Concerns the protection of system resources and data from unauthorized use or access in stand alone or networked environments. Security measures are implemented through a combination of software, hardware and physical restrictions. They can operate across different selections of content from individual files up to an entire networked enterprise. Tools used to secure systems environments include authentication systems, intrusion detection systems, firewalls, anti-virus software, biometrics, virtual private networks and cryptography.
Related categories 6
Other languages 31
Last update:December 7, 2016 at 22:24:04 UTC