Outline of computer security | Wikipedia audio article

0
48
views

This is an audio version of the Wikipedia Article:
https://en.wikipedia.org/wiki/Outline_of_computer_security

00:01:05 1 Essence of computer security
00:01:23 2 Areas of computer security
00:05:59 3 Computer security threats
00:15:45 4 Computer defenses and security measures
00:17:11 4.1 Access control
00:21:22 4.2 Application security
00:21:45 4.3 Data security
00:22:05 4.4 Information privacy
00:23:27 4.5 Mobile security
00:23:46 4.6 Network security
00:26:49 4.7 World Wide Web Security
00:27:19 5 History of computer security
00:27:33 6 Computer security industry
00:27:44 6.1 Computer security software
00:28:18 6.2 Testing labs
00:29:44 6.3 Computer security companies
00:30:33 6.4 Computer security publications
00:30:44 6.4.1 Journals and magazines
00:31:24 6.4.2 Books on computer security
00:32:20 6.4.2.1 Books on cryptography
00:32:31 7 Cyber security community
00:32:41 7.1 Cyber security communities
00:32:55 7.2 Computer security organizations
00:33:06 7.2.1 Academic
00:34:31 7.2.2 Commercial
00:35:07 7.2.3 Government agencies
00:36:06 7.2.3.1 Law enforcement agencies
00:39:25 7.2.4 Independent non-profits
00:40:25 7.2.4.1 Independent web-sites
00:41:07 8 Persons influential in computer security
00:43:24 9 See also

Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago.

Learning by listening is a great way to:
– increases imagination and understanding
– improves your listening skills
– improves your own spoken accent
– learn while on the move
– reduce eye strain

Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone.

 

“I cannot teach anybody anything, I can only make them think.”
– Socrates

SUMMARY
=======
The following outline is provided as an overview of and topical guide to computer security:
Computer security – security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance in line with the increasing reliance on computer systems of most societies worldwide. Computer security includes measures taken to ensure the integrity of files stored on a computer or server as well as measures taken to prevent unauthorized access to stored data, by securing the physical perimeter of the computer equipment, authentication of users or computer accounts accessing the data, and providing a secure method of data transmission.