| |
Defensive computing is when users take basic precautions to reduce information security risks. This includes basic awareness of attack patterns such as links sent by spam emails. Defensive computing can be characterized as a cautious approach to computing such as only installing programs you trust from a trusted source. It can also include the use of security tools and techniques such as encryption. The following are examples of defensive computing techniques.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|