Computing security methods are security safeguards implemented within the IT, using the networking, hardware, software, and firmware of the IT. This includes (1) the hardware, firmware, and software that implements security functionality and (2) the design, implementation, and verification techniques used to ensure that system assurance requirements are satisfied.
Source(s):
NIST SP 800-33
[Withdrawn]