Security in computing
Information Security Management Handbook
Information Security Management Handbook
Cryptography and data security
Cryptography and data security
Computer Security Handbook
Hi-index | 0.00 |
Preserving the security of data such as a payroll file or digitized graphical image necessarily requires consideration of the security of the entire computing system--its hardware, software (q.v.), firmware (q.v.), and internal data. For example, it is impossible to protect just data if the programs that access and potentially modify that data have been corrupted. In the Internet (q.v.) age, data security has become of paramount importance because of the literally millions of users in cyberspace (q.v.) who might, accidentally or otherwise, invade and compromise the integrity of data on the computer calling into the Net.