Descriptor English: | Computer Security | ||||||
Descriptor Spanish: |
Seguridad Computacional
| ||||||
Descriptor Portuguese: | Segurança Computacional | ||||||
Descriptor French: | Sécurité informatique | ||||||
Entry term(s): |
Compromising of Data Computer Hacker Computer Hackers Computer Virus Computer Viruses Computer Worm Computer Worms Cyber Security Cybersecurity Data Compromising Data Encryption Data Encryptions Data Protection Data Security Digital Security Digital Security Protocol Digital Security Protocols Encryption, Data Encryptions, Data Hacker, Computer Hackers, Computer Information Protection Protection, Data Protection, Information Security, Computer Security, Cyber Security, Data Virus, Computer Viruses, Computer Worm, Computer Worms, Computer |
||||||
Tree number(s): |
L01.224.134 N04.452.910.200 |
||||||
RDF Unique Identifier: | https://id.nlm.nih.gov/mesh/D016494 | ||||||
Scope note: | Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
||||||
Annotation: | do not use for confidentiality of records (= CONFIDENTIALITY + RECORDS or specific records term) |
||||||
Allowable Qualifiers: |
CL classification EC economics ES ethics HI history IS instrumentation LJ legislation & jurisprudence SN statistics & numerical data ST standards TD trends |
||||||
Previous Indexing: |
Computer Systems (1987-1991) Confidentiality (1980-1991) Information Systems (1982-1991) |
||||||
Public MeSH Note: | 92 |
||||||
History Note: | 92 |
||||||
DeCS ID: | 30180 | ||||||
Unique ID: | D016494 | ||||||
Documents indexed in the Virtual Health Library (VHL): | Click here to access the VHL documents | ||||||
Date Established: | 1992/01/01 | ||||||
Date of Entry: | 1991/01/02 | ||||||
Revision Date: | 2018/07/13 |
-
-
INFORMATION SCIENCE
Information Science [L01]Information Science
|
Computer Security
- Preferred
Computer Worms
- Related but not broader or narrower
Data Protection
- Narrower
Data Security
- Narrower
Compromising of Data
- Narrower
Information Protection
- Narrower
Data Encryption
- Related but not broader or narrower
Computer Viruses
- Related but not broader or narrower
Computer Hackers
- Related but not broader or narrower
Digital Security Protocols
- Related but not broader or narrower
Concept UI |
M0025177 |
Scope note | Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Preferred term | Computer Security |
Entry term(s) |
Cyber Security Cybersecurity Digital Security Security, Computer Security, Cyber |
Concept UI |
M0025181 |
Preferred term | Computer Worms |
Entry term(s) |
Computer Worm Worm, Computer Worms, Computer |
Concept UI |
M0025182 |
Preferred term | Data Protection |
Entry term(s) |
Protection, Data |
Concept UI |
M0025183 |
Preferred term | Data Security |
Entry term(s) |
Security, Data |
Concept UI |
M0025178 |
Preferred term | Compromising of Data |
Entry term(s) |
Data Compromising |
Concept UI |
M0025184 |
Preferred term | Information Protection |
Entry term(s) |
Protection, Information |
Concept UI |
M000618469 |
Preferred term | Data Encryption |
Entry term(s) |
Data Encryptions Encryption, Data Encryptions, Data |
Concept UI |
M0025180 |
Preferred term | Computer Viruses |
Entry term(s) |
Computer Virus Virus, Computer Viruses, Computer |
Concept UI |
M0025179 |
Preferred term | Computer Hackers |
Entry term(s) |
Computer Hacker Hacker, Computer Hackers, Computer |
Concept UI |
FD00062309 |
Preferred term | Digital Security Protocols |
Entry term(s) |
Digital Security Protocol |
We want your feedback on the new DeCS / MeSH website
We invite you to complete a survey that will take no more than 3 minutes.
Go to survey