Chapter 22

Conclusion

From the material covered in this book, one can see that we are currently—and for the foreseeable future will be—living in a world of malicious actors intent on diverting and destroying the rewards of the wonderful fruits of countless inventors of the integrated technology we employ when we communicate over the public Internet. The creators of our computing, network connecting, mobility, storage, and website offering systems envisioned a world of benign individuals who would use technology for their own benefit and the shared benefit of others. And that shared benefit has spread to individuals and organizations throughout the world, creating an interconnected web of a global society. Hopefully, our technologists will create ...

Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.