About IT securit

1/12
News And Updates
Student Stories
  • Students up for a second LEGO2NANO hackathon Students and researchers from UCL’s Engineering and MAPS Faculties, Institute of Making and London Centre for Nanotechnology
  • Advice for Waitlisted Students Over the next couple of months, high school graduates will be receiving lots of college admissions decisions from their home country. Some good news, some bad news, It’s hard to know what to make of a better decision. 
University News
Campus Life
ACASC News
About IT securit

Sometimes referred to as computer security, information technology security is information security applied to technology. It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber-attacks that often attempt to breach into critical private information or gain control of the internal systems.

The act of providing trust of the information, that the Confidentiality, Integrity, and Availability (CIA) of the information are not violated, e.g. ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction or physical theft. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. A common method of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.

Students may engage in classes covering topics such as cryptography, system security, hacker tools and techniques, information security policies, data recovery, or computer forensics.

Graduates of It security programs should expect to acquire an in- depth understanding of complex issues related to network security software and prevention methods that will lead to developing practical problem-solving skills.


share_phone_icon share_facebook_icon share_twitter_icon google_share_plus_icon share_youtube_icon share_pinterest_icon share_linkedin_icon share_instagram_icon email_icon top_icon