The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2009 vol. 11)
ISSN: 1520-9202
pp: 60-63
As information technology permeates all societal layers and its use crosses increasingly national boundaries, information security has become of paramount importance. Understanding what motivates information security is part of the hard work in planning the mechanisms that will assure it. Arguably, ubiquitous networking—for a wide range of personal, commerce, enterprise, and national purposes—is responsible for many recent productivity gains. But with this convenience has come vulnerability to those who seek to do damage or benefit illegally. Today's dynamic technology marketplace—with product generations now measured in months—gives increased choice of functionality and style to millions of potential buyers and their escalating expectations. However, with every new device comes at least some segment of the user population that doesn't understand new functionality and, consequently, experiences decreased reliability and reduced privacy.
Confidentiality, integrity, availability, identity, security, cyberspace, IT professional

R. H. Murphy and H. G. Miller, "Secure Cyberspace: Answering the Call for Intelligent Action," in IT Professional, vol. 11, no. , pp. 60-63, 2009.
81 ms
(Ver 3.3 (11022016))