Computer security software: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: url. URLs might have been anonymized. | Use this bot. Report bugs. | #UCB_CommandLine
m clean up, removed: {{!}} IEEE Journals & Magazine {{!}} IEEE Xplore
Line 7:
The subversion of [[computer]]s or their unauthorized use is referred to using the terms ''[[cyberwarfare]]'', ''[[cybercrime]]'', or ''[[Security hacker|security hacking]]'' (later shortened to ''hacking'' for further references in this article due to issues with ''[[hacker]]'', ''[[hacker culture]]'' and differences in [[White hat (computer security)|white]]/[[Grey hat|grey]]/[[Black hat (computer security)|black]] 'hat' color identification).
 
The computer security software products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by [[IBM]]'s [[Resource Access Control Facility]] and SKK's Access Control Facility 2.<ref>{{Cite web |title=The Origin and Early History of the Computer Security Software Products Industry {{!}} IEEE Journals & Magazine {{!}} IEEE Xplore |url=https://ieeexplore.ieee.org/abstract/document/7116464 |access-date=2023-12-13 |website=ieeexplore.ieee.org}}</ref>
 
==Types==
Line 30:
 
===Monitor access===
The purpose of these types of software systems is to monitor access to computers systems and data while reporting or logging the behavior. Often this is composed of large quantities of low priority data records / logs, coupled with high priority notices for unusual or suspicious behavior.
 
* [[Diagnostic program]]