Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.
Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer.
methods or systems to prevent any event or action that could cause a loss of or damage to computer hardware, software, data and information
Measures and controls that ensure confidentiality, integrity, and^ availability of information systems assets including hardware, software, firmware, and information being processed, stored, and communicated (NSTISSI 1997).
Protection of one's computer system from computer viruses, hackers, logic bombs, and other such threats. [SMB
The discipline, techniques, and tools designed to help protect the confidentiality, integrity, and availability of data and systems.
The protection of information through the use of technology, processes, and training.
Protection of information while it's being processed or stored.
Technological and managerial procedures applied to MIS to ensure the availability, integrity, and confidentiality of information managed by the MIS. See also: Information System Security.