Prague, Czech Republic

Computer Security and Information Technology

Bachelor's
Language: EnglishStudies in English
Subject area: computer science
Years of study: 3
University website: www.cvut.cz
Computer
A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.
Computer Security
Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.
Information
Information is any entity or form that provides the answer to a question of some kind or resolves uncertainty. It is thus related to data and knowledge, as data represents values attributed to parameters, and knowledge signifies understanding of real things or abstract concepts. As it regards data, the information's existence is not necessarily coupled to an observer (it exists beyond an event horizon, for example), while in the case of knowledge, the information requires a cognitive observer.
Information Technology
Information technology (IT) is the use of computers to store, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise. IT is considered to be a subset of information and communications technology (ICT).
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment.
Technology
Technology ("science of craft", from Greek τέχνη, techne, "art, skill, cunning of hand"; and -λογία, -logia) is first robustly defined by Jacob Bigelow in 1829 as: "...principles, processes, and nomenclatures of the more conspicuous arts, particularly those which involve applications of science, and which may be considered useful, by promoting the benefit of society, together with the emolument [compensation ] of those who pursue them" .
Information
When action grows unprofitable, gather information; when information grows unprofitable, sleep.
Ursula K. Le Guin (b. 1929), American Science Fiction author. The Left Hand of Darkness, Ch. 3 (1969).
Security
To bargain freedom for security is the devil's bargain. Having made the bargain, one enjoys neither freedom nor security.
Gerry Spence, Give Me Liberty! Freeing Ourselves in the Twenty-First Century, Ch. 16 : Security, the One-Way Ticket to Slavery, p. 174 (1998)
Information Technology
The role of information management is to mediate between information technology and information institutions to facilitate their effective planning, organization, control, and operation.
William White eds. (1976) LJ, Library Journal. Volume 101, Nr 1-8. p. 155.
Privacy Policy