Secure computer systems are designed to prevent unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. They incorporate hardware, software and administrative policies and procedures to protect data and systems from cyber threats. The goal is to ensure the confidentiality, integrity and availability of information and systems through authentication, authorization, encryption and other security controls.