Sunday, March 9, 2008

Computer security

Abount Computer security
AVG CPC:$8.70

The term Computer Security can refer to a product, or a service, or a branch of technology known as information Security as it applies to Computers. The objective varies, and can include protection of information from theft, corruption or preservation of availability, as defined in the Security policy.

Computer Security imposes requirements on Computers that are different from most system requirements because they often take the form of constraints on what Computers are not supposed to do. This makes Computer Security particularly challenging because we find it hard enough just to make Computer programs just do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most Computer programs. Computer Security provides a technical strategy to convert negative requirements to positive enforceable rules. For this reason, Computer Security is often more technical and mathematical than some Computer science fields.

Typical approaches to Computer Security (in approximate order of strength) can include the following:

• Physically limit access to Computers to only those who will not compromise Security.

• Hardware mechanisms that impose rules on Computer programs, thus avoiding depending the Computer programs for Computer Security.

• Operating system mechanisms that impose rules on programs to avoid trusting Computer programs.

• Programming strategies to make Computer programs dependable and resist subversion.


Content from wikipidia

No comments: