2020 | OriginalPaper | Chapter
20. Other Efforts to Secure Data in Computer Networks and Beyond
Published in:
Guide to Computer Network Security
Abstract
The rapid development of sprawling global networks has made the generation, collection, processing, indexing, and storage of information easy. A massive amount of information is created, processed, and moved around on a daily basis. The value of information has sky-rocketed and information has all of a sudden become a valuable asset for individuals, businesses, and nations. The privacy of individuals, security of personal, corporations, and national data have come to depend on distributed computer networks running a multitude of security protocols that are collectively becoming impossible to defend. Our own individual privacy and security have come to depend on the whims of the kid next door. Protection of information, on which we have come to depend so much, has been a major challenge since the birth of the Internet. The widespread adoption of computer technology for business, organization, and government operations has made the problem of protecting critical personal, business, and national assets more urgent. When these assets are attacked, damaged, or threatened, our own individual, business, and more importantly national security is at stake. The problem of protecting these assets is becoming a personal, business, and national priority that must involve everyone. Efforts and ways must be sought to this end. However, getting this massive public involvement will require massive public efforts on several fronts, including legislation, regulation, education, and activism. This chapter focuses on alternative and collective efforts that must be explored.