Computer security software: Difference between revisions

Content deleted Content added
m Reverted edits by 182.1.181.6 (talk) to last version by Rkieferbaum
mNo edit summary
Tag: Reverted
Line 7:
The subversion of [[computer]]s or their unauthorized use is referred to using the terms ''[[cyberwarfare]]'', ''[[cybercrime]]'', or ''[[Security hacker|security hacking]]'' (later shortened to ''hacking'' for further references in this article due to issues with ''[[hacker]]'', ''[[hacker culture]]'' and differences in [[White hat (computer security)|white]]/[[Grey hat|grey]]/[[Black hat (computer security)|black]] 'hat' color identification).
 
The [https://digitaltechte.com/computer-security-software-protecting-your-devices-from-threats-and-vulnerabilities/ computer security software] products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by [[IBM]]'s [[Resource Access Control Facility]] and SKK's Access Control Facility 2.<ref>{{Cite journal |title=The Origin and Early History of the Computer Security Software Products Industry |url=https://ieeexplore.ieee.org/document/7116464 |access-date=2023-12-13 |journal=IEEE Annals of the History of Computing|date=2015 |doi=10.1109/MAHC.2015.21 |last1=Yost |first1=Jeffrey R. |volume=37 |issue=2 |pages=46–58 }}</ref>
 
==Types==