About This Chapter
Computer Security: Chapter Summary
Regardless of whether you are protecting your own computer data or the data belonging to an organization, computer security is a major concern in our modern age. This chapter covers basic concepts of computer security, such as an analysis of threats to watch out for, how to handle those threats, and tips for preventative methods.
You can go through this information at your own pace, since all of our materials are viewable online 24/7. Whether you want to complete the entire chapter in a day or only view a few key lessons, you have the ability to control how much information you go through. Your personal user dashboard may also make recommendations on additional chapters you can review to further enhance your skills.
Topics reviewed in this chapter include:
- Computer security fundamentals
- Descriptions of computer security risks
- Computer security history and types
- Tips and best practices in computer security
- Examples of computer security policies
- Issues associated with cloud computing
- Protocols for database security management
1. What is Computer Security? - Definition & Basics
This lesson defines computer security as a part of information security. It describes hardware, software, and firmware security. Common practices for implementing computer security are also included.
2. What is a Computer Security Risk? - Definition & Types
Your computer is at risk! It's all over the news. We hear it every day, but what does that mean? What is a computer security risk? In this lesson, we'll define it and give some examples.
3. Types of Computer Security
From financial records to national defense, computers play a critical role in many activities, and with this power comes the need for security. In this lesson, you'll learn about the different types of computer security and controlling access from inside and out.
4. Computer Security Best Practices & Tips
This lesson will address how best to stay safe when having a computer on the internet, specifically in password creation, site safety and email usage.
5. What is Zero Day Vulnerability?
While Zero Day Vulnerability may sound more like a spy movie than a computer security concern, the fact is that it remains one of the worst possible jobs that a software developer must face.
6. Computer Security History
Discover how Computer Security came to be and its history. Can you imagine doing online shopping in a world that has no security? Our identities would be compromised!
7. Computer Security Policies Examples
This lesson provides an explanation as to how and why a policy is formed as a basis for understanding the driving forces behind computer security policies. Common computer security policies and examples are discussed.
8. Cloud Computing Security Issues
This lesson will cover issues with cloud computing. With so many companies storing data in the cloud, it is important that you take a step back and evaluate the security issues surrounding having data stored off-site.
9. Database Security Management
For data to be secure all the systems around the data should be secured. In this lesson, we'll learn about the threats to database systems today and the processes and procedures used to protect the confidentiality of a database system.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Information & Computer Security Training course