Misplaced Pages

Secure environment

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Secure environment" – news · newspapers · books · scholar · JSTOR (December 2009) (Learn how and when to remove this message)

In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal or confidential data.

Often, secure environments employ cryptography as a means to protect information.

Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.

See also


Stub icon

This computer science article is a stub. You can help Misplaced Pages by expanding it.

Categories: