Computer insecurity
Many current computer
systems have only limited
security precautions in
place. Serious financial
damage has been caused by
computer security breaches,
but reliably estimating
costs is quite difficult.
... > full story
Security engineering
Security engineering is the
field of engineering dealing
with the security and
integrity of real-world
systems. It is similar to
systems engineering in that
its motivation is to make a
system meet requirements,
... > full story
Computer security
Computer security is a field
of computer science
concerned with the control
of risks related to computer
use.
The means traditionally
taken to realize this
objective is to attempt to
... > full story
Cryptography
Cryptography is the field
concerned with linguistic
and mathematical techniques
for securing information,
particularly in
communications. The study of
how to circumvent the use of
cryptography is called
... > full story
Browse Reference Articles
1 to 10 of 119 articles
-
Computer virus
A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a ... > more -
Cyber security standards
Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > more -
Identity theft
Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > more -
Quantum computer
A quantum computer is any device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. In a ... > more -
Computer software
Software is a program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware). This includes application software such as a word processor, ... > more -
HTTP cookie
An HTTP cookie is a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server. Cookies have been of concern for Internet ... > more -
Hash function
A hash function or hash algorithm is a function for examining the input data and producing an output hash value. The process of computing such a value is known as ... > more
Search ScienceDaily
Number of stories in archives: 140,690

