Outline of computer security

The following outline is provided as an overview of and topical guide to computer security:

Computer security security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance in line with the increasing reliance on computer systems of most societies worldwide.[1] Computer security includes measures taken to ensure the integrity of files stored on a computer or server as well as measures taken to prevent unauthorized access to stored data, by securing the physical perimeter of the computer equipment, authentication of users or computer accounts accessing the data, and providing a secure method of data transmission.

Essence of computer security

Computer security can be described as all of the following:

Areas of computer security

Authentication

Computer security threats

Security breach breaches of computer security can take many forms, and can include failure to properly dispose of or account for copies of confidential or sensitive information, poor password practices, browser security issues and unpatched applications, open ports, failure to enforce procedures for physical access among others. Social engineering is a frequent method of attack, and can take the form of phishing, or spear fishing in the corporate or government world, as well as counterfeit websites.

Computer defenses and security measures

Access control

Access control selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Application security

Application security

Data security

Data security protecting data, such as a database, from destructive forces and the unwanted actions of unauthorized users.[2]

Information privacy

Mobile security

Network security

World Wide Web Security

History of computer security

Computer security industry

Computer security software

Testing labs

independent organization which evaluates and rates antivirus and security suite software[6] for Microsoft Windows and Android operating systems,[7] according to a variety of criteria. Every other month, the researchers publish the results of their testing,[8][9] where they list which products they awarded their certification.[10] The organisation is based in Magdeburg, in Germany.[8][10]

Computer security companies

Computer security publications

Journals and magazines

Books on computer security

Books on cryptography

Cyber security community

Cyber security communities

Computer security organizations

Academic

Commercial

See also: Computer security companies, above

Government agencies

Law enforcement agencies

Internet police police and secret police departments and other law enforcement agencies in charge of policing the Internet. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship, propaganda, and monitoring and manipulating the online public opinion.

Independent non-profits

Independent web-sites

Place these in the subsections above

Persons influential in computer security

See also

Rubber-hose cryptanalysis

References

  1. "Reliance spells end of road for ICT amateurs", May 07, 2013, The Australian
  2. 1 2 Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
  3. "Keylogger". Oxford dictionaries.
  4. "Rootkits, Part 1 of 3: The Growing Threat" (PDF). McAfee. 2006-04-17. Archived from the original (PDF) on 2006-08-23.
  5. Microsoft Technet. "Virtual Private Networking: An Overview".
  6. Harley, David (2011). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 487. ISBN 9780080558660. Retrieved 2013-06-10.
  7. Rosenblatt, Seth (2013-03-15). "Android antivirus apps improve their grades". cnet. CBS Interactive. Retrieved 2013-06-10.
  8. 1 2 Owano, Nancy (2013-01-18). "Microsoft Security Essentials misses AV-Test Certified status". PhysOrg. Douglas, Isle of Man: Omicron Technology Ltd. Retrieved 2013-06-10.
  9. Rosenblatt, Seth (2013-04-08). "Windows 8's rising security tide raises all antivirus boats". cnet. CBS Interactive. Retrieved 2013-06-10.
  10. 1 2 Rubenking, Neil J. (2013-01-16). "Microsoft and Others Fail Antivirus Test". PC Magazine. Ziff Davis. Retrieved 2013-06-10.
  11. "About McAfee" (PDF). 20 September 2012.
  12. "Intel Completes Acquisition of McAfee". McAfee News. 28 February 2011.
  13. "Intel in $7.68bn McAfee takeover". BBC News. 19 August 2010.
  14. Article on VentureBeat
  15. CERIAS home page
  16. "Georgia Tech Information Security Center History". Archived from the original on 2007-08-11. Retrieved 2007-08-01.
  17. "About AISA". https://www.aisa.org.au/about-aisa/. Retrieved 19 November 2014. External link in |website= (help)
  18. "Microsoft Digital Crimes Unit". Microsoft in Public Safety & National Security. Redmond, WA: Microsoft. Retrieved 2013-11-15. External link in |website= (help)
  19. "Archived copy". Archived from the original on 2009-02-08. Retrieved 2009-04-25.
  20. CCIS, Center for Cyber and Information Security -. "Norwegian Cyber Defence | Center for Cyber and Information Security". Center for Cyber and Information Security. Retrieved 2017-02-13.
  21. "Air Force senior leaders take up key decisions". Air Force Link. United States Air Force. 7 October 2008. Archived from the original on 17 October 2008. Retrieved 22 October 2008.
  22. "DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)" (PDF). DoDD 5505.13E. Retrieved 18 May 2011.
  23. "Ten Years After: The FBI Since 9/11". FBI.gov. Federal Bureau of Investigation. Retrieved 20 November 2014.
  24. 1 2 Cyber Crime, p. 2 ()
  25. "Mission & Strategy". www.nsa.gov. Retrieved 2017-02-13.
  26. "About the National Cybersecurity and Communications Integration Center". Retrieved September 4, 2013.
  27. "US-CERT Infosheet Version 2" (PDF). Retrieved September 4, 2013.
  28. U.S. Department of Defense, Cyber Command Fact Sheet, 21 May 2010 http://www.stratcom.mil/factsheets/2/Cyber_Command/
  29. Danny Yadron, John McAfee at Def Con: Don’t Use Smartphones, The Wall Street Journal, August 08, 2014
  30. "Phil Zimmerman's Homepage: Background". Retrieved 2012-01-12.
Windows 7 security
Windows 8 security
Mac security
Linux security
Threat alerts and vulnerability tracking lists
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.