Skip to main content
Log in

Computer security

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

A strong factor in the early development of computers was security – the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by limiting physical access to them to their programmers and operators. Today, computers have shrunk so that a web server can be hidden in a matchbox and have become so common that few people can give an accurate count of the number they have in their homes and automobiles, much less the number they use in the course of a day. Computers constantly communicate with one another; an isolated computer is crippled. The meaning and implications of “computer security” have changed over the years as well. This paper reviews major concepts and principles of computer security as it stands today. It strives not to delve deeply into specific technical areas such as operating system security, access control, network security, intrusion detection, and so on, but to paint the topic with a broad brush.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Additional information

Published online: 27 July 2001

Rights and permissions

Reprints and permissions

About this article

Cite this article

Landwehr, C.E. Computer security. IJIS 1, 3–13 (2001). https://doi.org/10.1007/s102070100003

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s102070100003

Navigation