

Internet police; police and secret police departments and other law enforcement agencies in charge of policing the Internet. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship, propaganda, and monitoring and manipulating the online public opinion.

Independent non-profits

Independent web-sites

Persons influential in computer security

See also

Rubber-hose cryptanalysis

Clear

Clear may refer to:

Snippet from Wikipedia: Clear

Clear may refer to:

  • Transparency, the physical property of allowing light to pass through

Disambiguation

Disambiguation in a Wiki is the process of resolving conflicts that arise when a potential article title is ambiguous, most often because it refers to more than one subject covered by this Wiki, either as the main topic of an article, or as a subtopic covered by an article in addition to the article's main topic.

See Wikipedia:Disambiguation on Wikipedia

Disambiguation

Disambiguation in a Wiki is the process of resolving conflicts that arise when a potential article title is ambiguous, most often because it refers to more than one subject covered by this Wiki, either as the main topic of an article, or as a subtopic covered by an article in addition to the article's main topic.

See Wikipedia:Disambiguation on Wikipedia


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.



© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


References

; Windows 7 security

; Windows 8 security

; Mac security

; Linux security

; Threat alerts and vulnerability tracking lists

Computer security

Outline of computer security

2)
Kristopher Richey
3) , 8)