Computer security in the context of "Digital and Intelligence Service"

⭐ In the context of the Digital and Intelligence Service, increased investment in computer security capabilities is primarily attributed to…

Ad spacer

⭐ Core Definition: Computer security

Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It focuses on protecting computer software, systems, and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The growing significance of computer insecurity reflects the increasing dependence on computer systems, the Internet, and evolving wireless network standards. This reliance has expanded with the proliferation of smart devices, including smartphones, televisions, and other components of the Internet of things (IoT).

↓ Menu

>>>PUT SHARE BUTTONS HERE<<<

👉 Computer security in the context of Digital and Intelligence Service

The Digital and Intelligence Service (DIS) is the digital service branch of the Singapore Armed Forces (SAF) responsible for providing military intelligence to the armed forces, building up the country's digital defence capabilities, and protecting the psychological defence of its military personnel. It was established on 28 October 2022, in response to the increased number of attacks by non-state actors, and the resulting damage from the Russo-Ukrainian cyberwarfare.

↓ Explore More Topics
In this Dossier

Computer security in the context of Computer science

Computer science is the study of computation, information, and automation. Included broadly in the sciences, computer science spans theoretical disciplines (such as algorithms, theory of computation, and information theory) to applied disciplines (including the design and implementation of hardware and software). An expert in the field is known as a computer scientist.

Algorithms and data structures are central to computer science.The theory of computation concerns abstract models of computation and general classes of problems that can be solved using them. The fields of cryptography and computer security involve studying the means for secure communication and preventing security vulnerabilities. Computer graphics and computational geometry address the generation of images. Programming language theory considers different ways to describe computational processes, and database theory concerns the management of repositories of data. Human–computer interaction investigates the interfaces through which humans and computers interact, and software engineering focuses on the design and principles behind developing software. Areas such as operating systems, networks and embedded systems investigate the principles and design behind complex systems. Computer architecture describes the construction of computer components and computer-operated equipment. Artificial intelligence and machine learning aim to synthesize goal-orientated processes such as problem-solving, decision-making, environmental adaptation, planning and learning found in humans and animals. Within artificial intelligence, computer vision aims to understand and process image and video data, while natural language processing aims to understand and process textual and linguistic data.

↑ Return to Menu

Computer security in the context of National security

National security, or national defence (national defense in American English), is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military attack, national security is widely understood to include also non-military dimensions, such as the security from terrorism, minimization of crime, economic security, energy security, environmental security, food security, and cyber-security. Similarly, national security risks include, in addition to the actions of other states, action by violent non-state actors, by narcotic cartels, organized crime, by multinational corporations, and also the effects of natural disasters.

Governments rely on a range of measures, including political, economic, and military power, as well as diplomacy, to safeguard the security of a state. They may also act to build the conditions of security regionally and internationally by reducing transnational causes of insecurity, such as climate change, economic inequality, political exclusion, and nuclear proliferation.

↑ Return to Menu

Computer security in the context of Security vulnerabilities

In computer security, vulnerabilities are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.

Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where the system does not behave as expected. If the bug could enable an attacker to compromise the confidentiality, integrity, or availability of system resources, it can be considered a vulnerability. Insecure software development practices as well as design factors such as complexity can increase the burden of vulnerabilities.

↑ Return to Menu

Computer security in the context of Formal verification

In the context of hardware and software systems, formal verification is the act of proving or disproving the correctness of a system with respect to a certain formal specification or property, using formal methods of mathematics. Formal verification is a key incentive for formal specification of systems, and is at the core of formal methods.It represents an important dimension of analysis and verification in electronic design automation and is one approach to software verification. The use of formal verification enables the highest Evaluation Assurance Level (EAL7) in the framework of common criteria for computer security certification.

Formal verification can be helpful in proving the correctness of systems such as: cryptographic protocols, combinational circuits, digital circuits with internal memory, and software expressed as source code in a programming language. Prominent examples of verified software systems include the CompCert verified C compiler and the seL4 high-assurance operating system kernel.

↑ Return to Menu

Computer security in the context of White-collar workers

A white-collar worker is a person who performs knowledge-based, aptitude-based, managerial, or administrative work generally performed in an office or similar setting. White-collar workers include job paths related to banking, finance, compliance, legal, risk management, internal audit, data privacy, cybersecurity, insurance, government, consulting, academia, accountancy, business and executive management, customer support, design, economics, science, technology, engineering, market research, human resources, operations research, marketing, public relations, real estate, information technology, networking, healthcare, architecture, and research and development.

In contrast, blue-collar workers perform manual labor or work in skilled trades; pink-collar workers work in care, health care, social work, or teaching; green-collar workers specifically work in the environmental sector; and grey-collar jobs combine manual labor and skilled trades with non-manual or managerial duties.

↑ Return to Menu

Computer security in the context of Threat (security)

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event (incident is often used as a blanket term). A threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. An exploit is a vulnerability that a threat actor used to cause an incident.

↑ Return to Menu