In computing, security is protection against unauthorized access to, or alteration of, information and system resources including CPUs, storage devices and software.[1]
Computer security terms[]
- Access control - ensuring that users can access the resources, and only the resources, that they are authorized to.
- Authentication - determining whether a user is who they claim to be.
- Confidentiality - preventing unauthorized access; integrity - preventing or detecting unauthorized modification of information.
- Encryption - an important technique used to protect data security.
- Non-repudiation - proof that a message came from a certain source.
- Privacy - allowing people to know and control how information is collected about them and how it is used.
- Uptime / availability - ensuring that a system is operational and accessible to authorized users despite hardware or software failures or attack.
Security can also be considered in the following related terms:
- Network security - protecting network and telecommunications equipment, protecting network servers and transmissions, combatting eavesdropping, controlling access from untrusted networks, firewalls, and intrusion detection.
- Operational / procedural security - who is authorized to do or responsible for doing what and when, who can authorize others to do what and who has to report what to who.
- Personnel security - hiring employees, background screening, training, security briefings, monitoring and handling departures.
- Physical security - what else can touch the system to affect it, protection against the physical environment - heat, earthquake, etc.
- System security - User access and authentication controls, assignment of privilege, maintaining file and filesystem integrity, backup, monitoring processes, log-keeping, and auditing.
Usage in Apple platforms[]
- iOS and iPadOS users can secure their mobile device by setting Face ID or Touch ID along with a passcode.
- macOS users with administrator permissions can access the Security & Privacy pane of System Preferences. Passwords can be set in the Users & Groups pane.
- An Apple ID can be used to enable Activation Lock on a supported iPhone, iPad, or Mac for further protection in case it is stolen.[2][3]
References[]
- ↑ Security at the Free On-Line Dictionary Of Computing. 2007-10-05.
- ↑ Activation Lock for iPhone, iPad, and iPod touch, Apple Support. 2020-04-27.
- ↑ Activation Lock for Mac, Apple Support. 2021-05-17.