Computer security
- Wikidata
- https://www.wikidata.org/wiki/Q3510521
- OpenAlex ID
- https://openalex.org/C38652104 (API record)
- OpenAlex Description
- the protection of computer systems and networks from theft, damage, misuse or data leak
- OpenAlex Level [?]
- 1
Broader Concepts
Narrower Concepts
- Access control
- Acknowledgement
- Adversary
- Airport security
- Anonymity
- Approx
- Asset (computer security)
- Attack model
- Attack surface
- Authentication (law)
- Authorization
- Automatic Identification System
- Backdoor
- Battlespace
- Biometrics
- Bit (key)
- Blacklist
- Blacklisting
- Block cipher mode of operation
- Blockchain
- Bridging (networking)
- Broadcast communication network
- Broadcasting (networking)
- Brute force
- Business continuity
- CAPTCHA
- CHAOS (operating system)
- Camellia
- Campus network
- Capstone
- Card reader
- Cheque
- Classified information
- Collision
- Common Criteria
- Computer fraud
- Computer security model
- Computer users
- Computer virus
- Confidentiality
- Contingency plan
- Counterintelligence
- Credential
- Credit history
- Criminal record
- Critical infrastructure
- Crowds
- Crowdsensing
- Crypt
- Cryptocurrency
- Cryptography
- Cyber threats
- Cyber-attack
- Cyberwarfare
- Data Protection Act 1998
- Data breach
- Data deduplication
- Data integrity
- Data retention
- Database security
- Default gateway
- Dig
- Digital forensics
- Digital rights
- Digital rights management
- Distributed File System
- Downgrade
- Eavesdropping
- Echo (communications protocol)
- Electronic surveillance
- Emergency procedure
- Encapsulation (networking)
- Encryption
- End-to-end principle
- Enterprise information security architecture
- Enterprise private network
- Ephemeral key
- Escrow
- Exploit
- FREAK
- Feedback loop
- Fingerprint (computing)
- Fortuna
- Fugue (hash function)
- Full disclosure
- GOST (hash function)
- Hacker
- Handshaking
- Hash function
- Heartbeat
- Home security
- Honeypot
- Identity theft
- Incident management
- Incident report
- Incident response
- Industrial espionage
- Information Operations
- Information leakage
- Information policy
- Information privacy
- Information protection policy
- Information security
- Information sensitivity
- Information warfare
- Integrated services
- Intelligence analysis
- Internet of Things
- Intrusion detection system
- Key (lock)
- Keystroke logging
- LEVIATHAN (cipher)
- Location data
- Login
- MAC address
- Malware
- Misinformation
- Mobile banking
- Mulligan
- Multicast
- Need to know
- NetFlow
- Network Access Protection
- Network address
- Network administrator
- Network architecture
- Network packet
- Network security
- Network service
- Network-centric warfare
- Obfuscation
- Opt-in email
- Organizational unit
- Overdraft
- Padding
- Panama
- Password
- Pepper
- Personally identifiable information
- Physical security
- Ping (video games)
- Preventive action
- Principal (computer security)
- Privacy protection
- Private information retrieval
- Private network
- Privilege (computing)
- Proxy server
- Public records
- RADIUS
- Rabbit (cipher)
- Radio-frequency identification
- Rambutan
- Random number generation
- Real-time communication
- Red Cell
- Retention rate
- Right to privacy
- Risk assessment
- SAFER
- SAINT
- STRIDE
- Seclusion
- Secrecy
- Security analysis
- Security community
- Security domain
- Security guard
- Security management
- Security policy
- Security system
- Security token
- Self-service
- Shared resource
