CHAPTER 4

Keeping the Electronic Highways Safe

According to the FBI, “Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.”25This same statement also applies to physical networks; the revolution in Internet connectivity is being exploited for nefarious purposes. Networks carry data from place to place. However, thinking of a network as a data carrier only tells half the story. We speak daily of networks, of which the Internet is the largest, and the data available on them. Without breaking stride, we move on to speak of cellular telephone networks and could rightfully speak of landline telephone ...

Get Information Technology Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.