Abstract
The number of users of the Internet, in whatever way, is growing at an explosive rate. More and more companies are rolling out new applications based on the Internet, forcing more and more users to leverage these systems and therefore become Internet users. Social networking sites and applications are also growing at alarming rates, getting more and more users, whom we can call home or private users, involved and active on the Internet. Corporate companies are now also integrating social networking as part of their way of doing business, and governments are implementing Internet based systems ranging from medical applications to critical IT infrastructure protection.
Chapter PDF
Similar content being viewed by others
References
ITNow (January 2010), http://www.bcs.org
Sophos, The Sophos Security Threat Report (2009), http://www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf
CISCO, A Comprehensive Proactive Approach to Web based Threats, CISCO IronPort Web Reputation White Paper (2009), http://www.ironport.com/pdf/ironport_web_reputation_whitepaper.pdf
UK Cybercrime, The UK Cybercrime Report (2009), http://www.garlik.com/press.php?id=613-GRLK_PRD
CISCO Annual Security Report (2009), http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf
T3.com (September 2009), http://www.T3.com
Washington Post, Cybercrime is winning the battle over Cyberlaw (2008), http://voices.washingtonpost.com/securityfix/2008/12/report_cybercrime_is_winning_t.html (accessed February 15, 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
von Solms, B. (2011). Securing the Internet: Fact or Fiction?. In: Camenisch, J., Kisimov, V., Dubovitskaya, M. (eds) Open Research Problems in Network Security. iNetSec 2010. Lecture Notes in Computer Science, vol 6555. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19228-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-19228-9_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19227-2
Online ISBN: 978-3-642-19228-9
eBook Packages: Computer ScienceComputer Science (R0)