- Skein
- Smart card
- Social engineering (security)
- Spoofing attack
- Subnetwork
- SwIPe
- System administrator
- Tactical communications
- Tamper resistance
- Tempest
- Threat assessment
- Threat model
- Ticket
- Tiger
- Timestamp
- Traffic analysis
- Traffic flow (computer networking)
- Transparency (behavior)
- Transshipment (information security)
- Trojan
- Trojan horse
- Trust management (information system)
- Trusted Computing
- Trusted Platform Module
- Trusted third party
- Trustworthiness
- Universal Plug and Play
- VEST
- Ven
- Vetting
- Virtual LAN
- Vulnerability (computing)
- Zombie
- nobody
Associated Authors
- A. R. E. Taylor
- A.R. Siders
- Ahmad Shaqeer Mohamed Thaheer
- Ahmed Elkouk
- Ahmed Yosri
- Akshay Aravamudan
- Alexis L. Robinson
- Allyson Bieryla
- Alysha Helmrich
- Andrea Romina Díaz Gómez
- Anissa Vogel
- Anuj Prakash Kushwaha
- Apoorva Singh
- Areidy Aracely Beltran-Peña
- Arun Kumar Dubey
- Asphota Wasti
- B. F. Whiting
- Babak Jalalzadeh Fard
- Balaji Ramesh
- Bandana Kar
- Bistra Dilkina
- Blair Edwards
- C. A. Norlen
- C. S. Reynolds
- Cameron Fischer
- Caroline Dorn
- Chad Trabant
- Charles F. Gammie
- Chet Ruszczyk
- Christopher T. Emrich
- D. Heißelmann
- Daniel J. D’Orazio
- Daniela Molinari
- David E. Gorelick
- David N. Bresch
- David Typinski
- Denis Macharia
- Denzil Daniel
- Dylan A. Vasey
- Dylan D. Miller
- E. Nishchitha S. Silva
- Elisa Savelli
- Enes Yildirim
- Erin Antognoli
- Erin Flowers
- F. J. Pozuelos
- Gabriel Török
- Gang Zhao
- George K. Darkwah
- Guillaume Coiffier
- Guy Litt
- Hang Wu
- Harro Jongen
- Helen G. Siegel
- Honghu Liu
- Hwisong Kim
- Ian Cunnyngham
- Idowu Ajibade
- Ignacio Gatti
- Janine A. Baijnath‐Rodino
- Jeaneth Machicao
- Jeffery M. Valenza
- Jerry Carter
- Johanna Mård
- John C. Aragon
- Jonas Haldemann
- Joshua N. Winn
- Jungha Woo
- Justin Krier
- K. Willi
- Karianne J. Bergen
- Kathryn C. Conlon
- Kazi Hamidul Islam
- Kees van Ginkel
- Kelly Devlin
- Kim Ely
- Kumar Gaurav
- L. M. Carter
- Larry Syu-Heng Lai
- Laura Blackstone
- Laura E. R. Peters
- Laura Szczyrba
- Lauren Dennis
- Lei Huang
- Leo C. Stein
- Lionel Garcia
- Lisa Thalheimer
- Louis Chauvet
- Lucila Houttuijn Bloemendaal
- Lujia Zhang
- Luuk van Agtmaal
- Majid Zaremehrjardy
- Manuel Schilling
- Mariah R. Jenkins
- Marina Baldissera Pacchetti
- Marleen de Ruiter
- Marthe Wens
- Masahiko Haraguchi
- Masoud Zaerpour
- Matteo Spada
- Maxwell C. Cook
- Mazhuvanchery Avarachen Sherly
- Md Faishal Yousuf
- Meredith P. Goins
- Michael H. Darin
- Michael Hearne
- Mollie D. Gaines
- Muntasir Raihan Rahman
- Narcisa G. Pricope
- Natalia C. Villanueva
- Nathan Morrow
- Nicholas P. Simpson
- Nina Berlin Rubin
- Nirdesh Sharma
- Noelle K. Patterson
- P. C. Griffith
- P. J. Wheatley
- P. Varnière
- Panagiotis D. Oikonomou
- Paula do Vale Pereira
- Philipp Baumeister
- Presley Greer
- Prithviraj Pramanik
- R. G. West
- Rabin Bastola
- Rachel E. Volentine
- Ramesh Narayan
- Raphaël de Plaen
- Renjie Zhou
- Ritsuya Shibata
- Rosa I. Cuppari
- Roshan Rathod
- Ryan C. Johnson
- Ryan Hofmann
- Ryunosuke Akiba
- Saraswati Thapa
- Sarina Patel
- Seung Hee Kim
- Shoobhangi Tyagi
- Stefano Ubbiali
- Swarup Dangar
- Tao Zhang
- Tarul Sharma
- Tess Doeffinger
- Timothy Foster
- Tod R. Lauer
- Urmin Vegad
- Vahid Teknik
- Vinod Chandra
- Wiesław Fiałkiewicz
- Xiangnan Zhou
- Xingyu Chen
- Yeowon Kim
- Åke Fagereng
Add Incoming Edge
Login via ORCiD to contribute.
Add Outgoing Edge
Login via ORCiD to contribute.