Concerns the protection of system resources and data from unauthorized use or access in stand alone or networked environments.
Security measures are implemented through a combination of software, hardware and physical restrictions. They can operate across different selections of content from individual files up to an entire networked enterprise.
Tools used to secure systems environments include authentication systems, intrusion detection systems, firewalls, anti-virus software, biometrics, virtual private networks and cryptography.
More information
More information
Subcategories 31
Related categories 6
Other languages 31
Last update:
December 12, 2023 at 7:55:04 UTC
Check out
Arts: People: C: Cusack, John
- Recently edited by merlin1
- Recently edited by merlin1