O'Reilly logo

Information Technology Security Fundamentals by Bryan Hosack, Glen Sagers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4

Keeping the Electronic Highways Safe

According to the FBI, “Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.”25This same statement also applies to physical networks; the revolution in Internet connectivity is being exploited for nefarious purposes. Networks carry data from place to place. However, thinking of a network as a data carrier only tells half the story. We speak daily of networks, of which the Internet is the largest, and the data available on them. Without breaking stride, we move on to speak of cellular telephone networks and could rightfully speak of landline telephone ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required