Skip to main content

Other Efforts to Secure Information and Computer Networks

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 2815 Accesses

Abstract

The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made the generation, collection, processing, indexing, and storage of information easy. Massive information is created, processed, and moved around on a daily basis. The value of information has skyrocketed, and information has all of a sudden become a valuable asset for individuals, businesses, and nations. The security of nations has come to depend on computer networks that very few can defend effectively. Our own individual privacy and security have come to depend on the whims of the kid next door.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Evolving the High Performance Computing and Communications Initiative to Support the Nation’s Information Infrastructure. http://www.nap.edu/readingroom/books/hpcc/contents.html.

  2. High performance and Communication s Implementation plan. National Coordination Office for Computing, Information, and Communications Interagency Working Group on Information Technology Research and Development. http://www.ccic.gov/pubs/imp99/ip99–00.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2013). Other Efforts to Secure Information and Computer Networks. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4543-1_23

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4542-4

  • Online ISBN: 978-1-4471-4543-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics