(redirected from Computer security)
Also found in: Dictionary, Thesaurus, Financial, Acronyms, Encyclopedia, Wikipedia.
Related to Computer security: Network security


Protection; assurance; indemnification.

The term security is usually applied to a deposit, lien, or mortgage voluntarily given by a debtor to a creditor to guarantee payment of a debt. Security furnishes the creditor with a resource to be sold or possessed in case of the debtor's failure to meet his or her financial obligation. In addition, a person who becomes a surety for another is sometimes referred to as a "security."

West's Encyclopedia of American Law, edition 2. Copyright 2008 The Gale Group, Inc. All rights reserved.


1 in connection with the granting of a loan facility, the obtaining by the lender of rights additional to those deriving from the borrower to pay the interest due and to repay the principal debt in accordance with the provisions of the loan agreement; it confers a right to look to some identified fund or property, or to some other person, for payment. Those forms of security conferring recourse to particular funds or property are MORTGAGE, STANDARD SECURITY, CHARGE, PLEDGE, HYPOTHEC and LIEN. The forms of security permitting a creditor to look to a third party for satisfaction are GUARANTEE and INDEMNITY.
2 right to security, see HUMAN RIGHTS.
Collins Dictionary of Law © W.J. Stewart, 2006

SECURITY. That which renders a matter sure; an instrument which renders certain the performance of a contract. The term is also sometimes applied to designate a person who becomes the surety for another, or who engages himself for the performance of another's contract. See 3 Blackf. R. 431.

A Law Dictionary, Adapted to the Constitution and Laws of the United States. By John Bouvier. Published 1856.
References in periodicals archive ?
Stanton and Theofanos suggest it will take a multidisciplinary team of computer security experts, psychologists, sociologists and anthropologists working together to improve computer security issues, including behavior, to manage security fatigue.
Rayservers offers multiple, integrated computer security solutions to protect your financial transactions and information privacy from attack.
KeyChain enhances computer security in a number of ways.
One explanation for the underachievement, says Dennis Heretick, the Justice Department's chief information security officer, is that agencies were required to meet new standards last year that were not evaluated in past report cards, such as determining how frequently agencies applied software patches to known computer security flaws.
Our assessment included follow up on the progress that FDIC has made in correcting or mitigating computer security weaknesses identified in our audits for calendar years 2001 and 2002.
The Brazilian Computer Emergency Response Team (NBSO), a nationwide service organization that responds to computer security incident reports and activity related to networks linked to the Brazilian Internet, backs up mi2g claims that for-profit Internet crimes (as opposed to not-for-profit crimes such as those designed to damage computer systems) are on the rise in Brazil.
As part of this campaign, Sophos is providing a free computer security assessment, conducted by a Sophos-certified representative, to all NHS organisations in the UK.
"On average, 15 seconds after a new Web site appears on the Internet, it's been scanned by a hacker," says Jason Matlof, vice president of marketing and business development at Neoteris, a maker of computer security products.
Participants discussed and debated challenging computer security and usability issues related to the Help America Vote Act and the role NIST will play in the law's implementation.
Anson Lee, program manager at Symantec Corporation, parent company of the popular Norton Anti-Virus program, is fond of comparing one's computer security to home security.
Those charged with protecting their companies' computer security speak like generals under attack, peppering their language with expressions such as "monitoring the perimeter," "looking for weaknesses in the system" and "updating defenses." The enemy they face includes an unknown legion of sophisticated hackers who may try to break into a company's system to steal data or disrupt service or to cause damage just because they can.

Full browser ?