Solihull, United Kingdom

Computing (Cyber Security)

Language: English Studies in English
Subject area: computer science
University website: www.solihull.ac.uk
Higher National Diploma (HND)
Computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computers. Computing includes designing, developing and building hardware and software systems; designing a mathematical sequence of steps known as an algorithm; processing, structuring, and managing various kinds of information; doing scientific research on and with computers; making computer systems behave intelligently; and creating and using communications and entertainment media. The field of computing includes computer engineering, software engineering, computer science, information systems, and information technology.
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment.
Security
To minimize suffering and to maximize security were natural and proper ends of society and Caesar. But then they became the only ends, somehow, and the only basis of law — a perversion. Inevitably, then, in seeking only them, we found only their opposites: maximum suffering and minimum security.
Walter M. Miller, Jr., A Canticle for Leibowitz, Fiat Voluntas Tua, Ch. 29 (1959)
Security
No nation can make itself secure by seeking supremacy over all others. We all share responsibility for each other’s security, and only by working to make each other secure can we hope to achieve lasting security for ourselves.
Kofi Annan, Address at the Truman Presidential Museum and Library, Independence, Missouri, USA (11 December 2006)
Security
But why should there be an exception relative to security?  What special reason is there that the production of security cannot be relegated to free competition?  Why should it be subjected to a different principle and organized according to a different system?
Gustave de Molinari, tr. J. Huston McCulloch, §II of The Production of Security (Auburn, AL: Ludwig von Mises Institute, 2009; orig. 1849), p. 24.
Privacy Policy