In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal and/or confidential data.
Often, secure environments employ cryptography as a means to protect information.
Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
Famous quotes containing the words secure and/or environment:
“To be a good enough parent one must be able to feel secure in ones parenthood, and ones relation to ones child...The security of the parent about being a parent will eventually become the source of the childs feeling secure about himself.”
—Bruno Bettelheim (20th century)
“If the Revolution has the right to destroy bridges and art monuments whenever necessary, it will stop still less from laying its hand on any tendency in art which, no matter how great its achievement in form, threatens to disintegrate the revolutionary environment or to arouse the internal forces of the Revolution, that is, the proletariat, the peasantry and the intelligentsia, to a hostile opposition to one another. Our standard is, clearly, political, imperative and intolerant.”
—Leon Trotsky (18791940)