ManagementMania AppMania EduMania JobMania BusinessPages


What is Computer Security
Computer Security (or IT security, ICT security, Cyber security) is part of information security focused on safety related with information and communication technologies.

Computer Security (or IT security, ICT security, Cyber security) is part of information security focused on safety related with information and communication technologies. Computer security includes the following subject areas:

  • Network Security
  • Internet Security
  • Safety Equipment
  • Cryptography (PKI and certification authorities, e-signature, e-archiving)
  • Special means (interception, monitoring)

The objective of computer security is to prevent cyber-attacks and to ensure safe operation and thus reduce the likelihood of risks. Computer security concerns:

  • Software and hardware design - so-called Secure by Design - guidelines (workflows) design; hardware and software from the ground up to meet the safety requirements
  • Security Prevention - continued implementation of activities helping to maintain the level of risk at the required level, such as backup
  • Attacks and threats detection
  • Remediation (e.g. disaster recovery)

Computer Security in practice: Computer security concerns both terminal device (PCs, mobile devices) and all other parts of the IT infrastructure, particularly servers and computer networks. In practice, it is realized by using security software and / or using different hardware measures. The computer security is also affected by regular updates of the system or application software (especially operating system). Computer security involves roughly the following:

Computer security often falls within the responsibility of IT managers in large organizations, in cooperation with the manager of information security (CISO).

Related terms and methods:

Related profession:

Related standards:

Related management field:

previous next
Did this article help you?
Rating:
Last update: 08.07.2015

Comments



To enter the discussion you must be signed in

Sign in


Related consulting companiesmore...