Skip to main content

Information Security in the Internet Age

  • Chapter
  • First Online:
Beyond Data Protection
  • 1668 Accesses

Abstract

This descriptive chapter aims to impress the readers on various latest technologies that relate to critical information security. It is based on my analysis, observation and experience whilst dealing with this. The demanding technology’s offerings, deployment and its usage have had pushed Internet users like us to be more cautious and considerable whilst managing personal data. Each section of this chapter highlights some practical guidance for readers and proffers useful explanations that could be potentially considered in our daily life and business.

The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn’t all that widespread, but that state of affairs is expected to change rapidly (Dorothy E. Denning, Distinguished Professor, Department of Defense Analysis, Naval Postgraduate School & Fellow of the Association for Computing Machinery)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Agencies (2012).

  2. 2.

    Arthur (Arthur 2011).

  3. 3.

    Wikipedia (2012a).

  4. 4.

    (Amazon 2012a).

  5. 5.

    (Haikes & Murchinson 2012).

  6. 6.

    (Grance & Mell 2011).

  7. 7.

    (Ried & Kisker 2012).

  8. 8.

    (Ingthorsson 2011).

  9. 9.

    See Ingthorsson’s analysis.

  10. 10.

    (Nisvold 2012).

  11. 11.

    Amazon (Amazon 2012b).

  12. 12.

    (Reed 2011).

  13. 13.

    (Hardy 2012).

  14. 14.

    (Bergstein 2012).

  15. 15.

    (Chen et al. 2012)

  16. 16.

    (Pederson 2012).

  17. 17.

    (Silveira 2012).

  18. 18.

    (Cox 2012).

  19. 19.

    (Laczynski 2011).

  20. 20.

    (Business 2012).

  21. 21.

    (Datainspektionen 2012).

  22. 22.

    (Moos 2012).

  23. 23.

    Data Guidance (2012).

  24. 24.

    Wikipedia (2012b).

  25. 25.

    Wikipedia (2012c).

  26. 26.

    Christey et al. (2011).

  27. 27.

    Security Obscurity (2012).

  28. 28.

    (Felten & Zeller 2012).

  29. 29.

    (Reahard 2012).

  30. 30.

    (Zetter 2010).

  31. 31.

    (Mills 2012).

  32. 32.

    (Armerding 2012).

  33. 33.

    Symantec (2012).

  34. 34.

    (NIST 2012).

  35. 35.

    TechJournal (2012).

  36. 36.

    (Mershon 2011).

  37. 37.

    (Bruich et al. 2011).

  38. 38.

    (Hon & Millard 2012).

  39. 39.

    (PerspecSys 2012).

  40. 40.

    (Forrester 2012).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eva Rose Rahim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Rahim, E.R. (2013). Information Security in the Internet Age. In: Ismail, N., Yong Cieh, E. (eds) Beyond Data Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33081-0_9

Download citation

Publish with us

Policies and ethics