Meet the Guide Editor
Message from the Editor:
Computer security has changed considerably over the last few years because computers can perform many more tasks than just processing information. They can be e-mail, or database servers; they can operate in a proxy setting, i.e. pretending to be one type of computer but actually being another.
Editor Article Picks:
Computer Security Contributors

Computer Security Guide

Computer security encompasses many different areas like encryption, identification certificates, password control, user authentication, user privileges, hardware and software firewalls. Computer security also has changed over the years because viruses, worms, and hacker attacks have become more sophisticated, and broad based. Hacker attacks can come from anywhere in the world, directed to any location in the world. Computer security can be about protecting hardware, software, and network operations. It can also be about controlling what happens to computers and software within a network, not just preventing attacks from outside. It can be about managing the right operations in a computer network system. The Bright Hub guide to computer security can provide articles and information about how to protect your computer both at the hardware and software levels.

Computer Security

 

Source: http://www.schoolcounselor.com/resources/computer-security.htm

 

Latest Articles on Computer Security
Belarc Advisor Review

Belarc Advisor assists a user by creating a snapshot of the system, in the form of a detailed report. It contains details about various components of a system, including installed software...

What Is Your Employer's Computer Security Policy?

Many employers have the same rules when it comes to formulating a computer security policy - make sure you know what they are!...

Understanding Computer Security - Types of Computer Security

Though understanding computer security needs much study, I have tried to compile all types of computer security in concise and comprehensible format. Among different types of computer...

How to be a CSIR Professional

Do you have what it takes to be a CSIR expert? Well, if you are up to it, certification is available to test your knowledge and skills in preventing, detecting and analyzing computer...

Most Popular Articles on Computer Security
  •  
    Understanding Computer Security - Types of Computer Security

    Though understanding computer security needs much study, I have tried to compile all types of computer security in concise and comprehensible format. Among different types of computer security, I assume...

  •  
    A Closer Look at Network Vulnerabilities: Risks, Threats and Attacks

    Organizations are constantly being hit by network security vulnerabilities. Knowing how to detect network vulnerabilities and how to combat them may just help save (and protect) the company's...

  •  
    Database Security

    Threats and risks to databases have increased and therefore, the need for securing databases has also increased. Let's learn about the basic facets of database security, including assurance, integrity...

  •  
    Dell Responds to Data Security Requirements

    With data protection ever more important, Dell is one of several major computer manufacturers are taking steps to provide the end user with encryption tools....

  •  
    The Security Risks of Using a Public Computer

    On the road without a laptop? Should you use that public system in a library, airport or coffee shop? When it comes to computer security, free access can cost you big time....

More About Computer Security
Comprehensive Security: The Most Effective Types of Computer Security

Computer security is something which is best accomplished by numerous elements working in conjunction. No one single type of software can get the job done on its own. This guide takes...

Best Computer Security Training – Which Training is the Best

The best computer security training should try to cover almost all aspects of computer and network security. This includes the Internet as well. This article explains CISSP as best...