Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

security

The policies, practices, and procedures that are applied to information systems to ensure that the data and information that is held within or communicated along those systems is not vulnerable to inappropriate or unauthorized use, access, or modification and that the networks that are used to store, process, or transmit information are kept operational and secure against unauthorized access. As the Internet becomes a more fundamental part of doing business, computer and information security are assuming more importance in corporate planning and policy.

The policies, practices, and procedures that are applied to information systems. Securing your information systems ensures that the data that is communicated among and maintained within those systems is not vulnerable to inappropriate or unauthorized use, access, or modification. It also ensures that the networks that are used to store, process, or transmit information are kept operational and secure.