Secure environment
Encyclopedia
In computing
, a secure environment is any system which implements the controlled storage and use of information. In the event of computing
data loss
, a secure environment is used to protect personal and/or confidential data.
Often, secure
environments employ cryptography
as a means to protect information.
Some secure environments employ cryptographic hashing
, simply to verify that the information has not been altered since it was last modified.
Computing
Computing is usually defined as the activity of using and improving computer hardware and software. It is the computer-specific part of information technology...
, a secure environment is any system which implements the controlled storage and use of information. In the event of computing
Computing
Computing is usually defined as the activity of using and improving computer hardware and software. It is the computer-specific part of information technology...
data loss
Data loss
Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data.Data loss is...
, a secure environment is used to protect personal and/or confidential data.
Often, secure
Secure
Secure may refer to:* Security, being protected against danger or loss** Securitate , the secret service of Communist Romania* Security , e.g. secured loans...
environments employ cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
as a means to protect information.
Some secure environments employ cryptographic hashing
Cryptographic hash function
A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the hash value, such that an accidental or intentional change to the data will change the hash value...
, simply to verify that the information has not been altered since it was last modified.
See also
- Data recoveryData recoveryData recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives , USB flash drive,...
- CleanroomCleanroomA cleanroom is an environment, typically used in manufacturing or scientific research, that has a low level of environmental pollutants such as dust, airborne microbes, aerosol particles and chemical vapors. More accurately, a cleanroom has a controlled level of contamination that is specified by...
- Mandatory access controlMandatory access controlIn computer security, mandatory access control refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target...
(MAC) - Trusted computingTrusted ComputingTrusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...