Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Crimes in which computers, computer networks or databases, digital devices, or the Internet have been attacked or infiltrated as well as crimes that are facilitated by computers, wireless Web devices, or the Internet.
Forensic specialty that applies science to the acquisition and analysis of electronic data from computers, other digital devices, and the Internet to assist in civil and criminal investigations.
Intrusions, unauthorized access, or attempts to circumvent or bypass the security mechanisms of a computer, computer network, computer program, or information system. Unauthorized access includes approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without authorized consent.
Computer Viruses and Worms
Malicious computer programs, also known as malware, that use embedded instructions to carry out destructive behavior on computers, computer networks, and digital devices.
A firewall is a program designed to monitor the traffic entering and leaving a computer network or single device and prevent malicious programs or users from entering the protected system. Firewalls may protect a single device, such as a server or personal computer (PC), or even an entire computer network. They also differ in how they filter data. Firewalls are used alongside other computer security measures to protect sensitive data.
Computer Security Research Starter
Computer security is the practice of keeping a computer, a computer network, and the information stored on computers free from malware or other unauthorized access.
The attacks on Google servers, apparently launched from China, underscore the threat cyberattacks pose to American individuals and businesses as well as to national security.
The next major conflict between world powers may not begin at sea or along a disputed border, but in cyberspace. In the past decade, hackers have targeted voting systems in the United States, electrical grids in Ukraine, uranium enrichment facilities in Iran and hospitals, universities and major corporations around the world.