Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
Internet security
Automotive security
Cybersex trafficking
Cyberwarfare
Computer security
Mobile security
Network security
Advanced persistent threat
Computer crime
Vulnerabilities
Eavesdropping
Malware
Spyware
Ransomware
Trojans
Viruses
Worms
Rootkits
Bootkits
Keyloggers
Screen scrapers
Exploits
Backdoors
Logic bombs
Payloads
Denial of service
Web shells
Web application security
Phishing
Computer access control
Application security
Antivirus software
Secure coding
Secure by default
Secure by design
Secure operating systems
Authentication
Multi-factor authentication
Authorization
Data-centric security
Encryption
Firewall
Intrusion detection system
Mobile secure gateway
Runtime application self-protection (RASP)
Internet security
Automotive security
Cybersex trafficking
Cyberwarfare
Computer security
Mobile security
Network security
Advanced persistent threat
Computer crime
Vulnerabilities
Eavesdropping
Malware
Spyware
Ransomware
Trojans
Viruses
Worms
Rootkits
Bootkits
Keyloggers
Screen scrapers
Exploits
Backdoors
Logic bombs
Payloads
Denial of service
Web shells
Web application security
Phishing
Computer access control
Application security
Antivirus software
Secure coding
Secure by default
Secure by design
Secure operating systems
Authentication
Multi-factor authentication
Authorization
Data-centric security
Encryption
Firewall
Intrusion detection system
Mobile secure gateway
Runtime application self-protection (RASP)
No comments:
Post a Comment