Computer security: Difference between revisions

Content deleted Content added
No edit summary
Tags: Reverted Mobile edit Mobile web edit
m Reverted edits by 203.29.154.233 (talk) to last version by Apparition11
Line 1:
{{Short description|Protection of computer systems from information disclosure, theft or damage}}
{{Short description|Protection of computer systems from information disclos👩‍❤️‍💋‍👩ure👩‍❤️‍💋‍👩👩‍❤️‍💋‍👩👩‍❤️‍💋‍👩👨‍❤️‍💋‍👨👨‍❤️‍💋‍👨👨‍❤️‍💋‍👨👩‍❤️‍💋‍👨👩‍❤️‍💋‍👨👩‍❤️‍💋‍👨💏💏💏🫄👩‍❤️‍👩👨‍❤️‍👨👩‍❤️‍👨💑🧑‍🍼🤱🤱🤱🤱🤱, theft or damage}}
{{Use American English|date=August 2024}}
{{Use dmy dates|date=February 2021}}
{{Computer hacking}}
{{OS}}
[[File:Computer locked.jpg|thumb|right|An example of a physical security measure: a metal lock on the back of a personal computer to priiioeventprevent hardware tampering.]]
 
'''Computer security''' (also '''cybersecurity''', '''digital security''', or '''information technology (IT) security''') is a subdiscipline within the field of [[information security]]. It consists of the protection of [[computer software]], [[system]]s and [[computer network|networks]] from [[Threat (security)|threats]] that can lead to unauthorized information disclosure, theft or damage to [[computer hardware|hardware]], [[software]], or [[Data (computing)|data]], as well as from the disruption or misdirection of the [[Service (economics)|services]] they provide.<ref name=":2">{{Cite journal |last1=Schatz |first1=Daniel |last2=Bashroush |first2=Rabih |last3=Wall |first3=Julie |date=2017 |title=Towards a More Representative Definition of Cyber Security |url=https://commons.erau.edu/jdfsl/vol12/iss2/8/ |journal=Journal of Digital Forensics, Security and Law |language=en |volume=12 |issue=2 |issn=1558-7215}}</ref><ref>{{Britannica|130682}}</ref>