In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal and/or confidential data.
Often, secure environments employ cryptography as a means to protect information.
Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
Famous quotes containing the words secure and/or environment:
“The objects of a financier are, then, to secure an ample revenue; to impose it with judgment and equality; to employ it economically; and, when necessity obliges him to make use of credit, to secure its foundations in that instance, and for ever, by the clearness and candour of his proceedings, the exactness of his calculations, and the solidity of his funds.”
—Edmund Burke (17291797)
“We learn through experience and experiencing, and no one teaches anyone anything. This is as true for the infant moving from kicking to crawling to walking as it is for the scientist with his equations. If the environment permits it, anyone can learn whatever he chooses to learn; and if the individual permits it, the environment will teach him everything it has to teach.”
—Viola Spolin (b. 1911)