computer security


Also found in: Thesaurus, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.
Related to computer security: Network security

computer security

The protection resulting from all measures to deny unauthorized access and exploitation of friendly computer systems. Also called COMPUSEC. See also communications security.
References in periodicals archive ?
Speaking on the fringes of the 7th Meetings of Professionals of Computer Security Systems organised, Tuesday in Tunis, he added that a draft reconsidering Circular No.
The conference allowed researchers with mature projects in Europe and North America to interact closely with North African researchers working on fledgling computer security programs.
Rayservers offers multiple, integrated computer security solutions to protect your financial transactions and information privacy from attack.
KeyChain enhances computer security in a number of ways.
Employing various computer security strategies and practical examples, the book discusses simple, easy-to-use methods for protecting corporate information and assets that all employees can smoothly implement.
The intent of the Maine program is to foster awareness of computer security as a career choice and perhaps to turn some of these students into Maine-based computer security specialists.
The most common computer security breaches, experts said, come from disgruntled or former employees who know the company's system.
When computer security is breached, the professional and business credibility of the organization responsible for the compromised system drops rapidly.
According to the International Computer Security Association, more than 10,000 already are identified, and more than 200 new ones are created monthly.
An annual report compiled by the Computer Security Institute in San Francisco, California, and the FBI provides a variety of statistics on computer crime by surveying computer security practitioners in both the private and public sectors.
Computer security prior to the Internet was relatively easy.
Or at least that is the way it seems to many systems administrators who have to stay on top of viruses and other computer security "Achilles heels.

Full browser ?