A-Z Popular Blog Security Search »
Information Security
Simplicable Guide
Related Guides

What is Defensive Computing?

 , November 22, 2016
Defensive computing is when users take basic precautions to reduce information security risks. This includes basic awareness of attack patterns such as links sent by spam emails. Defensive computing can be characterized as a cautious approach to computing such as only installing programs you trust from a trusted source. It can also include the use of security tools and techniques such as encryption. The following are examples of defensive computing techniques.
If you enjoyed this page, please consider bookmarking Simplicable.


A definition of sandbox with examples.

Strong Password

A few examples of what makes a password strong or weak.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.

Privacy By Design

An overview of privacy by design.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks Examples

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Privacy Examples

The definition of privacy with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map