Abstract
The rapid advances in computer technology, the plummeting prices of information processing and indexing devices, and the development of sprawling global networks have all made the generation, collection, processing, indexing, and storage of information easy. Massive information is created, processed, and moved around on a daily basis. The value of information has skyrocketed, and information has all of a sudden become a valuable asset for individuals, businesses, and nations. The security of nations has come to depend on computer networks that very few can defend effectively. Our own individual privacy and security have come to depend on the whims of the kid next door.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Reference
Committee to Study High Performance Computing and Communications (1995) Evolving the high performance computing and communications initiative to support the nation’s information infrastructure. The National Academies Press, Washington, DC. http://www.nap.edu/readingroom/books/hpcc/contents.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Other Efforts to Secure Data in Computer Networks and Beyond. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)