Computer Security (or IT security, ICT security, Cyber security) is part of information security focused on safety related with information and communication technologies. Computer security includes the following subject areas:
- Network Security
- Internet Security
- Safety Equipment
- Cryptography (PKI and certification authorities, e-signature, e-archiving)
- Special means (interception, monitoring)
The objective of computer security is to prevent cyber-attacks and to ensure safe operation and thus reduce the likelihood of risks. Computer security concerns:
- Software and hardware design - so-called Secure by Design - guidelines (workflows) design; hardware and software from the ground up to meet the safety requirements
- Security Prevention - continued implementation of activities helping to maintain the level of risk at the required level, such as backup
- Attacks and threats detection
- Remediation (e.g. disaster recovery)
Computer Security in practice: Computer security concerns both terminal device (PCs, mobile devices) and all other parts of the IT infrastructure, particularly servers and computer networks. In practice, it is realized by using security software and / or using different hardware measures. The computer security is also affected by regular updates of the system or application software (especially operating system). Computer security involves roughly the following:
- Protection security against unauthorized physical manipulation with information technologies (e.g. theft)
- Secure access to data - ensuring authentication and authorization
- Protection security against tampering with data - protecting the integrity, confidentiality and availability
- Securing data backup (see Disaster Recovery)
- Protection security of software against theft (copyright protection - making illegal copies of software or data)
- Secure communication and data transfer (see Cryptography)
Computer security often falls within the responsibility of IT managers in large organizations, in cooperation with the manager of information security (CISO).
Comments
You cannot contribute to the discussion because it is locked