Search
Descriptor English: Computer Security
Descriptor Spanish: Seguridad Computacional
Descriptor Portuguese: Segurança Computacional
Descriptor French: Sécurité informatique
Entry term(s): Compromising of Data
Computer Hacker
Computer Hackers
Computer Virus
Computer Viruses
Computer Worm
Computer Worms
Cyber Security
Cybersecurity
Data Compromising
Data Encryption
Data Encryptions
Data Protection
Data Security
Digital Security
Digital Security Protocol
Digital Security Protocols
Encryption, Data
Encryptions, Data
Hacker, Computer
Hackers, Computer
Information Protection
Protection, Data
Protection, Information
Security, Computer
Security, Cyber
Security, Data
Virus, Computer
Viruses, Computer
Worm, Computer
Worms, Computer
Tree number(s): L01.224.134
N04.452.910.200
RDF Unique Identifier: https://id.nlm.nih.gov/mesh/D016494
Scope note: Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Annotation: do not use for confidentiality of records (= CONFIDENTIALITY + RECORDS or specific records term)
Allowable Qualifiers: CL classification
EC economics
ES ethics
HI history
IS instrumentation
LJ legislation & jurisprudence
SN statistics & numerical data
ST standards
TD trends
Previous Indexing: Computer Systems (1987-1991)
Confidentiality (1980-1991)
Information Systems (1982-1991)
Public MeSH Note: 92
History Note: 92
DeCS ID: 30180
Unique ID: D016494
Documents indexed in the Virtual Health Library (VHL): Click here to access the VHL documents
Date Established: 1992/01/01
Date of Entry: 1991/01/02
Revision Date: 2018/07/13
Computer Security - Preferred
Concept UI M0025177
Scope note Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Preferred term Computer Security
Entry term(s) Cyber Security
Cybersecurity
Digital Security
Security, Computer
Security, Cyber
Computer Worms - Related but not broader or narrower
Concept UI M0025181
Preferred term Computer Worms
Entry term(s) Computer Worm
Worm, Computer
Worms, Computer
Data Protection - Narrower
Concept UI M0025182
Preferred term Data Protection
Entry term(s) Protection, Data
Data Security - Narrower
Concept UI M0025183
Preferred term Data Security
Entry term(s) Security, Data
Compromising of Data - Narrower
Concept UI M0025178
Preferred term Compromising of Data
Entry term(s) Data Compromising
Information Protection - Narrower
Concept UI M0025184
Preferred term Information Protection
Entry term(s) Protection, Information
Data Encryption - Related but not broader or narrower
Concept UI M000618469
Preferred term Data Encryption
Entry term(s) Data Encryptions
Encryption, Data
Encryptions, Data
Computer Viruses - Related but not broader or narrower
Concept UI M0025180
Preferred term Computer Viruses
Entry term(s) Computer Virus
Virus, Computer
Viruses, Computer
Computer Hackers - Related but not broader or narrower
Concept UI M0025179
Preferred term Computer Hackers
Entry term(s) Computer Hacker
Hacker, Computer
Hackers, Computer
Digital Security Protocols - Related but not broader or narrower
Concept UI FD00062309
Preferred term Digital Security Protocols
Entry term(s) Digital Security Protocol



We want your feedback on the new DeCS / MeSH website

We invite you to complete a survey that will take no more than 3 minutes.


Go to survey